In association with heise online

04 January 2007, 14:23

OpenOffice hole allows execution of malicious code in WMF images

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

The developers of OpenOffice have released a patch designed to close a critical hole in the processing of documents containing prepared WMF and EMF images. According to a security bulletin, it is apparently also possible to use this hole to inject arbitrary code into PCs and launch it. The problem is caused by buffer overflows in the functions EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams. However, for the attack to succeed, victims also have to open an infected document, which they might receive, for example, by e-mail.

The patch reportedly remedies the hole in version 1.1.5. But an entry in the flaw database says that version 2.0.4 is also affected. On the other hand, the database also says that the flaw is no longer contained in version 2.1, which was only released three weeks ago. Linux distributors are providing updated OpenOffice suites. Red Hat has categorized this hole as critical and recommends that users install the update for version 1.1.2, which is contained in its distribution, as quickly as possible.

See also:

(trk)

Print Version | Send by email | Permalink: http://h-online.com/-732056
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit