Some shell characters are not escaped in hyperlinks. If a victim loads a OO
file that contains a malicious hyperlink it could run shell commands as the
victim if they click on it.
However this issue is mitigated somewhat as you can't do whitespace and many
special characters, so you're really limited to running single existing commands
with no arguments as the unprivileged user.
Already public in the bugs, but will be announced on 20070227
build underway, will be RHEL-5:openoffice_org-2.0.4-126.96.36.199
done as RHEL-5:openoffice_org-2.0.4-188.8.131.52
oops, need one off the .17, not the .16,
RHEL-5:openoffice.org-2.0.4-184.108.40.206 build underway
well the embargo looks busted by http://lwn.net/Articles/227144/
removing our embargo
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.