Descripción: | Description:
The remote host is missing updates announced in advisory RHSA-2007:0033.
OpenOffice.org is an office productivity suite that includes desktop applications such as a word processor, spreadsheet, presentation manager, formula editor, and drawing program.
iDefense reported an integer overflow flaw in libwpd, a library used internally to OpenOffice.org for handling Word Perfect documents. An attacker could create a carefully crafted Word Perfect file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-1466)
John Heasman discovered a stack overflow in the StarCalc parser in OpenOffice.org. An attacker could create a carefully crafted StarCalc file that could cause OpenOffice.org to crash or possibly execute arbitrary code if the file was opened by a victim. (CVE-2007-0238)
Flaws were discovered in the way OpenOffice.org handled hyperlinks. An attacker could create an OpenOffice.org document which could run commands if a victim opened the file and clicked on a malicious hyperlink. (CVE-2007-0239)
All users of OpenOffice.org are advised to upgrade to these updated packages, which contain backported fixes for these issues.
Red Hat would like to thank Fridrich Å trba for alerting us to the issue CVE-2007-1466 and providing a patch, and John Heasman for CVE-2007-0238.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2007-0033.html http://www.redhat.com/security/updates/classification/#important
Risk factor : Critical
CVSS Score: 9.3
|