A heap-based buffer out-ouf-bounds read was found in the way OpenOffice.org imported certain Microsoft Word Binary File Format (.DOC) file.If a user opened a specially-crafted DOC file in OpenOffice.org suite tool (oowriter), it could lead to denial of service (oowriter executable crash), or possibly, execute arbitrary code with the privileges of the user running OpenOffice.org Writer. This has been assigned CVE-2011-2713.
Created attachment 515212 [details] patch1
Created attachment 515213 [details] patch2
Created attachment 515214 [details] patch3
Created attachment 515215 [details] patch4
Created attachment 515216 [details] patch5
Created attachment 523579 [details] combined backport to OpenOffice.org 3.2.1
This is public via: http://www.libreoffice.org/advisories/CVE-2011-2713/
It initially appeared that this flaw may be exploitable similar to CVE-2010-3452, where an OOB Read caused Arbitrary Code Execution. However in the case of this particular flaw, the junk data read is just parsed into an internal representation of properties and the maximum harm this should cause in application crash (Denial Of Service). Timeline: - Reported to securityteam on 25-July-2011 - Recieved a reply (with tdf-security.org copied) on the same date - Release date changed with a few delays in between - Release on 5-Oct-2011 Statement: This issue results in an OOB read which is not exploitable for arbitrary code execution and can simply cause a crash. We do not consider this as a security issue.
Acknowledgements: This issue was discovered by Huzaifa Sidhpurwala of the Red Hat Security Response Team.