|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2008:0538|
The remote host is missing updates announced in
OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation manager,
formula editor, and drawing program.
Sean Larsson found a heap overflow flaw in the OpenOffice memory allocator.
If a carefully crafted file was opened by a victim, an attacker could use
the flaw to crash OpenOffice.org or, possibly, execute arbitrary code.
It was discovered that certain libraries in the Red Hat Enterprise Linux 3
and 4 openoffice.org packages had an insecure relative RPATH (runtime
library search path) set in the ELF (Executable and Linking Format) header.
A local user able to convince another user to run OpenOffice in an
attacker-controlled directory, could run arbitrary code with the privileges
of the victim. (CVE-2008-2366)
All users of openoffice.org are advised to upgrade to these updated
packages, which contain backported fixes which correct these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : Critical
Common Vulnerability Exposure (CVE) ID: CVE-2008-2152|
BugTraq ID: 29622
XForce ISS Database: openoffice-rtlallocatememory-bo(42957)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2366
BugTraq ID: 29695
XForce ISS Database: redhat-ooo-buildscript-code-execution(43322)
|Copyright||Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.