Gentoo Logo

OpenOffice.org: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200607-12 / OpenOffice.org
Release Date July 28, 2006
Latest Revision July 28, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-office/openoffice < 2.0.3 >= 2.0.3 All supported architectures
app-office/openoffice-bin < 2.0.3 >= 2.0.3 All supported architectures

Related bugreports: #138545

Synopsis

OpenOffice.org is affected by three security vulnerabilities which can be exploited to allow the execution of arbitrary code by a remote attacker.

2.  Impact Information

Background

OpenOffice.org is an open source office productivity suite, including word processing, spreadsheet, presentation, drawing, data charting, formula editing, and file conversion facilities.

Description

Internal security audits by OpenOffice.org have discovered three security vulnerabilities related to Java applets, macros and the XML file format parser.

  • Specially crafted Java applets can break through the "sandbox".
  • Specially crafted macros make it possible to inject BASIC code into documents which is executed when the document is loaded.
  • Loading a malformed XML file can cause a buffer overflow.

Impact

An attacker might exploit these vulnerabilities to escape the Java sandbox, execute arbitrary code or BASIC code with the permissions of the user running OpenOffice.org.

3.  Resolution Information

Workaround

Disabling Java applets will protect against the vulnerability in the handling of Java applets. There are no workarounds for the macro and file format vulnerabilities.

Resolution

All OpenOffice.org users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.3"

4.  References



Print

Page updated July 28, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.