A security issue and some vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.
1) An integer truncation error when parsing certain content can be exploited to cause a heap-based buffer overflow via a specially crafted file.
2) A short integer overflow error when parsing certain content can be exploited to cause a heap-based buffer overflow via a specially crafted file.
3) A use-after-free error when parsing tables in RTF documents can be exploited to dereference freed memory by e.g. tricking a user into opening an RTF document containing specially crafted table data.
4) A signedness error when parsing the "\pnseclvl" RTF tag can be exploited to dereference freed memory by e.g. tricking a user into opening a specially crafted RTF document.
5) An array indexing error when parsing list data in Word documents can be exploited to corrupt memory by e.g. tricking a user into opening a specially crafted Word document.
6) Two input sanitisation errors when parsing Word documents can be exploited to write two NULL bytes into arbitrary memory locations.
7) A security issue is caused due to certain shell scripts incorrectly setting the environment variable LD_LIBRARY_PATH. This can be exploited to gain escalated privileges e.g. by tricking a user into running the script in a directory containing a malicious library.
8) Two vulnerabilities are caused due to the use of vulnerable libxml2 code.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Score: -4 Posts: 4 User Since: 30th Sep 2009 System Score: N/A Location: N/A Last edited on 18th Feb, 2011 02:47
OOo version 3.3 is riddled with errors and should not have been released.
Until there is a version that does not cause me to loose valuable time trying to find work arounds it will not be installed on any of my computers!
Version 3.2.1 should be regarded as the latest "stable" version.
Was this reply relevant?
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.