CVE-2005-0941

The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openoffice:openoffice:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openoffice:openoffice:1.1.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-05-02 04:00

Updated : 2023-12-10 10:28


NVD link : CVE-2005-0941

Mitre link : CVE-2005-0941

CVE.ORG link : CVE-2005-0941


JSON object : View

Products Affected

openoffice

  • openoffice