An array index error, leading to heap based buffer overflow, was found in the way OpenOffice.org parsed RTF files. If a user opened a specially-crafted RTF file, with broken RTF tables, in OpenOffice.org suite tool (oowriter), it could lead to denial of service (oowriter executable crash), or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org Writer. References: [1] http://www.cs.brown.edu/people/drosenbe/research.html Acknowledgements: Red Hat would like to thank OpenOffice.org for reporting this issue. Upstream acknowledges Dan Rosenberg of Virtual Security Research as the original reporter.
Public via: http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2011:0181 https://rhn.redhat.com/errata/RHSA-2011-0181.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:0182 https://rhn.redhat.com/errata/RHSA-2011-0182.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0183 https://rhn.redhat.com/errata/RHSA-2011-0183.html