Hello Simon,

the issue you're referring to is described in issue http://www.openoffice.org/issues/show_bug.cgi?id=70042

The issue has been fixed for OpenOffice.org 2.1 and a security patch is also available for OpenOffice.org 1.1.5 from ftp at ../stable/1.1.5secpatch2/ within our mirror network. For 1.1.5 the md5sums are

50a41ab5282d10b50f75411b99cbb7ee LinuxIntel/libsvt645li.so
62e4ec5a7c0715412fe89e37707cfdbc Solarisx86/libsvt645si.so
e5f8c9cd945076a1792e9ad5f33ff499 SolarisSparc/libsvt645ss.so
82a035bc4580743003bd671b45c5a233 Win32Intel/svt645mi.dll


A Dutch web site reports today that according to Red Hat there have been
found several buffer overflow bugs in OpenOffice.org, allowing hackers to
execute malicious code if the user opens a manipulated .WMF file. Users
are recommended to download an update immediately from the Red Hat
Network.

It is not clear from the article whether this affects only the Red Hat
bundled version of OpenOffice.org, or OpenOffice.org in general.

Kind regards, Joost

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to