copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AL-2008.0051 -- [Win][UNIX/Linux] -- OpenOffice Arbitrary Code Execution Vulnerabilities

Date: 18 April 2008
References: ESB-2008.0394  ESB-2008.0395  ESB-2008.0437  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
A  U  S  C  E  R  T                                           A  L  E  R  T

                       AL-2008.0051 -- AUSCERT ALERT
                             [Win][UNIX/Linux]
            OpenOffice Arbitrary Code Execution Vulnerabilities
                               18 April 2008

===========================================================================

        AusCERT Alert Summary
        ---------------------

Product:              openoffice.org prior to 2.4
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-4770 CVE-2007-4771 CVE-2007-5746
                      CVE-2007-5745 CVE-2008-0320
Member content until: Friday, May 16 2008

Original Bulletin:    http://www.openoffice.org/security/bulletin.html


OVERVIEW:

        OpenOffice.org have released version 2.4 fixing multiple 
        vulnerabilities. [1]


IMPACT: 

        Each of the vulnerabilities fixed may result in the execution of 
        arbitrary code.  The specific vulnerabilities remedied by this 
        release are as follows:

        "A security vulnerability with the way OpenOffice.org 2 
         processes ODF text documents with XForms, using the 3rd
         party library ICU, may allow a remote unprivileged user 
         who provides a OpenOffice.org document that is opened by
         a local user to execute arbitrary commands on the system 
         with the privileges of the user running OpenOffice.org.
         No working exploit is known right now." [2]

        "A security vulnerability with the way OpenOffice.org 2 
         processes Quattro Pro files may allow a remote unprivileged 
         user who provides a OpenOffice.org document that is opened
         by a local user to execute arbitrary commands on the system
         with the privileges of the user running OpenOffice.org.
         No working exploit is known right now." [3]

	"A security vulnerability with the way OpenOffice.org 1.1 
         and 2 process EMF files may allow a remote unprivileged
         user who provides a OpenOffice.org document that is opened
         by a local user to execute arbitrary commands on the system
         with the privileges of the user running OpenOffice.org.
         No working exploit is known right now." [4]

        "A security vulnerability with the way OpenOffice.org 1.1 
         and 2 process OLE files may allow a remote unprivileged
         user who provides a OpenOffice.org document that is opened
         by a local user to execute arbitrary commands on the system
         with the privileges of the user running OpenOffice.org.
         No working exploit is known right now." [5]


MITIGATION:

         OpenOffice.Org advise that there is no workaround for these 
         vulnerabilities and users are advised to upgrade to version 
         2.4 [6].


REFERENCES:

        [1] OpenOffice.Org Security Team Bulletin
              http://www.openoffice.org/security/bulletin.html

	[2] CVE-2007-4770/4771: Manipulated ODF text documents containing 
            XForms can lead to heap overflows and arbitrary code execution
              http://www.openoffice.org/security/cves/CVE-2007-4770.html

	[3] CVE-2007-5745/5747: Manipulated Quattro Pro files can lead to 
            heap overflows and arbitrary code execution
              http://www.openoffice.org/security/cves/CVE-2007-5745.html

	[4] CVE-2007-5746: Manipulated EMF files can lead to heap overflows 
            and arbitrary code execution
             http://www.openoffice.org/security/cves/CVE-2007-5746.html

        [5] CVE-2008-0320: Manipulated OLE files can lead to heap overflows 
            and arbitrary code execution
              http://www.openoffice.org/security/cves/CVE-2008-0320.html

        [6] OpenOffice.org Downloads
             http://download.openoffice.org/index.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSAflaih9+71yA2DNAQIjtAP9HC7jnqIARds9Qjlq0IZ4jkxn5XZAoyra
+I3ETqmq3ODjQVlpuC3hAI4GFN5oV+XVvsWgHWbQK7pJEFYWOOQbYY4Pb2Qq+Gsp
4YVRsATuqkBEkqLtX5UY+L2Hnm8QPkYtToqgnawgotNshwvE+RgBBWYJhX7ESlPD
bP378vHhs+U=
=Bb2k
-----END PGP SIGNATURE-----