CVE-2010-3450
Security Vulnerability in OpenOffice.org related to Extensions and filter package files
- Synopsis: A directory traversal vulnerability in OpenOffice.org, related to zip/jar package extraction, may lead to overwriting files and even to arbitrary code execution.
- State: Resolved
1. Impact
A directory traversal vulnerability in OpenOffice.org, related to zip/jar package extraction, may lead to overwriting files when relative file locations point to locations outside the root of the destination folder. This way important files could be overwritten, including executables.
2. Affected releases
- All versions of OpenOffice.org 3 prior to version 3.3
- All versions of OpenOffice.org 2
Note: Earlier versions of OpenOffice.org are no longer supported and will not be evaluated regarding this issue.
3. Symptoms
There are no predictable symptoms that would indicate this issue has occurred.
4. Relief/Workaround
To workaround the described issue, do not load extensions or filter package files from untrusted sources.
5. Resolution
This issue is addressed in the following release: OpenOffice.org 3.3
6. Comments
OpenOffice.org acknowledges with thanks, Marc Schoenefeld from Red Hat Security Response Team.