USN-949-1: OpenOffice.org vulnerability

Publication date

8 June 2010

Overview

OpenOffice.org could be made to run programs as your login if it opened a specially crafted document and examined the included macros.


Packages

Details

Marc Schoenefeld discovered that OpenOffice.org would run document macros
from the macro browser, even when macros were disabled. If a user were
tricked into opening a specially crafted document and examining a macro,
a remote attacker could execute arbitrary code with user privileges.

Marc Schoenefeld discovered that OpenOffice.org would run document macros
from the macro browser, even when macros were disabled. If a user were
tricked into opening a specially crafted document and examining a macro,
a remote attacker could execute arbitrary code with user privileges.

Update instructions

After a standard system update you need to restart OpenOffice.org to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
9.10 karmic openoffice.org-base-core –  1:3.1.1-5ubuntu1.2
9.04 jaunty openoffice.org-base-core –  1:3.0.1-9ubuntu3.3
8.04 hardy openoffice.org-base-core –  1:2.4.1-1ubuntu2.4
10.04 lucid openoffice.org-base-core –  1:3.2.0-7ubuntu4.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›