Bug 130132
| Summary: | CAN-2004-0752 openoffice temporary file information leakage. | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 3 | Reporter: | Josh Bressers <bressers> |
| Component: | openoffice.org | Assignee: | Dan Williams <dcbw> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 3.0 | CC: | security-response-team |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2004-09-15 15:36:20 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
Fedora Core is handled by bug 130131 We don't currently have a release date for this issue. Josh, this bug is against RHEL3, but isn't RHEL3 _not_ affected by this? I thought only Fedora Core 2 and higher were (since FC1 shares the same OOo that RHEL3 uses) If you could try to reproduce this on RHEL3 that would be great. My testing has shown that it affects RHEL3 and FC2 but not FC1. I confirm it also affects RHEL3, when editing a document the temp file in /tmp has permissions of "rw-r--r--" This will be CAN-2004-0752 This is going to be RHSA-2004:446 Embargo moved to Sep 8th 1300BST This issue is now public http://marc.theaimsgroup.com/?l=bugtraq&m=109483308421566 Fix is built in dist-3.0E-errata-candidate, 1.1.0-16.14.EL An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-446.html |
Secunia Research has discovered a vulnerability in the OpenOffice implementation on Fedora Core 1 and Fedora Core 2, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. Default installs create temporary OpenOffice documents with insecure permissions ("664" or "644" depending on the user's umask) in the "/tmp" folder. Example: /tmp/svelj.tmp/svemm.tmp (The temporary folders and files are always named "sv???.tmp"). Successful exploitation allows an unprivileged user to read arbitrary users' currently open documents.