Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200603-25] OpenOffice.org: Heap overflow in included libcurl


Vulnerability Assessment Details

[GLSA-200603-25] OpenOffice.org: Heap overflow in included libcurl

Vulnerability Assessment Summary
OpenOffice.org: Heap overflow in included libcurl

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200603-25
(OpenOffice.org: Heap overflow in included libcurl)


OpenOffice.org includes libcurl code. This libcurl code is
vulnerable to a heap overflow when it tries to parse a URL that exceeds
a 256-byte limit (GLSA 200512-09).

Impact

A possible hacker could entice a user to call a specially crafted URL
with OpenOffice.org, potentially resulting in the execution of
arbitrary code with the rights of the user running the application.

Workaround

There is no known workaround at this time.

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077
http://www.hardened-php.net/advisory_242005.109.html
http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml


Solution:
All OpenOffice.org binary users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.0.2"
All OpenOffice.org users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.1-r1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

TWO - Areca ARC1210 4 port SATA II RAID Controllers USED AS-IS
$9.99
TWO - Areca ARC1210 4 port SATA II RAID Controllers USED AS-IS   pictureIntel RMS25PB080N 16 Port PCI-e 3.0 x8 6.0Gb/s SATA/SAS Integrated RAID Module
$269.95
Intel RMS25PB080N 16 Port PCI-e 3.0 x8 6.0Gb/s SATA/SAS Integrated RAID Module pictureBOÎTE FANTEC SQ-X2RU3e 2 DOUBLE DISQUE DUR 3.0 eSATA RAID PROTECTION DONNÉES
$344.38
BOÎTE FANTEC SQ-X2RU3e 2 DOUBLE DISQUE DUR 3.0 eSATA RAID PROTECTION DONNÉES pictureBOÎTE FANTEC QB-35US3R 4 DISQUE DUR USB 3.0 eSATA RAID PROTECTION DONNÉES NAS
$350.52
BOÎTE FANTEC QB-35US3R 4 DISQUE DUR USB 3.0 eSATA RAID PROTECTION DONNÉES NAS picture


Discussions

No Discussions have been posted on this vulnerability.