Republished without change. This advisory, originally posted on 2015-11-04, died in a moderation queue and did not reach the list. The announce@openoffice.apache.org is the official mailing list for Apache OpenOffice security advisories, as specified at <http://www.openoffice.org/security/alerts.html>. This republication ensures preservation in the announce-list archive.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 NOTICE: APACHE OPENOFFICE SECURITY ADVISORY CVE-2015-5213: .DOC DOCUMENT VULNERABILITY FIXED IN APACHE OPENOFFICE 4.1.2 CVE-2015-5213 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5213> Apache OpenOffice Advisory <https://www.openoffice.org/security/cves/CVE-2015-5213.html> Title: Memory Corruption Vulnerability (DOC Piecetable) Version 1.0 Announced 2015-11-04 A crafted Microsoft Word DOC file can be used to specify a document buffer that is too small for the amount of data provided for it. Failure to detect the discrepancy allows an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code. Severity: Important There are no known exploits of this vulnerability. A proof-of-concept demonstration exists. Vendor: The Apache Software Foundation Versions Affected All Apache OpenOffice versions 4.1.1 and older are affected OpenOffice.org versions are also affected. Mitigation Apache OpenOffice users are urged to download and install Apache OpenOffice version 4.1.2 or later. DOC files having the defect are detected and made ineffective in 4.1.2. Precautions Users who do not upgrade to Apache OpenOffice 4.1.2 should be careful of .DOC files from unknown or unreliable sources. A Microsoft Word 97-2003 DOC format file can be checked by opening it with software, such as Microsoft Office Word or Word Online, that rejects documents having this defect as corrupted. Further Information For additional information and assistance, consult the Apache OpenOffice Community Forums, <https://forum.openoffice.org/>, or make requests to the <mailto:us...@openoffice.apache.org> public mailing list. The latest information on Apache OpenOffice security bulletins can be found at <http://www.openoffice.org/security/bulletin.html>. Credits The discoverer of this vulnerability wishes to remain anonymous. PGP key Fingerprint 04D0 4322 979B 84DE 1077 0334 F96E 89FF D456 628A <https://people.apache.org/keys/committer/orcmid.asc> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBAgAGBQJWOpbcAAoJEPluif/UVmKKy24IAJFxpkSFlm0oH9lVSFi/7VNI uJfd3cSOG7U4qCQ6QG52iYwBektdvoEMze650h7tQz6BE5Nu8ptMWXW9+crUUmMY Tq8k5OHhP6Yzs1qe5qRLl2FgwB66aJdEYxo9EJVUB0AugYeZ2jgFkqktO3/soY67 elje8CnDTChD96Uh8OkW84L93RgPgua2a02rzJGOBPAjbMkr+BSwf4ubAvXnPzec cvdPuO3ESxmwUI21uPducYF6oPITl1TAI14obxzL6dW5ltImtZuMT8cErtrsxed/ bKoum4DVDHF+Xp6/cOGto1qEIHkUzWB9SGFL6W3KPyY5aGcyi6FrLuQTC2uYkDQ= =nAZW -----END PGP SIGNATURE-----