MDVSA-2010:056 -- Mandriva openoffice.org
|ID: oval:org.secpod.oval:def:300064||Date: (C)2012-01-07 (M)2017-10-04|
|Class: PATCH||Family: unix|
This update provides the OpenOffice.org 3.0 major version and holds the security fixes for the following issues: An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document leading to a heap-based buffer overflow . An heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document related to table parsing. Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file . OpenOffice"s xmlsec uses a bundled Libtool which might load .la file in the current working directory allowing local users to gain privileges via a Trojan horse file. For enabling such vulnerability xmlsec has to use --enable-crypto_dl building flag however it does not, although the fix keeps protected against this threat whenever that flag had been enabled . Additional packages are also being provided due to dependencies. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers.
|Mandriva Linux 2008.0|