GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Feb 08, 2015 1:26 am Post subject: [ GLSA 201502-09 ] Antiword |
|
|
Gentoo Linux Security Advisory
Title: Antiword: User-assisted execution of arbitrary code (GLSA 201502-09)
Severity: normal
Exploitable: remote
Date: February 07, 2015
Bug(s): #531404
ID: 201502-09
Synopsis
A buffer overflow vulnerability in Antiword could result in
execution of arbitrary code or Denial of Service.
Background
Antiword is a free MS Word reader.
Affected Packages
Package: app-text/antiword
Vulnerable: < 0.37-r1
Unaffected: >= 0.37-r1
Architectures: All supported architectures
Description
A buffer overflow vulnerability has been found in wordole.c in Antiword.
Impact
A remote attacker could entice a user to open a specially crafted
document using Antiword, possibly resulting in execution of arbitrary
code with the privileges of the process or a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Antiword users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/antiword-0.37-r1"
|
References
CVE-2014-8123
Last edited by GLSA on Thu Jun 18, 2015 4:16 am; edited 1 time in total |
|