|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200603-25] OpenOffice.org: Heap overflow in included libcurl Vulnerability Scan
Vulnerability Scan Summary OpenOffice.org: Heap overflow in included libcurl
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200603-25
(OpenOffice.org: Heap overflow in included libcurl)
OpenOffice.org includes libcurl code. This libcurl code is
vulnerable to a heap overflow when it tries to parse a URL that exceeds
a 256-byte limit (GLSA 200512-09).
Impact
A possible hacker could entice a user to call a specially crafted URL
with OpenOffice.org, potentially resulting in the execution of
arbitrary code with the rights of the user running the application.
Workaround
There is no known workaround at this time.
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077
http://www.hardened-php.net/advisory_242005.109.html
http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml
Solution:
All OpenOffice.org binary users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.0.2"
All OpenOffice.org users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.1-r1"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|