Secunia Research has discovered a vulnerability in the OpenOffice
implementation on Fedora Core 1 and Fedora Core 2, which potentially can
be exploited by malicious, local users to gain knowledge of sensitive
Default installs create temporary OpenOffice documents with insecure
permissions ("664" or "644" depending on the user's umask) in the "/tmp"
(The temporary folders and files are always named "sv???.tmp").
Successful exploitation allows an unprivileged user to read arbitrary
users' currently open documents.
Fedora Core is handled by bug 130131
We don't currently have a release date for this issue.
Josh, this bug is against RHEL3, but isn't RHEL3 _not_ affected by
this? I thought only Fedora Core 2 and higher were (since FC1 shares
the same OOo that RHEL3 uses)
If you could try to reproduce this on RHEL3 that would be great. My
testing has shown that it affects RHEL3 and FC2 but not FC1.
I confirm it also affects RHEL3, when editing a document the temp file
in /tmp has permissions of "rw-r--r--"
This will be CAN-2004-0752
This is going to be RHSA-2004:446
Embargo moved to Sep 8th 1300BST
This issue is now public
Fix is built in dist-3.0E-errata-candidate, 1.1.0-16.14.EL
An errata has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.