Republished without change.  This advisory, originally posted 
on 2015-11-04, died in a moderation queue and did not reach 
the list.  The announce@openoffice.apache.org is the official 
mailing list for Apache OpenOffice security advisories, as 
specified at <http://www.openoffice.org/security/alerts.html>.
This republication ensures preservation in the announce-list
archive.  This is the final advisory to be reposted.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                  NOTICE: APACHE OPENOFFICE SECURITY ADVISORY

                  CVE-2015-5214: .DOC BOOKMARKS VULNERABILITY

                        FIXED IN APACHE OPENOFFICE 4.1.2

CVE-2015-5214
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5213>
Apache OpenOffice Advisory
<https://www.openoffice.org/security/cves/CVE-2015-5213.html>

Title: Memory Corruption Vulnerability (DOC Bookmarks)

Version 1.0
Announced 2015-11-04

    A crafted Microsoft Word DOC can contain invalid bookmark
    positions leading to memory corruption when the document is
    loaded or bookmarks are manipulated.  The defect allows an
    attacker to cause denial of service (memory corruption and
    application crash) and possible execution of arbitrary code.

Severity: Medium

    There are no known exploits of this vulnerability.
    A proof-of-concept demonstration exists.

Vendor: The Apache Software Foundation

Versions Affected

    All Apache OpenOffice versions 4.1.1 and older are affected.
    OpenOffice.org versions are also affected.

Mitigation

    Apache OpenOffice users are urged to download and install Apache
    OpenOffice version 4.1.2 or later.  The defect is over-ridden
    in 4.1.2.

Precautions

    Users who do not upgrade to Apache OpenOffice 4.1.2 should
    be careful of .DOC files from unknown or unreliable sources.
    A Microsoft Word 97-2003 DOC format file can be checked
    by opening with software, such as Microsoft Office Word or
    Word Online.  The documents may be rejected as corrupted or
    extraordinary employment of bookmarks may be observable.

Further Information

    For additional information and assistance, consult the Apache
    OpenOffice Community Forums, <https://forum.openoffice.org/>,
    or make requests to the <mailto:us...@openoffice.apache.org>
    public mailing list.

    The latest information on Apache OpenOffice security bulletins
    can be found at <http://www.openoffice.org/security/bulletin.html>.

Credits

    The discoverer of this vulnerability wishes to remain anonymous.

PGP key Fingerprint 04D0 4322 979B 84DE 1077 0334 F96E 89FF D456 628A
        <https://people.apache.org/keys/committer/orcmid.asc>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBAgAGBQJWOpcQAAoJEPluif/UVmKKrigH/A0mLESqnhDMotJt9umYR+83
n+AL5jzIFESgDyrWOOcpH1dFCm4Tqi4r48KpfgL1dGKj9W8V4XXEEaOQAjF6ITet
20hNBrY+BCaG2MjI8D7OH3J0tRL3NHBoUwkFXpK1LphRIfizxtp75L43I4bHU0kl
oSBn5KbXM6/NGmKLTKzTgJuxxz+QW1qTJPCnVTABegRojFRJhylZDx7+pOI+QIfX
NxlJ1EgPzeagQNqHVVSnVQIQvx7HnKuGTat1RQL46OqfTaEy4diNBrEdcZBvsh+E
iCOssXcttDqBsyPPhSiuimtnG0i6vyw3yD/MD9uxBWP/DJUiGL2uBi3r8Q+GI8Y=
=MFOH
-----END PGP SIGNATURE-----




Reply via email to