Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200701-07 ] OpenOffice.org: EMF/WMF file handling vulnerabilities
Date: Fri, 12 Jan 2007 21:49:44
Message-Id: 20070112211725.GQ23772@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200701-07
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: OpenOffice.org: EMF/WMF file handling vulnerabilities
9 Date: January 12, 2007
10 Bugs: #159951
11 ID: 200701-07
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A truncation error and integer overflows in the EMF/WMF file handling
19 of OpenOffice.org could be exploited to execute arbitrary code.
20
21 Background
22 ==========
23
24 OpenOffice.org is an open source office productivity suite, including
25 word processing, spreadsheet, presentation, drawing, data charting,
26 formula editing, and file conversion facilities.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-office/openoffice-bin < 2.1.0 >= 2.1.0
35 2 app-office/openoffice < 2.0.4 >= 2.0.4
36 -------------------------------------------------------------------
37 2 affected packages on all of their supported architectures.
38 -------------------------------------------------------------------
39
40 Description
41 ===========
42
43 John Heasman of NGSSoftware has discovered integer overflows in the
44 EMR_POLYPOLYGON and EMR_POLYPOLYGON16 processing and an error within
45 the handling of META_ESCAPE records.
46
47 Impact
48 ======
49
50 An attacker could exploit these vulnerabilities to cause heap overflows
51 and potentially execute arbitrary code with the privileges of the user
52 running OpenOffice.org by enticing the user to open a document
53 containing a malicious WMF/EMF file.
54
55 Workaround
56 ==========
57
58 There is no known workaround known at this time.
59
60 Resolution
61 ==========
62
63 All OpenOffice.org binary users should update to version 2.1.0 or
64 later:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.1.0"
68
69 All OpenOffice.org users should update to version 2.0.4 or later:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.4"
73
74 References
75 ==========
76
77 [ 1 ] CVE-2006-5870
78 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870
79
80 Availability
81 ============
82
83 This GLSA and any updates to it are available for viewing at
84 the Gentoo Security Website:
85
86 http://security.gentoo.org/glsa/glsa-200701-07.xml
87
88 Concerns?
89 =========
90
91 Security is a primary focus of Gentoo Linux and ensuring the
92 confidentiality and security of our users machines is of utmost
93 importance to us. Any security concerns should be addressed to
94 security@g.o or alternatively, you may file a bug at
95 http://bugs.gentoo.org.
96
97 License
98 =======
99
100 Copyright 2007 Gentoo Foundation, Inc; referenced text
101 belongs to its owner(s).
102
103 The contents of this document are licensed under the
104 Creative Commons - Attribution / Share Alike license.
105
106 http://creativecommons.org/licenses/by-sa/2.5