First published: Wed Jun 09 2010(Updated: )
Originally Marc Schoenefeld found a directory traversal flaw in the way OpenOffice.org prior to v3.2.1 handled XSLT jar filter description files installation. If a local user was tricked to install a specially-crafted OOo XSLT jar filter description file, it could allow remote attackers to create or overwrite arbitrary files belonging to local user or, potentially, execute arbitrary code via a .. (dot dot) in an entry in a XSLT filter description file. Later, OpenOffice.org upstream identified the same deficiency in the way OOs Extension Manager performed installation of OpenOffice.org Extension (*.OXT) files. References: [1] <a href="http://extensions.services.openoffice.org/en/resources">http://extensions.services.openoffice.org/en/resources</a> [2] <a href="http://wiki.services.openoffice.org/wiki/Documentation/DevGuide/Extensions/Extensions">http://wiki.services.openoffice.org/wiki/Documentation/DevGuide/Extensions/Extensions</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenOffice | <3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-602324 is classified as a medium severity vulnerability due to the potential for local exploitation.
To fix REDHAT-BUG-602324, users should upgrade to Apache OpenOffice version 3.2.1 or later.
REDHAT-BUG-602324 is a directory traversal vulnerability affecting older versions of Apache OpenOffice.
Users of Apache OpenOffice versions prior to 3.2.1 are affected by REDHAT-BUG-602324.
No, REDHAT-BUG-602324 requires local user interaction to exploit the vulnerability.