OpenOffice.org is affected by three security vulnerabilities which can be exploited to allow the execution of arbitrary code by a remote attacker.
Package | app-office/openoffice on all architectures |
---|---|
Affected versions | < 2.0.3 |
Unaffected versions | >= 2.0.3 |
Package | app-office/openoffice-bin on all architectures |
---|---|
Affected versions | < 2.0.3 |
Unaffected versions | >= 2.0.3 |
OpenOffice.org is an open source office productivity suite, including word processing, spreadsheet, presentation, drawing, data charting, formula editing, and file conversion facilities.
Internal security audits by OpenOffice.org have discovered three security vulnerabilities related to Java applets, macros and the XML file format parser.
An attacker might exploit these vulnerabilities to escape the Java sandbox, execute arbitrary code or BASIC code with the permissions of the user running OpenOffice.org.
Disabling Java applets will protect against the vulnerability in the handling of Java applets. There are no workarounds for the macro and file format vulnerabilities.
All OpenOffice.org users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.3"
Release date
July 28, 2006
Latest revision
July 28, 2006: 01
Severity
normal
Exploitable
remote
Bugzilla entries