Date: Thu, 29 Mar 2007 16:07:06 -0400
From: Foresight Linux Essential Announcement Service <foresight-security-noreply@foresightlinux.org.>
To: [email protected]Subject: FLEA-2007-0004-1: openoffice.org
References: <45EF374E.1090207@foresightlinux.org.> <45EF8D85.3050102@moritz-naumann.com.>
In-Reply-To: <45EF8D85.3050102@moritz-naumann.com.>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru
Foresight Linux Essential Advisory: 2007-0004-1
Published: 2007-03-29
Rating: Moderate
Updated Versions:
openoffice.org=/conary.rpath.com@rpl:devel//1//foresight.rpath.org@fl:1-devel//1/2.2.0-0.0.5-1
group-dist=/foresight.rpath.org@fl:1-devel//1/1.1-0.11-2
References:
https://issues.foresightlinux.org/browse/FL-211
http://www.openoffice.org/security/CVE-2007-0239.htmlhttp://www.openoffice.org/security/CVE-2007-0238.htmlhttp://www.openoffice.org/security/CVE-2007-2.html
Description:
Previous versions of openoffice.org were vulnerable to multiple
issues which could be exploited to execute arbitrary code at the
permission level of the user running openoffice (usually non-root).
Attack vectors include coercing a user into opening a URL which contains
an exploit, coercing the user into opening a vulnerable WordPerfect file
(via bundled libwpd), and coercing a user into opening a vulnerable
StarCalc document.