[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77982

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:035 -- Mandriva openoffice.org

ID: oval:org.secpod.oval:def:300351Date: (C)2012-01-07   (M)2017-10-04
Class: PATCHFamily: unix




This updates provides a new OpenOffice.org version 3.1.1. It holds security and bug fixes described as follow: An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow . A heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to table parsing . A heap-based buffer overflow allows remote attackers to execute arbitrary code via a crafted EMF file . Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file . OpenOffice"s xmlsec uses a bundled Libtool which might load .la file in the current working directory allowing local users to gain privileges via a Trojan horse file. For enabling such vulnerability xmlsec has to use --enable-crypto_dl building flag however it does not, although the fix keeps protected against this threat whenever that flag had been enabled . Further this update provides following bug fixes: OpenOffice.org is not properly configure to use the xdg-email functionality of the FreeDesktop standard . As the template desktop icons are not properly set, it"s not presented under the context menu of applications like Dolphin . The Firefox plugin which enables viewing of OpenOffice documents inside the browser was not enabled.

Platform:
Mandriva Linux 2009.1
Product:
openoffice.org
Reference:
MDVSA-2010:035
CVE-2009-3736
CVE-2009-2140
CVE-2009-2139
CVE-2009-0201
CVE-2009-0200
CVE    5
CVE-2009-2140
CVE-2009-2139
CVE-2009-3736
CVE-2009-0201
...

© 2013 SecPod Technologies