A buffer overflow in o3read allows an attacker to execute arbitrary code by way of a specially crafted XML file.
Package | app-text/o3read on all architectures |
---|---|
Affected versions | <= 0.0.3 |
Unaffected versions | >= 0.0.4 |
o3read is a standalone converter for OpenOffice.org files. It allows a user to dump the contents tree (o3read) and convert to plain text (o3totxt) or to HTML (o3tohtml) Writer and Calc files.
Wiktor Kopec discovered that the parse_html function in o3read.c copies any number of bytes into a 1024-byte t[] array.
Using a specially crafted file, possibly delivered by e-mail or over the Web, an attacker may execute arbitrary code with the permissions of the user running o3read.
There is no known workaround at this time.
All o3read users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-text/o3read-0.0.4"
Release date
January 11, 2005
Latest revision
January 11, 2005: 01
Severity
normal
Exploitable
remote
Bugzilla entries