On 11/22/2011 06:59 AM, Miyoshi Omori wrote:
> OK.
> 
> Clean up is after 3.4.3.
> Migrating to 3.4 is difficult, but have to do.
> Nice to solve this problem.
> 
> Thank you

However... There has been no change to these links regarding 3.3.4:
http://www.libreoffice.org/advisories/CVE-2011-2713/
[Despite the fact that Huzaifa Sidhpurwala reported that it is not a
security issue and "notabug" on 5-Oct-2011 (the same day as the LO
announcement)]
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2713
* cpe:/a:sun:openoffice.org:3.3.0
* cpe:/a:libreoffice:libreoffice:3.3.0
* cpe:/a:libreoffice:libreoffice:3.3.1
* cpe:/a:libreoffice:libreoffice:3.3.2
* cpe:/a:libreoffice:libreoffice:3.3.3
* cpe:/a:libreoffice:libreoffice:3.3.4
* cpe:/a:libreoffice:libreoffice:3.4.0
* cpe:/a:libreoffice:libreoffice:3.4.1
* cpe:/a:libreoffice:libreoffice:3.4.2 and previous versions
* Denotes Vulnerable Software

In an earlier thread I specifically asked about 3.3.4 on 12 Oct:
<http://comments.gmane.org/gmane.comp.documentfoundation.discuss/7035>
where I was informed that the "security fix" was backported to 3.3.4.
So I don't know what to believe.

Gary Lee (NoOp)


> 
> 2011/11/22 NoOp <gl...@sbcglobal.net>
> 
>> On 11/20/2011 07:26 AM, Volker Merschmann wrote:
>> > Hi,
>> >
>> > 2011/11/20 Miyoshi Omori <miyoshi.om...@gmail.com>:
>> >> Hello,
>> >> My request is  about information security.
>> >>
>> >> Security issues have already been announced as, CVE-2011-2713
>> >> corresponds to a comment.
>> >> TDF as information, but said that it had been made LibreOffice
>> >> 3.4.3 and 3.3.4  fixed.
>> >> According to NIST report
>> >> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2713,
>> >> 3.3.4 is classified as a vulnerable version on this security issue.
>> >> If it is incorrect, could you formally request a modification of
>> >> information as TDF.
>> >> As a user, it is also a serious problem.
>> >
>> > Thanks for reporting, I also think the information about 3.3.4 is
>> > incorrect there.
>> >
>> > Your mail has been forwarded to the security team.
>> >
>> >
>> > Volker
>> >
>> >
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=725668
>> [(CVE-2011-2713) CVE-2011-2713 openoffice.org: Out-of-bounds read in DOC
>> sprm parser]
>> Status:         CLOSED NOTABUG
>> https://bugzilla.redhat.com/show_bug.cgi?id=725668#c14
>>
>> <quote>
>> Huzaifa S. Sidhpurwala 2011-10-05 06:40:46 EDT
>>
>> It initially appeared that this flaw may be exploitable similar to
>> CVE-2010-3452, where an OOB Read caused Arbitrary Code Execution. However
>> in
>> the case of this particular flaw, the junk data read is just parsed into an
>> internal representation of properties and the maximum harm this should
>> cause in
>> application crash (Denial Of Service).
>>
>> Timeline:
>> - Reported to securityt...@openoffice.org on 25-July-2011
>> - Recieved a reply (with tdf-secur...@lists.documentfoundation.org
>> copied) on
>> the same date
>> - Release date changed with a few delays in between
>> - Release on 5-Oct-2011
>>
>>
>> Statement:
>>
>> This issue results in an OOB read which is not exploitable for arbitrary
>> code
>> execution and can simply cause a crash. We do not consider this as a
>> security
>> issue.
>> </quote>
>>
>>
>>
>> --
>> Unsubscribe instructions: E-mail to discuss+h...@documentfoundation.org
>> Problems?
>> http://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/
>> Posting guidelines + more: http://wiki.documentfoundation.org/Netiquette
>> List archive: http://listarchives.documentfoundation.org/www/discuss/
>> All messages sent to this list will be publicly archived and cannot be
>> deleted
>>
>>
> 



-- 
Unsubscribe instructions: E-mail to discuss+h...@documentfoundation.org
Problems? http://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/
Posting guidelines + more: http://wiki.documentfoundation.org/Netiquette
List archive: http://listarchives.documentfoundation.org/www/discuss/
All messages sent to this list will be publicly archived and cannot be deleted

Reply via email to