GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Mar 27, 2006 7:26 pm Post subject: [ GLSA 200603-25 ] OpenOffice.org: Heap overflow in included |
|
|
Gentoo Linux Security Advisory
Title: OpenOffice.org: Heap overflow in included libcurl (GLSA 200603-25)
Severity: normal
Exploitable: remote
Date: March 27, 2006
Bug(s): #126433
ID: 200603-25
Synopsis
OpenOffice.org contains a vulnerable version of libcurl that may cause a
heap overflow when parsing URLs.
Background
OpenOffice.org is an office productivity suite, including word
processing, spreadsheet, presentation, data charting, formula editing
and file conversion facilities. libcurl, which is included in
OpenOffice.org, is a free and easy-to-use client-side library for
transferring files with URL syntaxes, supporting numerous protocols.
Affected Packages
Package: app-office/openoffice-bin
Vulnerable: < 2.0.2
Unaffected: >= 2.0.2
Architectures: All supported architectures
Package: app-office/openoffice
Vulnerable: < 2.0.1-r1
Unaffected: >= 2.0.1-r1
Architectures: All supported architectures
Description
OpenOffice.org includes libcurl code. This libcurl code is
vulnerable to a heap overflow when it tries to parse a URL that exceeds
a 256-byte limit (GLSA 200512-09).
Impact
An attacker could entice a user to call a specially crafted URL
with OpenOffice.org, potentially resulting in the execution of
arbitrary code with the rights of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All OpenOffice.org binary users should upgrade to the latest
version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.0.2" |
All OpenOffice.org users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.1-r1" |
References
CVE-2005-4077
Hardened-PHP Advisory 24/2005
GLSA 200512-09
Last edited by GLSA on Mon Jun 10, 2013 4:22 am; edited 4 times in total |
|