Bug 130131
| Summary: | CAN-2004-0752 openoffice.org temporary file information leakage. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Josh Bressers <bressers> |
| Component: | openoffice.org | Assignee: | Dan Williams <dcbw> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 2 | CC: | security-response-team |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2004-11-08 16:54:49 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
It looks like FC1 isn't affected by this issue. This issue will be CAN-2004-0752 Embargo moved to Sep 8th 1300BST This issue is now public http://marc.theaimsgroup.com/?l=bugtraq&m=109483308421566 Josh, test with 1.1.2-5 in rawhide. I may be able to do this early next week. Fixed in updated 1.1.2-10.fc2 in fc2-updates |
Secunia Research has discovered a vulnerability in the OpenOffice implementation on Fedora Core 1 and Fedora Core 2, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. Default installs create temporary OpenOffice documents with insecure permissions ("664" or "644" depending on the user's umask) in the "/tmp" folder. Example: /tmp/svelj.tmp/svemm.tmp (The temporary folders and files are always named "sv???.tmp"). Successful exploitation allows an unprivileged user to read arbitrary users' currently open documents.