OpenOffice.org vulnerability when using DAV servers Several format string vulnerabilities are present in the Neon library included in OpenOffice.org, allowing remote execution of arbitrary code when connected to an untrusted WebDAV server. openoffice 2004-05-11 2004-10-27: 02 47926 remote 1.1.1-r1 1.1.1 1.0.3-r2 1.0.3-r1 1.1.0-r4 1.1.0-r3 1.1.51-r1 1.1.51 1.1.2 1.1.2 1.1.52

OpenOffice.org is an office productivity suite, including word processing, spreadsheets, presentations, drawings, data charting, formula editing, and file conversion facilities.

OpenOffice.org includes code from the Neon library in functions related to publication on WebDAV servers. This library is vulnerable to several format string attacks.

If you use the WebDAV publication and connect to a malicious WebDAV server, this server can exploit these vulnerabilities to execute arbitrary code with the rights of the user running OpenOffice.org.

As a workaround, you should not use the WebDAV publication facilities.

There is no Ximian OpenOffice.org binary version including the fix yet. All users of the openoffice-ximian-bin package making use of the WebDAV openoffice-ximian source-based package.

openoffice users on the x86 architecture should:

# emerge sync # emerge -pv ">=app-office/openoffice-1.1.1-r1" # emerge ">=app-office/openoffice-1.1.1-r1"

openoffice users on the sparc architecture should:

# emerge sync # emerge -pv ">=app-office/openoffice-1.1.0-r3" # emerge ">=app-office/openoffice-1.1.0-r3"

openoffice users on the ppc architecture should:

# emerge sync # emerge -pv ">=app-office/openoffice-1.0.3-r1" # emerge ">=app-office/openoffice-1.0.3-r1"

openoffice-ximian users should:

# emerge sync # emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1" # emerge ">=app-office/openoffice-ximian-1.1.51-r1"

openoffice-bin users should:

# emerge sync # emerge -pv ">=app-office/openoffice-bin-1.1.2" # emerge ">=app-office/openoffice-bin-1.1.2"
CAN-2004-0179 Neon vulnerabilities (GLSA 200405-01) koon