OpenOffice.org contains a vulnerable version of libcurl that may cause a heap overflow when parsing URLs.
Package | app-office/openoffice-bin on all architectures |
---|---|
Affected versions | < 2.0.2 |
Unaffected versions | >= 2.0.2 |
Package | app-office/openoffice on all architectures |
---|---|
Affected versions | < 2.0.1-r1 |
Unaffected versions | >= 2.0.1-r1 |
OpenOffice.org is an office productivity suite, including word processing, spreadsheet, presentation, data charting, formula editing and file conversion facilities. libcurl, which is included in OpenOffice.org, is a free and easy-to-use client-side library for transferring files with URL syntaxes, supporting numerous protocols.
OpenOffice.org includes libcurl code. This libcurl code is vulnerable to a heap overflow when it tries to parse a URL that exceeds a 256-byte limit (GLSA 200512-09).
An attacker could entice a user to call a specially crafted URL with OpenOffice.org, potentially resulting in the execution of arbitrary code with the rights of the user running the application.
There is no known workaround at this time.
All OpenOffice.org binary users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.0.2"
All OpenOffice.org users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.1-r1"
Release date
March 27, 2006
Latest revision
March 27, 2006: 01
Severity
normal
Exploitable
remote
Bugzilla entries