Republished without change. This advisory, originally posted
on 2015-11-04, died in a moderation queue and did not reach
the list. The [email protected] is the official
mailing list for Apache OpenOffice security advisories, as
specified at <http://www.openoffice.org/security/alerts.html>.
This republication ensures preservation in the announce-list
archive. This is the final advisory to be reposted.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
NOTICE: APACHE OPENOFFICE SECURITY ADVISORY
CVE-2015-5214: .DOC BOOKMARKS VULNERABILITY
FIXED IN APACHE OPENOFFICE 4.1.2
CVE-2015-5214
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5213>
Apache OpenOffice Advisory
<https://www.openoffice.org/security/cves/CVE-2015-5213.html>
Title: Memory Corruption Vulnerability (DOC Bookmarks)
Version 1.0
Announced 2015-11-04
A crafted Microsoft Word DOC can contain invalid bookmark
positions leading to memory corruption when the document is
loaded or bookmarks are manipulated. The defect allows an
attacker to cause denial of service (memory corruption and
application crash) and possible execution of arbitrary code.
Severity: Medium
There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.
Vendor: The Apache Software Foundation
Versions Affected
All Apache OpenOffice versions 4.1.1 and older are affected.
OpenOffice.org versions are also affected.
Mitigation
Apache OpenOffice users are urged to download and install Apache
OpenOffice version 4.1.2 or later. The defect is over-ridden
in 4.1.2.
Precautions
Users who do not upgrade to Apache OpenOffice 4.1.2 should
be careful of .DOC files from unknown or unreliable sources.
A Microsoft Word 97-2003 DOC format file can be checked
by opening with software, such as Microsoft Office Word or
Word Online. The documents may be rejected as corrupted or
extraordinary employment of bookmarks may be observable.
Further Information
For additional information and assistance, consult the Apache
OpenOffice Community Forums, <https://forum.openoffice.org/>,
or make requests to the <mailto:[email protected]>
public mailing list.
The latest information on Apache OpenOffice security bulletins
can be found at <http://www.openoffice.org/security/bulletin.html>.
Credits
The discoverer of this vulnerability wishes to remain anonymous.
PGP key Fingerprint 04D0 4322 979B 84DE 1077 0334 F96E 89FF D456 628A
<https://people.apache.org/keys/committer/orcmid.asc>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBAgAGBQJWOpcQAAoJEPluif/UVmKKrigH/A0mLESqnhDMotJt9umYR+83
n+AL5jzIFESgDyrWOOcpH1dFCm4Tqi4r48KpfgL1dGKj9W8V4XXEEaOQAjF6ITet
20hNBrY+BCaG2MjI8D7OH3J0tRL3NHBoUwkFXpK1LphRIfizxtp75L43I4bHU0kl
oSBn5KbXM6/NGmKLTKzTgJuxxz+QW1qTJPCnVTABegRojFRJhylZDx7+pOI+QIfX
NxlJ1EgPzeagQNqHVVSnVQIQvx7HnKuGTat1RQL46OqfTaEy4diNBrEdcZBvsh+E
iCOssXcttDqBsyPPhSiuimtnG0i6vyw3yD/MD9uxBWP/DJUiGL2uBi3r8Q+GI8Y=
=MFOH
-----END PGP SIGNATURE-----