Total vulnerabilities in the database
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Software | From | Fixed in |
---|---|---|
openoffice / openoffice | 1.0.2 | 1.0.2.x |
openoffice / openoffice | 1.1.1 | 1.1.1.x |
openoffice / openoffice | 1.1.2 | 1.1.2.x |
openoffice / openoffice | 1.0.1 | 1.0.1.x |
openoffice / openoffice | 1.1.4 | 1.1.4.x |
openoffice / openoffice | 1.1.0 | 1.1.0.x |
openoffice / openoffice | 1.1.3 | 1.1.3.x |