OpenOffice.org vulnerability when using DAV servers — GLSA 200405-04 Several format string vulnerabilities are present in the Neon library included in OpenOffice.org, allowing remote execution of arbitrary code when connected to an untrusted WebDAV server. Affected packages Package app-office/openoffice on the x86 architecture Affected versions <= 1.1.1 Unaffected versions >= 1.1.1-r1 Package app-office/openoffice on the ppc architecture Affected versions <= 1.0.3-r1 Unaffected versions >= 1.0.3-r2 Package app-office/openoffice on the sparc architecture Affected versions <= 1.1.0-r3 Unaffected versions >= 1.1.0-r4 Package app-office/openoffice-ximian on all architectures Affected versions <= 1.1.51 Unaffected versions >= 1.1.51-r1 Package app-office/openoffice-bin on all architectures Affected versions < 1.1.2 Unaffected versions >= 1.1.2 Package app-office/openoffice-ximian-bin on all architectures Affected versions <= 1.1.52 Unaffected versions Background OpenOffice.org is an office productivity suite, including word processing, spreadsheets, presentations, drawings, data charting, formula editing, and file conversion facilities. Description OpenOffice.org includes code from the Neon library in functions related to publication on WebDAV servers. This library is vulnerable to several format string attacks. Impact If you use the WebDAV publication and connect to a malicious WebDAV server, this server can exploit these vulnerabilities to execute arbitrary code with the rights of the user running OpenOffice.org. Workaround As a workaround, you should not use the WebDAV publication facilities. Resolution There is no Ximian OpenOffice.org binary version including the fix yet. All users of the openoffice-ximian-bin package making use of the WebDAV openoffice-ximian source-based package. openoffice users on the x86 architecture should: # emerge sync # emerge -pv ">=app-office/openoffice-1.1.1-r1" # emerge ">=app-office/openoffice-1.1.1-r1" openoffice users on the sparc architecture should: # emerge sync # emerge -pv ">=app-office/openoffice-1.1.0-r3" # emerge ">=app-office/openoffice-1.1.0-r3" openoffice users on the ppc architecture should: # emerge sync # emerge -pv ">=app-office/openoffice-1.0.3-r1" # emerge ">=app-office/openoffice-1.0.3-r1" openoffice-ximian users should: # emerge sync # emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1" # emerge ">=app-office/openoffice-ximian-1.1.51-r1" openoffice-bin users should: # emerge sync # emerge -pv ">=app-office/openoffice-bin-1.1.2" # emerge ">=app-office/openoffice-bin-1.1.2" References CAN-2004-0179 Neon vulnerabilities (GLSA 200405-01)