Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 28 May 2012 17:09:39 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Apache OpenOffice.Org Security Team" <ooo-security@...ubator.apache.org>,
        LibreOffice Security Team <officesecurity@...ts.freedesktop.org>
CC: oss-security@...ts.openwall.com, Florian Weimer <fw@...eb.enyo.de>,
        Caolán McNamara <caolanm@...hat.com>,
        David Tardon <dtardon@...hat.com>
Subject: Kind request to update upstream CVE-2012-2334 advisories they to
 reflect arbitrary code execution possibility too and OSS list notification

Hello Apache OpenOffice.org, LibreOffice Security Teams, vendors,

   originally the CVE-2012-2334 security flaw has been described as follows:
   [1] http://www.openoffice.org/security/cves/CVE-2012-2334.html
   [2] http://www.libreoffice.org/advisories/cve-2012-2334/

during internal audit of relevant upstream patches:
[3] http://cgit.freedesktop.org/libreoffice/core/commit/?id=28a6558f9d3ca2dda3191f8b5b3f2378ee2533da
[4] http://cgit.freedesktop.org/libreoffice/core/commit/?id=512401decb286ba0fc3031939b8f7de8649c502e

it has been observed by Florian Weimer that the [4] patch also corrected
and integer overflow, being present in the SvxMSDffManager::GetFidclData()
routine, which might lead under certain circumstances to possibility
of arbitrary code execution too.

Update CVE-2012-2334 flaw description is at:
[5] https://bugzilla.redhat.com/show_bug.cgi?id=821803#c0

This post is intended to serve as kind request to OpenOffice.org and
LibreOffice upstream, they to update their corresponding advisories
([1], [2]) to reflect this fact.

For what is related against upstream patches -- upon testing we can confirm,
the original ones were complete and this is in no way a new security flaw.

But something, which got corrected upstream in previous release(s), and
should mention possibility of arbitrary code execution too in order to properly
describe this deficiency.

OpenOffice.org / LibreOffice upstreams - please update your advisories to
reflect this if possible yet.

OSS vendors, please note this notification (for case you previously categorized
fix for the CVE-2012-2334 flaw as something to be postponed due to lower
impact).

Credit for the discovery should go to: Florian Weimer of Red Hat

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

P.S.: Would you need further background details due this, contact me or
         Florian off list.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.