USN-121-1: OpenOffice.org vulnerability

Publication date

6 May 2005

Overview

OpenOffice.org vulnerability

Releases


Details

The StgCompObjStream::Load() failed to check the validity of a length
field in documents. If an attacker tricked a user to open a specially
crafted OpenOffice file, this triggered a buffer overflow which could
lead to arbitrary code execution with the privileges of the user
opening the document.

The update for Ubuntu 5.04 (Hoary Hedgehog) also contains a
translation update: The “openoffice.org-l10n-xh” package now contains
actual Xhosa translations (the previous version just shipped English
strings).

The StgCompObjStream::Load() failed to check the validity of a length
field in documents. If an attacker tricked a user to open a specially
crafted OpenOffice file, this triggered a buffer overflow which could
lead to arbitrary code execution with the privileges of the user
opening the document.

The update for Ubuntu 5.04 (Hoary Hedgehog) also contains a
translation update: The “openoffice.org-l10n-xh” package now contains
actual Xhosa translations (the previous version just shipped English
strings).

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
5.04 hoary openoffice.org-l10n-xh – 
openoffice.org-bin – 
4.10 warty openoffice.org-l10n-xh – 
openoffice.org-bin – 

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›