+++ This bug was initially created as a clone of Bug #228002 +++ Some shell characters are not escaped in hyperlinks. If a victim loads a OO file that contains a malicious hyperlink it could run shell commands as the victim if they click on it. However this issue is mitigated somewhat as you can't do whitespace and many special characters, so you're really limited to running single existing commands with no arguments as the unprivileged user. http://qa.openoffice.org/issues/show_bug.cgi?id=58013 http://qa.openoffice.org/issues/show_bug.cgi?id=72543 Already public in the bugs, but will be announced on 20070227
also affects RHEL3
RHEL4: openoffice.org2-2.0.4-5.6.0 1.1.X's to follow
RHEL-4: openoffice.org-1.1.5-10.6.0.EL4 RHEL-3 to follow
RHEL-3: openoffice.org-1.1.2-38.2.0.EL3
well the embargo looks busted by http://lwn.net/Articles/227144/ removing our embargo
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2007-0033.html