Short Name |
HTTP:STC:DL:WORD-SPRMTSETBRC |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
OpenOffice.org Microsoft Word File sprmTSetBrc Processing Buffer Overflow |
Release Date |
2010/10/13 |
Update Number |
1791 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in OpenOffice. It is due to an error when processing sprmTSetBrc records in Microsoft Word files. A remote unauthenticated attacker can leverage this by enticing a target user to open a malicious Microsoft Word file with a vulnerable version of the application. In a successful attack, a buffer overflow can lead to arbitrary code execution within the security context of the currently logged on user. In an unsuccessful attack, the target application can terminate abnormally.
OpenOffice is prone to multiple remote code-execution vulnerabilities because of errors in processing certain files. Remote attackers can exploit these issues by enticing victims into opening maliciously crafted files. Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in a denial of service. Versions prior to OpenOffice 3.2 are vulnerable.