Rene Engelhard uploaded new packages for openoffice.org which
fixed the following security updates:
CVE-2009-0200
Dyon Balding of Secunia Research has discovered a vulnerability,
which can be exploited by opening a specially crafted Microsoft
Word document.
When reading a Microsoft Word document, a bug in the parser of
sprmTDelete records can result in an integer underflow that may
lead to heap-based buffer overflows.
Successful exploitation may allow arbitrary code execution in the
context of the OpenOffice.org process.
CVE-2009-0201
Dyon Balding of Secunia Research has discovered a vulnerability,
which can be exploited by opening a specially crafted Microsoft
Word document.
When reading a Microsoft Word document, a bug in the parser of
sprmTDelete records can result in heap-based buffer overflows.
Successful exploitation may allow arbitrary code execution in the
context of the OpenOffice.org process.
For the lenny-backports distribution these problems have been fixed in
version 3.1.1-1~bpo50+1.
For the stable distribution (lenny) these problems have been fixed in
version 2.4.1+dfsg-1+lenny3 and higher.
For the unstable (sid) and testing (squeeze) distribution these
problems have been fixed in version 3.1.1~ooo310m15-1.
If you don't use pinning
(http://backports.org/dokuwiki/doku.php?id=instructions) you have to
update the package manually via apt-get -t lenny-backports install
<packagename>.
We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically.
Package: *
Pin: release a=lenny-backports
Pin-Priority: 200
Attachment:
signature.asc
Description: Digital signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 999 | all | openoffice.org | <Β 3.1.1~ooo310m15-1 | openoffice.org_3.1.1~ooo310m15-1_all.deb |
Debian | 5 | all | openoffice.org | <Β 2.4 | openoffice.org_2.4_all.deb |
Debian | 6 | all | openoffice.org | <Β 3.1.1~ooo310m15-1 | openoffice.org_3.1.1~ooo310m15-1_all.deb |