GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Jul 02, 2007 10:26 pm Post subject: [ GLSA 200707-02 ] OpenOffice.org: Two buffer overflows |
|
|
Gentoo Linux Security Advisory
Title: OpenOffice.org: Two buffer overflows (GLSA 200707-02)
Severity: normal
Exploitable: remote
Date: July 02, 2007
Bug(s): #181773
ID: 200707-02
Synopsis
Multiple vulnerabilities have been discovered in OpenOffice.org, allowing
for the remote execution of arbitrary code.
Background
OpenOffice.org is an open source office productivity suite, including
word processing, spreadsheet, presentation, drawing, data charting,
formula editing, and file conversion facilities.
Affected Packages
Package: app-office/openoffice
Vulnerable: < 2.2.1
Unaffected: >= 2.2.1
Architectures: All supported architectures
Package: app-office/openoffice-bin
Vulnerable: < 2.2.1
Unaffected: >= 2.2.1
Architectures: All supported architectures
Description
John Heasman of NGSSoftware has discovered a heap-based buffer overflow
when parsing the "prdata" tag in RTF files where the first token is
smaller than the second one (CVE-2007-0245). Additionally, the
OpenOffice binary program is shipped with a version of FreeType that
contains an integer signedness error in the n_points variable in file
truetype/ttgload.c, which was covered by GLSA 200705-22
(CVE-2007-2754).
Impact
A remote attacker could entice a user to open a specially crafted
document, possibly leading to execution of arbitrary code with the
rights of the user running OpenOffice.org.
Workaround
There is no known workaround at this time.
Resolution
All OpenOffice.org users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.2.1" |
All OpenOffice.org binary users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.2.1" |
References
CVE-2007-0245
CVE-2007-2754
GLSA 200705-22
Last edited by GLSA on Mon Jun 10, 2013 4:25 am; edited 1 time in total |
|