Manipulated XML documents can lead to arbitrary code execution
- Synopsis: Manipulated XML documents can lead to arbitrary code execution
- State: Resolved
A security vulnerability in OpenOffice.org, related to XML document
processing, may allow a remote unprivileged user to execute arbitrary code
on the system with the privileges of a local user running OpenOffice.org,
if the local user opens crafted XML documents provided by the remote user.
These XML documents may also include documents in the OpenDocument format
(ODF), the default format used by OpenOffice.org.
No working exploit is known right now.
2. Affected releases
- All versions of OpenOffice.org 3 prior to version 3.1.1
- All versions of OpenOffice.org 2 prior to version 2.4.3
Note: OpenOffice.org 1 is not impacted by this issue.
There are no predictable symptoms that would indicate this issue has occurred.
To workaround the described issues, do not load documents from untrusted sources. See "Resolution" below.
This issue is addressed in the following releases:
- OpenOffice.org 3.1.1
- OpenOffice.org 2.4.3