Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.openoffice.org/issues/show_bug.cgi?id=46388 http://marc.theaimsgroup.com/?l=bugtraq&m=111325305109137 http://www.vuxml.org/freebsd/b206dd82-ac67-11d9-a788-0001020eed82.html
Insight
The following packages are affected:
openoffice ar-openoffice ca-openoffice cs-openoffice de-openoffice dk-openoffice el-openoffice es-openoffice et-openoffice fi-openoffice fr-openoffice gr-openoffice hu-openoffice it-openoffice ja-openoffice ko-openoffice nl-openoffice pl-openoffice pt-openoffice pt_BR-openoffice ru-openoffice se-openoffice sk-openoffice sl-openoffice-SI tr-openoffice zh-openoffice-CN zh-openoffice-TW jp-openoffice kr-openoffice sl-openoffice-SL zh-openoffice zh_TW-openoffice
CVE-2005-0941
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Severity
Classification
-
CVE CVE-2005-0941 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities