GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Jul 09, 2008 9:26 pm Post subject: [ GLSA 200807-05 ] OpenOffice.org: User-assisted execution o |
|
|
Gentoo Linux Security Advisory
Title: OpenOffice.org: User-assisted execution of arbitrary code (GLSA 200807-05)
Severity: normal
Exploitable: remote
Date: July 09, 2008
Bug(s): #225723
ID: 200807-05
Synopsis
An integer overflow vulnerability has been reported in OpenOffice.org.
Background
OpenOffice.org is an open source office productivity suite, including
word processing, spreadsheet, presentation, drawing, data charting,
formula editing, and file conversion facilities.
Affected Packages
Package: app-office/openoffice
Vulnerable: < 2.4.1
Unaffected: >= 2.4.1
Architectures: All supported architectures
Package: app-office/openoffice-bin
Vulnerable: < 2.4.1
Unaffected: >= 2.4.1
Architectures: All supported architectures
Description
Sean Larsson (iDefense Labs) reported an integer overflow in the
function rtl_allocateMemory() in the file
sal/rtl/source/alloc_global.c.
Impact
A remote attacker could entice a user to open a specially crafted
document, possibly resulting in the remote execution of arbitrary code
with the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All OpenOffice.org users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.1" |
All OpenOffice.org binary users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.1" |
References
CVE-2008-2152
Last edited by GLSA on Mon Aug 04, 2014 4:27 am; edited 4 times in total |
|