From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200805-16.xml | 107 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 107 insertions(+) create mode 100644 metadata/glsa/glsa-200805-16.xml (limited to 'metadata/glsa/glsa-200805-16.xml') diff --git a/metadata/glsa/glsa-200805-16.xml b/metadata/glsa/glsa-200805-16.xml new file mode 100644 index 000000000000..082257f56b4a --- /dev/null +++ b/metadata/glsa/glsa-200805-16.xml @@ -0,0 +1,107 @@ + + + + OpenOffice.org: Multiple vulnerabilities + + Multiple vulnerabilities have been reported in OpenOffice.org, possibly + allowing for user-assisted execution of arbitrary code. + + openoffice openoffice-bin + 2008-05-14 + 2008-05-14: 02 + 218080 + remote + + + 2.4.0 + 2.4.0 + + + 2.4.0 + 2.4.0 + + + +

+ OpenOffice.org is an open source office productivity suite, including + word processing, spreadsheet, presentation, drawing, data charting, + formula editing, and file conversion facilities. +

+
+ +

+ iDefense Labs reported multiple vulnerabilities in OpenOffice.org: +

+
    +
  • + multiple heap-based buffer overflows when parsing the "Attribute" and + "Font" Description records of Quattro Pro (QPRO) files + (CVE-2007-5745), +
  • +
  • + an integer overflow when parsing the EMR_STRETCHBLT record of an EMF + file, resulting in a heap-based buffer overflow (CVE-2007-5746), +
  • +
  • + an integer underflow when parsing Quattro Pro (QPRO) files, resulting + in an excessive loop and a stack-based buffer overflow + (CVE-2007-5747), +
  • +
  • + and a heap-based buffer overflow when parsing the + "DocumentSummaryInformation" stream in an OLE file (CVE-2008-0320). +
  • +
+

+ Furthermore, Will Drewry (Google Security) reported vulnerabilities in + the memory management of the International Components for Unicode + (CVE-2007-4770, CVE-2007-4771), which was resolved with GLSA 200803-20. + However, the binary version of OpenOffice.org uses an internal copy of + said library. +

+
+ +

+ A remote attacker could entice a user to open a specially crafted + document, possibly resulting in the remote execution of arbitrary code + with the privileges of the user running OpenOffice.org. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All OpenOffice.org users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.0" +

+ All OpenOffice.org binary users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.0" +
+ + CVE-2007-4770 + CVE-2007-4771 + CVE-2007-5745 + CVE-2007-5746 + CVE-2007-5747 + CVE-2008-0320 + GLSA 200803-20 + + + keytoaster + + + rbu + + + rbu + +
-- cgit v1.2.3