Some shell characters are not escaped in hyperlinks. If a victim loads a OO
file that contains a malicious hyperlink it could run shell commands as the
victim if they click on it.
However this issue is mitigated somewhat as you can't do whitespace and many
special characters, so you're really limited to running single existing commands
with no arguments as the unprivileged user.
Already public in the bugs, but will be announced on 20070227
build underway, will be RHEL-5:openoffice_org-2.0.4-22.214.171.124
done as RHEL-5:openoffice_org-2.0.4-126.96.36.199
oops, need one off the .17, not the .16,
RHEL-5:openoffice.org-2.0.4-188.8.131.52 build underway
well the embargo looks busted by http://lwn.net/Articles/227144/
removing our embargo
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.