|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2007:0055|
|Summary:||Redhat Security Advisory RHSA-2007:0055|
The remote host is missing updates announced in
libwpd is a library for reading and converting Word Perfect documents.
iDefense reported several overflow bugs in libwpd. An attacker could
create a carefully crafted Word Perfect file that could cause an
application linked with libwpd, such as OpenOffice, to crash or possibly
execute arbitrary code if the file was opened by a victim. (CVE-2007-0002)
All users are advised to upgrade to these updated packages, which contain a
backported fix for this issue.
Red Hat would like to thank Fridrich Štrba for alerting us to these issues
and providing a patch.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : Critical
Common Vulnerability Exposure (CVE) ID: CVE-2007-0002|
Bugtraq: 20070316 rPSA-2007-0057-1 libwpd (Google Search)
Debian Security Information: DSA-1268 (Google Search)
Debian Security Information: DSA-1270 (Google Search)
SuSE Security Announcement: SUSE-SA:2007:023 (Google Search)
BugTraq ID: 23006
|Copyright||Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.