Vulnerability Details : CVE-2005-0941
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-0941
Probability of exploitation activity in the next 30 days: 3.94%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-0941
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2005-0941
-
http://www.redhat.com/support/errata/RHSA-2005-375.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9106
-
http://www.gentoo.org/security/en/glsa/glsa-200504-13.xml
-
http://www.openoffice.org/issues/show_bug.cgi?id=46388
- http://www.novell.com/linux/security/advisories/2005_21_sr.html
-
http://www.securityfocus.com/archive/1/395516
-
http://www.securityfocus.com/bid/13092
Products affected by CVE-2005-0941
- cpe:2.3:a:openoffice:openoffice:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openoffice:openoffice:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:openoffice:openoffice:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:openoffice:openoffice:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openoffice:openoffice:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:openoffice:openoffice:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:openoffice:openoffice:1.1.4:*:*:*:*:*:*:*