GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Dec 30, 2007 8:26 pm Post subject: [ GLSA 200712-25 ] OpenOffice.org: User-assisted arbitrary c |
|
|
Gentoo Linux Security Advisory
Title: OpenOffice.org: User-assisted arbitrary code execution (GLSA 200712-25)
Severity: normal
Exploitable: remote
Date: December 30, 2007
Bug(s): #200771, #201799
ID: 200712-25
Synopsis
An unspecified vulnerability has been reported in OpenOffice.org, possibly
allowing for the execution of arbitrary code.
Background
OpenOffice.org is an open source office productivity suite, including
word processing, spreadsheet, presentation, drawing, data charting,
formula editing, and file conversion facilities.
Affected Packages
Package: app-office/openoffice
Vulnerable: < 2.3.1
Unaffected: >= 2.3.1
Architectures: All supported architectures
Package: app-office/openoffice-bin
Vulnerable: < 2.3.1
Unaffected: >= 2.3.1
Architectures: All supported architectures
Package: dev-db/hsqldb
Vulnerable: < 1.8.0.9
Unaffected: >= 1.8.0.9
Architectures: All supported architectures
Description
The HSQLDB engine, as used in Openoffice.org, does not properly enforce
restrictions to SQL statements.
Impact
A remote attacker could entice a user to open a specially crafted
document, possibly resulting in the remote execution of arbitrary Java
code with the privileges of the user running OpenOffice.org.
Workaround
There is no known workaround at this time.
Resolution
All OpenOffice.org users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.3.1" |
All OpenOffice.org binary users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.3.1" |
All HSQLDB users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/hsqldb-1.8.0.9" |
References
CVE-2007-4575
Last edited by GLSA on Sun Apr 07, 2013 4:26 am; edited 2 times in total |
|