Gentoo Logo Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200805-16 / openoffice openoffice-bin
Release Date May 14, 2008
Latest Revision May 14, 2008: 02
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-office/openoffice < 2.4.0 >= 2.4.0 All supported architectures
app-office/openoffice-bin < 2.4.0 >= 2.4.0 All supported architectures

Related bugreports: #218080


Multiple vulnerabilities have been reported in, possibly allowing for user-assisted execution of arbitrary code.

2.  Impact Information

Background is an open source office productivity suite, including word processing, spreadsheet, presentation, drawing, data charting, formula editing, and file conversion facilities.


iDefense Labs reported multiple vulnerabilities in

  • multiple heap-based buffer overflows when parsing the "Attribute" and "Font" Description records of Quattro Pro (QPRO) files (CVE-2007-5745),
  • an integer overflow when parsing the EMR_STRETCHBLT record of an EMF file, resulting in a heap-based buffer overflow (CVE-2007-5746),
  • an integer underflow when parsing Quattro Pro (QPRO) files, resulting in an excessive loop and a stack-based buffer overflow (CVE-2007-5747),
  • and a heap-based buffer overflow when parsing the "DocumentSummaryInformation" stream in an OLE file (CVE-2008-0320).

Furthermore, Will Drewry (Google Security) reported vulnerabilities in the memory management of the International Components for Unicode (CVE-2007-4770, CVE-2007-4771), which was resolved with GLSA 200803-20. However, the binary version of uses an internal copy of said library.


A remote attacker could entice a user to open a specially crafted document, possibly resulting in the remote execution of arbitrary code with the privileges of the user running

3.  Resolution Information


There is no known workaround at this time.


All users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.0"

All binary users should upgrade to the latest version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.0"

4.  References


Page updated May 14, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.