Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200704-12 ] OpenOffice.org: Multiple vulnerabilities
Date: Mon, 16 Apr 2007 22:36:39
Message-Id: 20070416221812.GD32552@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200704-12
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: OpenOffice.org: Multiple vulnerabilities
9 Date: April 16, 2007
10 Bugs: #170828
11 ID: 200704-12
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been discovered in OpenOffice.org,
19 allowing for remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 OpenOffice.org is an open source office productivity suite, including
25 word processing, spreadsheet, presentation, drawing, data charting,
26 formula editing, and file conversion facilities.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-office/openoffice < 2.1.0-r1 >= 2.1.0-r1
35 2 app-office/openoffice-bin < 2.2.0 >= 2.2.0
36 -------------------------------------------------------------------
37 2 affected packages on all of their supported architectures.
38 -------------------------------------------------------------------
39
40 Description
41 ===========
42
43 John Heasman of NGSSoftware has discovered a stack-based buffer
44 overflow in the StarCalc parser and an input validation error when
45 processing metacharacters in a link. Also OpenOffice.Org includes code
46 from libwpd making it vulnerable to heap-based overflows when
47 converting WordPerfect document tables (GLSA 200704-07).
48
49 Impact
50 ======
51
52 A remote attacker could entice a user to open a specially crafted
53 document, possibly leading to execution of arbitrary code with the
54 rights of the user running OpenOffice.org.
55
56 Workaround
57 ==========
58
59 There is no known workaround at this time.
60
61 Resolution
62 ==========
63
64 All OpenOffice.org users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.1.0-r1"
68
69 All OpenOffice.org binary users should upgrade to the latest version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.2.0"
73
74 References
75 ==========
76
77 [ 1 ] CVE-2007-0002
78 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002
79 [ 2 ] CVE-2007-0238
80 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238
81 [ 3 ] CVE-2007-0239
82 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239
83 [ 4 ] GLSA-200704-07
84 http://www.gentoo.org/security/en/glsa/glsa-200704-07.xml
85
86 Availability
87 ============
88
89 This GLSA and any updates to it are available for viewing at
90 the Gentoo Security Website:
91
92 http://security.gentoo.org/glsa/glsa-200704-12.xml
93
94 Concerns?
95 =========
96
97 Security is a primary focus of Gentoo Linux and ensuring the
98 confidentiality and security of our users machines is of utmost
99 importance to us. Any security concerns should be addressed to
100 security@g.o or alternatively, you may file a bug at
101 http://bugs.gentoo.org.
102
103 License
104 =======
105
106 Copyright 2007 Gentoo Foundation, Inc; referenced text
107 belongs to its owner(s).
108
109 The contents of this document are licensed under the
110 Creative Commons - Attribution / Share Alike license.
111
112 http://creativecommons.org/licenses/by-sa/2.5