Republished without change.  This advisory, originally posted 
on 2015-11-04, died in a moderation queue and did not reach 
the list.  The announce@openoffice.apache.org is the official 
mailing list for Apache OpenOffice security advisories, as 
specified at <http://www.openoffice.org/security/alerts.html>.
This republication ensures preservation in the announce-list
archive.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                  NOTICE: APACHE OPENOFFICE SECURITY ADVISORY

                  CVE-2015-5213: .DOC DOCUMENT VULNERABILITY

                        FIXED IN APACHE OPENOFFICE 4.1.2

CVE-2015-5213
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5213>
Apache OpenOffice Advisory
<https://www.openoffice.org/security/cves/CVE-2015-5213.html>

Title: Memory Corruption Vulnerability (DOC Piecetable)

Version 1.0
Announced 2015-11-04

    A crafted Microsoft Word DOC file can be used to specify a
    document buffer that is too small for the amount of data 
    provided for it.  Failure to detect the discrepancy allows 
    an attacker to cause denial of service (memory corruption 
    and application crash) and possible execution of arbitrary 
    code.

Severity: Important

    There are no known exploits of this vulnerability.
    A proof-of-concept demonstration exists.

Vendor: The Apache Software Foundation

Versions Affected

    All Apache OpenOffice versions 4.1.1 and older are affected
    OpenOffice.org versions are also affected.

Mitigation

    Apache OpenOffice users are urged to download and install 
    Apache OpenOffice version 4.1.2 or later.  DOC files having
    the defect are detected and made ineffective in 4.1.2.

Precautions

    Users who do not upgrade to Apache OpenOffice 4.1.2 should
    be careful of .DOC files from unknown or unreliable sources.
    A Microsoft Word 97-2003 DOC format file can be checked
    by opening it with software, such as Microsoft Office Word or
    Word Online, that rejects documents having this defect as
    corrupted.

Further Information

    For additional information and assistance, consult the Apache
    OpenOffice Community Forums, <https://forum.openoffice.org/>,
    or make requests to the <mailto:us...@openoffice.apache.org>
    public mailing list.

    The latest information on Apache OpenOffice security bulletins
    can be found at <http://www.openoffice.org/security/bulletin.html>.

Credits

    The discoverer of this vulnerability wishes to remain anonymous.

PGP key Fingerprint 04D0 4322 979B 84DE 1077 0334 F96E 89FF D456 628A
        <https://people.apache.org/keys/committer/orcmid.asc>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBAgAGBQJWOpbcAAoJEPluif/UVmKKy24IAJFxpkSFlm0oH9lVSFi/7VNI
uJfd3cSOG7U4qCQ6QG52iYwBektdvoEMze650h7tQz6BE5Nu8ptMWXW9+crUUmMY
Tq8k5OHhP6Yzs1qe5qRLl2FgwB66aJdEYxo9EJVUB0AugYeZ2jgFkqktO3/soY67
elje8CnDTChD96Uh8OkW84L93RgPgua2a02rzJGOBPAjbMkr+BSwf4ubAvXnPzec
cvdPuO3ESxmwUI21uPducYF6oPITl1TAI14obxzL6dW5ltImtZuMT8cErtrsxed/
bKoum4DVDHF+Xp6/cOGto1qEIHkUzWB9SGFL6W3KPyY5aGcyi6FrLuQTC2uYkDQ=
=nAZW
-----END PGP SIGNATURE-----



Reply via email to