First published: Tue May 31 2011(Updated: )
A new security flaw, potentially allowing execution of arbitrary code with the privileges of the user running the OpenOffice.org suite tools has been reported by the InteVyDis security researchers team: [1] <a href="http://intevydis.com/oo_0day.html">http://intevydis.com/oo_0day.html</a> [2] <a href="http://twitter.com/#!/legerov/status/75482755194032128">http://twitter.com/#!/legerov/status/75482755194032128</a> Note: Since no further detailed information is currently available about this flaw, Red Hat Security Response Team is actively investigating the progress done on this (at upstream and reporter side) and will update this record with further information as soon as it is available. Mitigation: Do not OpenOffice.org documents from untrusted sources.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | =3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2177 has been classified as a critical vulnerability due to the potential for arbitrary code execution.
To remediate CVE-2011-2177, update to a patched version of Apache OpenOffice beyond 3.3.0.
Exploitation of CVE-2011-2177 could allow attackers to execute arbitrary code with the privileges of the user running the OpenOffice suite.
CVE-2011-2177 specifically affects Apache OpenOffice version 3.3.0.
There are no official workarounds for CVE-2011-2177; thus, updating the software is the recommended approach.