[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 2570-1] openoffice.org security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


- -------------------------------------------------------------------------
Debian Security Advisory DSA-2570-1                   security@debian.org
http://www.debian.org/security/                         Yves-Alexis Perez
October 31, 2012                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openoffice.org
Vulnerability  : remote
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-4233
Debian Bug     : 

High-Tech Bridge SA Security Research Lab discovered multiple null-pointer
dereferences based vulnerabilities in OpenOffice which could cause
application crash or even arbitrary code execution using specially crafted
files. Affected file types are LWP (Lotus Word Pro), ODG, PPT (MS Powerpoint
2003) and XLS (MS Excel 2003).

For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.1-11+squeeze8.

openoffice.org package has been replaced by libreoffice in testing (wheezy)
and unstable (sid) distributions.

For the testing distribution (wheezy), this problem has been fixed in
version 1:3.5.4+dfsg-3.

For the unstable distribution (sid), this problem has been fixed in
version 1:3.5.4+dfsg-3.

We recommend that you upgrade your openoffice.org packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
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=hToM
-----END PGP SIGNATURE-----


Reply to: