[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:056 -- Mandriva openoffice.org

ID: oval:org.secpod.oval:def:300064Date: (C)2012-01-07   (M)2021-11-24
Class: PATCHFamily: unix




This update provides the OpenOffice.org 3.0 major version and holds the security fixes for the following issues: An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document leading to a heap-based buffer overflow . An heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document related to table parsing. Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file . OpenOffice"s xmlsec uses a bundled Libtool which might load .la file in the current working directory allowing local users to gain privileges via a Trojan horse file. For enabling such vulnerability xmlsec has to use --enable-crypto_dl building flag however it does not, although the fix keeps protected against this threat whenever that flag had been enabled . Additional packages are also being provided due to dependencies. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers.

Platform:
Mandriva Linux 2008.0
Product:
openoffice.org
Reference:
MDVSA-2010:056
CVE-2009-3736
CVE-2009-2140
CVE-2009-0201
CVE-2009-0200
CVE    4
CVE-2009-0201
CVE-2009-0200
CVE-2009-2140
CVE-2009-3736
...
CPE    1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies