- Issued:
- 2007-03-22
- Updated:
- 2007-03-22
RHSA-2007:0033 - Security Advisory
Synopsis
Important: openoffice.org security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openoffice.org packages to correct security issues are now
available for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Description
OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation manager,
formula editor, and drawing program.
iDefense reported an integer overflow flaw in libwpd, a library used
internally to OpenOffice.org for handling Word Perfect documents. An
attacker could create a carefully crafted Word Perfect file that could
cause OpenOffice.org to crash or possibly execute arbitrary code if the
file was opened by a victim. (CVE-2007-1466)
John Heasman discovered a stack overflow in the StarCalc parser in
OpenOffice.org. An attacker could create a carefully crafted StarCalc file
that could cause OpenOffice.org to crash or possibly execute arbitrary code
if the file was opened by a victim. (CVE-2007-0238)
Flaws were discovered in the way OpenOffice.org handled hyperlinks. An
attacker could create an OpenOffice.org document which could run commands
if a victim opened the file and clicked on a malicious hyperlink.
(CVE-2007-0239)
All users of OpenOffice.org are advised to upgrade to these updated
packages, which contain backported fixes for these issues.
Red Hat would like to thank Fridrich Štrba for alerting us to the issue
CVE-2007-1466 and providing a patch, and John Heasman for
CVE-2007-0238.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Workstation 3 x86_64
- Red Hat Enterprise Linux Workstation 3 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux Desktop 3 x86_64
- Red Hat Enterprise Linux Desktop 3 i386
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 223801 - CVE-2007-1466 integer overflow
- BZ - 226966 - CVE-2007-0238 StarCalc overflow
- BZ - 228008 - CVE-2007-0239 hyperlink escaping issue
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
openoffice.org-1.1.5-10.6.0.EL4.src.rpm | SHA-256: 3df852b7360c64ba506361afd6e2e8ceb3db6abaa42db708ee6594653f33351f |
x86_64 | |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
i386 | |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-kde-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: dd0bfc6ebbf9be888b9664d406aeb6f2375e38d32bc514ed79a5873f68529c1e |
openoffice.org-kde-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: dd0bfc6ebbf9be888b9664d406aeb6f2375e38d32bc514ed79a5873f68529c1e |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
Red Hat Enterprise Linux Server 3
SRPM | |
---|---|
x86_64 | |
i386 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
openoffice.org-1.1.5-10.6.0.EL4.src.rpm | SHA-256: 3df852b7360c64ba506361afd6e2e8ceb3db6abaa42db708ee6594653f33351f |
x86_64 | |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
i386 | |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-kde-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: dd0bfc6ebbf9be888b9664d406aeb6f2375e38d32bc514ed79a5873f68529c1e |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
Red Hat Enterprise Linux Workstation 3
SRPM | |
---|---|
x86_64 | |
i386 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
openoffice.org-1.1.5-10.6.0.EL4.src.rpm | SHA-256: 3df852b7360c64ba506361afd6e2e8ceb3db6abaa42db708ee6594653f33351f |
x86_64 | |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
i386 | |
openoffice.org-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: d3523efaaf19306625caa19d864aadd05c25816a3063e71e9dacc5ff589956b6 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: f12c33065b3338f363b755de1cd693d4cb40ecbad5a5262cd07e23d097b4e421 |
openoffice.org-kde-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: dd0bfc6ebbf9be888b9664d406aeb6f2375e38d32bc514ed79a5873f68529c1e |
openoffice.org-libs-1.1.5-10.6.0.EL4.i386.rpm | SHA-256: 4db6ea9f82d8d28f55eb2b5b2ed75aa935ad740a92f6f711bfa581420cab0760 |
Red Hat Enterprise Linux Desktop 3
SRPM | |
---|---|
x86_64 | |
i386 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
openoffice.org-1.1.5-10.6.0.EL4.src.rpm | SHA-256: 3df852b7360c64ba506361afd6e2e8ceb3db6abaa42db708ee6594653f33351f |
ppc | |
openoffice.org-1.1.5-10.6.0.EL4.ppc.rpm | SHA-256: 9aef1c5b8f827d5e2b656740a059c8461e2369c9dd57e9e0de9ddf04bb42c652 |
openoffice.org-i18n-1.1.5-10.6.0.EL4.ppc.rpm | SHA-256: a2c9d7cf89733d26666b599d27593f856a3e1878eb303989336bf27fef40771a |
openoffice.org-kde-1.1.5-10.6.0.EL4.ppc.rpm | SHA-256: 1fdeb9612fe81490bd83aef585176fa9d55c6e96b06290015cd1bd146ea2b015 |
openoffice.org-libs-1.1.5-10.6.0.EL4.ppc.rpm | SHA-256: 9e8ccc19fec8bc6d432f8b014474c31b21df9cc521cf1eace976023e222ffe17 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.