CVE-2005-0941
Published: 2 May 2005
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Priority
Status
Package | Release | Status |
---|---|---|
openoffice.org Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
|
edgy |
Not vulnerable
|
|
feisty |
Not vulnerable
|
|
upstream |
Needs triage
|
|
openoffice.org-l10n Launchpad, Ubuntu, Debian |
dapper |
Released
(2.0.2-2ubuntu5)
|
edgy |
Released
(2.0.2-2ubuntu5)
|
|
feisty |
Released
(2.0.2-2ubuntu5)
|
|
upstream |
Needs triage
|