Hello Simon,
the issue you're referring to is described in issue
http://www.openoffice.org/issues/show_bug.cgi?id=70042
The issue has been fixed for OpenOffice.org 2.1 and a security patch is
also available for OpenOffice.org 1.1.5 from ftp at
../stable/1.1.5secpatch2/ within our mirror network. For 1.1.5 the
md5sums are
50a41ab5282d10b50f75411b99cbb7ee LinuxIntel/libsvt645li.so
62e4ec5a7c0715412fe89e37707cfdbc Solarisx86/libsvt645si.so
e5f8c9cd945076a1792e9ad5f33ff499 SolarisSparc/libsvt645ss.so
82a035bc4580743003bd671b45c5a233 Win32Intel/svt645mi.dll
A Dutch web site reports today that according to Red Hat there have been
found several buffer overflow bugs in OpenOffice.org, allowing hackers to
execute malicious code if the user opens a manipulated .WMF file. Users
are recommended to download an update immediately from the Red Hat
Network.
It is not clear from the article whether this affects only the Red Hat
bundled version of OpenOffice.org, or OpenOffice.org in general.
Kind regards, Joost
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]