CVE-2005-0941
https://notcve.org/view.php?id=CVE-2005-0941
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow. • http://secunia.com/advisories/17027 http://www.gentoo.org/security/en/glsa/glsa-200504-13.xml http://www.novell.com/linux/security/advisories/2005_21_sr.html http://www.openoffice.org/issues/show_bug.cgi?id=46388 http://www.redhat.com/support/errata/RHSA-2005-375.html http://www.securityfocus.com/archive/1/395516 http://www.securityfocus.com/bid/13092 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9106 https://access.redhat.com/secur •
CVE-2004-0752
https://notcve.org/view.php?id=CVE-2004-0752
OpenOffice (OOo) 1.1.2 creates predictable directory names with insecure permissions during startup, which may allow local users to read or list files of other users. OpenOffice (OOo) 1.12 crea nombres de directorios predecibles con permisos inseguros durante el inicio, lo que puede permitir a usuarios locales leer o listar ficheros de otros usuarios. • http://marc.info/?l=bugtraq&m=109483308421566&w=2 http://secunia.com/advisories/12302 http://secunia.com/advisories/12546 http://secunia.com/advisories/12668 http://secunia.com/advisories/12914 http://secunia.com/advisories/12932 http://securitytracker.com/id?1011205 http://www.openoffice.org/issues/show_bug.cgi?id=33357 http://www.osvdb.org/9804 http://www.redhat.com/support/errata/RHSA-2004-446.html http://www.securityfocus.com/bid/11151 https://exchange.xforce& •