Gentoo Logo Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200607-12 /
Release Date July 28, 2006
Latest Revision July 28, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-office/openoffice < 2.0.3 >= 2.0.3 All supported architectures
app-office/openoffice-bin < 2.0.3 >= 2.0.3 All supported architectures

Related bugreports: #138545

Synopsis is affected by three security vulnerabilities which can be exploited to allow the execution of arbitrary code by a remote attacker.

2.  Impact Information

Background is an open source office productivity suite, including word processing, spreadsheet, presentation, drawing, data charting, formula editing, and file conversion facilities.


Internal security audits by have discovered three security vulnerabilities related to Java applets, macros and the XML file format parser.

  • Specially crafted Java applets can break through the "sandbox".
  • Specially crafted macros make it possible to inject BASIC code into documents which is executed when the document is loaded.
  • Loading a malformed XML file can cause a buffer overflow.


An attacker might exploit these vulnerabilities to escape the Java sandbox, execute arbitrary code or BASIC code with the permissions of the user running

3.  Resolution Information


Disabling Java applets will protect against the vulnerability in the handling of Java applets. There are no workarounds for the macro and file format vulnerabilities.


All users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.3"

4.  References


Page updated July 28, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.