OpenOffice.org Buffer Overflow and Directory Traversal Vulnerabilities (Win)

Summary
The host has OpenOffice installed and is prone to buffer overflow and directory traversal vulnerabilities.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will crash the application. Impact Level: System/Application
Solution
Upgrade to OpenOffice Version 3.3.0 or later For updates refer to http://www.openoffice.org/
Insight
Multiple flaws are due to: - A buffer overflow error when processing malformed TGA files and PNG files - A memory corruption error within the 'WW8ListManager::WW8ListManager()' and 'WW8DopTypography::ReadFromMem()' function when processing malformed data - A memory corruption error when processing malformed RTF data - A directory traversal error related to 'zip/jar' package extraction - A buffer overflow error when processing malformed PPT files
Affected
OpenOffice Version 2.x and 3.x to 3.2.0 on windows.
References