SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Apache OpenOffice Vendors:   Apache Software Foundation, OpenOffice.org
Apache OpenOffice Impress File Processing Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1036443
SecurityTracker URL:  http://securitytracker.com/id/1036443
CVE Reference:   CVE-2016-1513   (Links to External Site)
Date:  Jul 26 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.1.2 and prior
Description:   A vulnerability was reported in Apache OpenOffice. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted OpenDocument Presentation (.ODP) or Presentation Template (.OTP) file that, when loaded by the target user, will trigger a memory corruption error in Impress execute arbitrary code on the target system. The code will run with the privileges of the target user.

Yves Younan and Richard Johnson of Cisco Talos reported this vulnerability.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a source code fix, available at:

https://bz.apache.org/ooo/show_bug.cgi?id=127045

The vendor's advisory is available at:

http://www.openoffice.org/security/cves/CVE-2016-1513.html

Vendor URL:  www.openoffice.org/security/cves/CVE-2016-1513.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Aug 4 2016 (Ubuntu Issues Fix) Apache OpenOffice Impress File Processing Flaw Lets Remote Users Execute Arbitrary Code
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC