Secunia Research has discovered a vulnerability in the OpenOffice implementation on Fedora Core 1 and Fedora Core 2, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. Default installs create temporary OpenOffice documents with insecure permissions ("664" or "644" depending on the user's umask) in the "/tmp" folder. Example: /tmp/svelj.tmp/svemm.tmp (The temporary folders and files are always named "sv???.tmp"). Successful exploitation allows an unprivileged user to read arbitrary users' currently open documents.
Fedora Core is handled by bug 130131 We don't currently have a release date for this issue.
Josh, this bug is against RHEL3, but isn't RHEL3 _not_ affected by this? I thought only Fedora Core 2 and higher were (since FC1 shares the same OOo that RHEL3 uses)
If you could try to reproduce this on RHEL3 that would be great. My testing has shown that it affects RHEL3 and FC2 but not FC1.
I confirm it also affects RHEL3, when editing a document the temp file in /tmp has permissions of "rw-r--r--"
This will be CAN-2004-0752
This is going to be RHSA-2004:446
Embargo moved to Sep 8th 1300BST
This issue is now public http://marc.theaimsgroup.com/?l=bugtraq&m=109483308421566
Fix is built in dist-3.0E-errata-candidate, 1.1.0-16.14.EL
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-446.html