Title: Windows Installer Execution of Arbitrary Code with Elevated Privileges
Announced October 11, 2016
The Apache OpenOffice installer for Windows contained a defective
operation that allows execution of arbitrary code with elevated
The location in which the installer is run may have been previously
poisoned by a file that impersonates a dynamio-link library that
the installer depends upon. The counterfeit is operated instead
because of a search-path defect in the installer. The counterfeit
will be operated under the administrative privileges of the OpenOffice
installer, compromising the user's PC.
There are no known exploits of this vulnerability.
Proof-of-concept demonstrations exist.
Vendor: The Apache Software Foundation
All Apache OpenOffice versions 4.1.2 and older
are affected. OpenOffice.org versions are also
If you are unable to update to 4.1.3, there are other
precautions that can be taken. These precautions are also
recommended as protection against other software that may
have the vulnerability.
When executing .exe installers, ensure that the installer
is in a file folder that has no files but the installer
If an installer proposes a folder to extract the setup
files into before the actual install, choose the name of
a folder that is not in use. Delete such a folder of setup
files after the installation completes successfully. To
reinstall without downloading again, preserve the installer
.exe on private removable storage.