5.1
CVSSv2

CVE-2005-0941

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and previous versions allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

openoffice openoffice 1.1.2

openoffice openoffice 1.1.3

openoffice openoffice 1.0.1

openoffice openoffice 1.0.2

openoffice openoffice 1.1.0

openoffice openoffice 1.1.1

openoffice openoffice 1.1.4

Vendor Advisories

Synopsis openofficeorg security update Type/Severity Security Advisory: Important Topic Updated openofficeorg packages are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description OpenOfficeorg is an office productivit ...
The StgCompObjStream::Load() failed to check the validity of a length field in documents If an attacker tricked a user to open a specially crafted OpenOffice file, this triggered a buffer overflow which could lead to arbitrary code execution with the privileges of the user opening the document ...