OpenOffice.org Patches WMF Bug

Earlier this week, OpenOffice.org posted a patch for the Windows, Linux, and Solaris editions of the bundle to fix a flaw in how WMF (Windows Metafile) image files are processed. Using a malformed WMF image, an attacker could cause a buffer overflow on OpenOffice-equipped computers, then possibly introduce additional malicious code remotely to hijack the system.

In December 2005, a different WMF vulnerability in Windows was exploited by attackers and identity thieves; the problem was serious enough for Microsoft to rush out a fix by Jan. 5, nearly a week before the next regularly-scheduled security update. Microsoft went "out-of-cycle" on a patch only twice during all of 2006.

Danish vulnerability tracker Secunia pegged the OpenOffice.org vulnerability as "Highly critical," its second-from-the-top ranking in a five-level threat scoring system. Secunia also recommended that users apply the patch -- a single file must be downloaded and then substituted manually by the user for its earlier incarnation -- or update to the month-old version 2.1.

The patches can be found at the OpenOffice.org FTP servers noted here.

id
unit-1659132512259
type
Sponsored post

Linux distributors such as Red Hat have also updated their own versions of the suite by posting patches on their Web sites.