Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

OpenOffice.org reveals security hole
CNET News.com ^ | April 14, 2005 | Matt Hines

Posted on 04/14/2005 4:35:53 PM PDT by general_re

The 'relatively serious' flaw could allow remote execution of malicious code on computers running OpenOffice. A patch is said to be imminent

OpenOffice.org has confirmed a buffer overflow issue that could allow remote attacks.

The problem in its freely distributed productivity applications has been fixed, the organisation said late on Tuesday. Representatives said the group hoped to release a patch within the following 48 hours.

The flaw, first discovered in late March, according to postings on the group's Web site, is present in OpenOffice Version 1.1.4 and the OpenOffice Version 2.0 beta release of the applications, as well as in earlier versions of those products.

According to the OpenOffice site, the flaw was found in one specific function of the software and could be exploited by files designed to take advantage of the vulnerability. OpenOffice.org said the flaw may have allowed for remote execution of malicious code on computers running the affected OpenOffice applications.

Security researchers following the issue rated the flaw as relatively serious, with Secunia labeling the vulnerability as "moderately critical," its rating for issues that can compromise systems but that require user interaction in order to be exploited.

The flaw has now been effectively addressed by eliminating coding bugs that created the vulnerability, according to members of the OpenOffice community, the group of open-source software developers that contributes to the expansion of the software.

In an e-mail sent to ZDNet UK's sister site News.com, Louis Suarez-Potts, community manager for OpenOffice, said that work on a fix for the buffer overflow vulnerability was completed on Tuesday. Suarez-Potts said OpenOffice is testing the security update and plans to distribute the remedy by Wednesday at the latest. Future versions of the group's software will include the fix, he said.

The ability of OpenOffice software users to fix problems on the fly has been highlighted by the group as one of the advantages of its applications. The open-source development model allows collaborators to view code and submit changes such as bug fixes or enhancements. Rival Microsoft typically issues security patch updates for its Windows products once a month.


TOPICS: Business/Economy; Miscellaneous; News/Current Events; Technical
KEYWORDS: linux; openoffice; patch; security; truthinadvertising; ultimate; wideopenoffice
Oops.
1 posted on 04/14/2005 4:35:54 PM PDT by general_re
[ Post Reply | Private Reply | View Replies]

To: general_re

You should use Microsoft Word instead. That's never had any security holes :-)


2 posted on 04/14/2005 4:46:57 PM PDT by mhx
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re

The boys at Secunia are really doing a great service by looking for these security exploits. Good job, guys!


3 posted on 04/14/2005 4:47:27 PM PDT by Terpfen (New Democrat Party motto: les enfant terribles)
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re

A fix out in 48 hours.

Microsoft doesn't even get their first denial out within 48 hours!


4 posted on 04/14/2005 5:04:35 PM PDT by flashbunny (Any discussion involving cats apparently requires the abandonment of logic by cat lovers.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re

[ crickets chirping ]


5 posted on 04/14/2005 5:05:09 PM PDT by clyde asbury (The wheel in the sky keeps on turning.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: flashbunny
A fix out in 48 hours.

48 hours from the article being published, not 48 hours from when it was discovered.

6 posted on 04/14/2005 5:14:41 PM PDT by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 4 | View Replies]

To: general_re

Buffer overflow exploit? Why the heck does a word processor need a network listener?


7 posted on 04/14/2005 5:18:12 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

You don't need network access for a buffer overflow - the article isn't particularly clear, but this one is exploited by loading a maliciously constructed document. No need for remote access to smash the stack. Still have to get someone to open the document, of course, but that's a social engineering exercise.


8 posted on 04/14/2005 5:24:08 PM PDT by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 7 | View Replies]

To: ShadowAce

Ping


9 posted on 04/14/2005 5:26:08 PM PDT by KoRn (~Halliburton Told Me......)
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re

Thanks for info.


10 posted on 04/14/2005 6:55:16 PM PDT by proxy_user
[ Post Reply | Private Reply | To 8 | View Replies]

To: proxy_user
No prob.

One last bump before this fades away...

11 posted on 04/15/2005 8:15:24 AM PDT by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 10 | View Replies]

To: All

Does anyone know when 2.0 will be released? I'm using 1.1 right now and don't want to install another one until then.


12 posted on 04/18/2005 1:17:46 PM PDT by 1L
[ Post Reply | Private Reply | To 11 | View Replies]

To: All
Not a slam at OpenOffice but for all the buffer overflow software out there. What's the deal? Don't they use bounded copy routines or add-ins like StackGuard?

I'm stumped as to why buffer overruns are still a problem, what am I missing?

13 posted on 04/18/2005 1:22:30 PM PDT by Proud_texan (What part of "securing the borders" is hard to understand?)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson