GLSA Bodhisattva


Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Tue May 11, 2004 10:02 pm Post subject: [ GLSA 200405-04 ] OpenOffice.org vulnerability when using D |
|
|
Gentoo Linux Security Advisory
Title: OpenOffice.org vulnerability when using DAV servers (GLSA 200405-04)
Severity: high
Exploitable: remote
Date: May 11, 2004
Updated: October 27, 2004
Bug(s): #47926
ID: 200405-04
Synopsis
Several format string vulnerabilities are present in the Neon library
included in OpenOffice.org, allowing remote execution of arbitrary code
when connected to an untrusted WebDAV server.
Background
OpenOffice.org is an office productivity suite, including word processing,
spreadsheets, presentations, drawings, data charting, formula editing, and
file conversion facilities.
Affected Packages
Package: app-office/openoffice
Vulnerable: <= 1.1.1
Unaffected: >= 1.1.1-r1
Architectures: x86
Package: app-office/openoffice
Vulnerable: <= 1.0.3-r1
Unaffected: >= 1.0.3-r2
Architectures: ppc
Package: app-office/openoffice
Vulnerable: <= 1.1.0-r3
Unaffected: >= 1.1.0-r4
Architectures: sparc
Package: app-office/openoffice-ximian
Vulnerable: <= 1.1.51
Unaffected: >= 1.1.51-r1
Architectures: All supported architectures
Package: app-office/openoffice-bin
Vulnerable: < 1.1.2
Unaffected: >= 1.1.2
Architectures: All supported architectures
Package: app-office/openoffice-ximian-bin
Vulnerable: <= 1.1.52
Architectures: All supported architectures
Description
OpenOffice.org includes code from the Neon library in functions related to
publication on WebDAV servers. This library is vulnerable to several format
string attacks.
Impact
If you use the WebDAV publication and connect to a malicious WebDAV server,
this server can exploit these vulnerabilities to execute arbitrary code
with the rights of the user running OpenOffice.org.
Workaround
As a workaround, you should not use the WebDAV publication facilities.
Resolution
There is no Ximian OpenOffice.org binary version including the fix yet. All
users of the openoffice-ximian-bin package making use of the WebDAV
openoffice-ximian source-based package.
openoffice users on the x86 architecture should:
Code: | # emerge sync
# emerge -pv ">=app-office/openoffice-1.1.1-r1"
# emerge ">=app-office/openoffice-1.1.1-r1" |
openoffice users on the sparc architecture should:
Code: | # emerge sync
# emerge -pv ">=app-office/openoffice-1.1.0-r3"
# emerge ">=app-office/openoffice-1.1.0-r3" |
openoffice users on the ppc architecture should:
Code: | # emerge sync
# emerge -pv ">=app-office/openoffice-1.0.3-r1"
# emerge ">=app-office/openoffice-1.0.3-r1" |
openoffice-ximian users should:
Code: | # emerge sync
# emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1"
# emerge ">=app-office/openoffice-ximian-1.1.51-r1" |
openoffice-bin users should:
Code: | # emerge sync
# emerge -pv ">=app-office/openoffice-bin-1.1.2"
# emerge ">=app-office/openoffice-bin-1.1.2" |
References
CAN-2004-0179
Neon vulnerabilities (GLSA 200405-01)
Last edited by GLSA on Mon Jun 10, 2013 4:16 am; edited 6 times in total |
|