Computer Security
[EN] securityvulns.ru no-pyccku


OpenOffice buffer overflow
Published:14.06.2007
Source:
SecurityVulns ID:7813
Type:client
Threat Level:
6/10
Description:Ivalid dynamic memory allocation on RTF document prtdata tag parsing.
Affected:OPENOFFICE : OpenOffice 2.2
CVE:CVE-2007-2754 (Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.)
 CVE-2007-0245 (Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.)
Original documentdocumentNGSSoftware Insight Security Research Advisory (NISR), High risk vulnerability in OpenOffice RTF parser (14.06.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod