Author: buildbot Date: Fri Jul 26 07:29:40 2013 New Revision: 871239 Log: Staging update by buildbot for ooo-site
Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-2189.html websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-4156.html Modified: websites/staging/ooo-site/trunk/cgi-bin/ (props changed) websites/staging/ooo-site/trunk/content/ (props changed) websites/staging/ooo-site/trunk/content/security/bulletin.html Propchange: websites/staging/ooo-site/trunk/cgi-bin/ ------------------------------------------------------------------------------ --- cms:source-revision (original) +++ cms:source-revision Fri Jul 26 07:29:40 2013 @@ -1 +1 @@ -1507137 +1507204 Propchange: websites/staging/ooo-site/trunk/content/ ------------------------------------------------------------------------------ --- cms:source-revision (original) +++ cms:source-revision Fri Jul 26 07:29:40 2013 @@ -1 +1 @@ -1507137 +1507204 Modified: websites/staging/ooo-site/trunk/content/security/bulletin.html ============================================================================== --- websites/staging/ooo-site/trunk/content/security/bulletin.html (original) +++ websites/staging/ooo-site/trunk/content/security/bulletin.html Fri Jul 26 07:29:40 2013 @@ -5,7 +5,7 @@ <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> - <title>OpenOffice.org Security Team Bulletin</title> + <title>Apache OpenOffice Security Team Bulletin</title> <style type="text/css"> /*<![CDATA[*/ hr { display: block } @@ -13,7 +13,6 @@ </style> - <!--#include virtual="/google-analytics.js" --> </head> <body> @@ -29,9 +28,15 @@ - <h2>OpenOffice.org Security Team Bulletin</h2> + <h2>Apache OpenOffice Security Team Bulletin</h2> + + <p><strong>If you want to stay up to date on Apache OpenOffice security announcements, please subscribe to our <a href="alerts.html">security-alerts mailing list</a>.</strong></p> - <p><strong>If you want to stay up to date on OpenOffice.org security announcements, please subscribe to our <a href="alerts.html">security-alerts mailing list</a>.</strong></p> + <h3>Fixed in Apache OpenOffice 4.0.0</h3> +<ul> +<li><a href="cves/CVE-2013-2189.html">CVE-2013-2189</a>: DOC Memory Corruption Vulnerability in Apache OpenOffice</li> +<li><a href="cves/CVE-2013-4156.html">CVE-2013-4156</a>: DOCM Memory Corruption Vulnerability in Apache OpenOffice</li> +</ul> <h3>Fixed in Apache OpenOffice 3.4.1</h3> <ul> Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-2189.html ============================================================================== --- websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-2189.html (added) +++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-2189.html Fri Jul 26 07:29:40 2013 @@ -0,0 +1,58 @@ +<!--#include virtual="/doctype.html" --> +<html> +<head> +<link href="/css/ooo.css" rel="stylesheet" type="text/css"> + + <title>CVE-2013-2189</title> + <style type="text/css"></style> + +<!--#include virtual="/google-analytics.js" --> +</head> +<body> +<!--#include virtual="/brand.html" --> + <div id="topbara"> + <!--#include virtual="/topnav.html" --> + <div id="breadcrumbsa"><a href="/">home</a> » <a href="/security/">security</a> » <a href="/security/cves/">cves</a></div> + </div> + <div id="clear"></div> + + + <div id="content"> + + + + <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189">CVE-2013-2189</a></h2> + + <h3>OpenOffice DOC Memory Corruption Vulnerability</h3> + + <ul> + <h4>Severity: Important</h4> + <h4>Vendor: The Apache Software Foundation</h4> + <h4>Versions Affected:</h4> + <ul> + <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li> + <li>Earlier versions may be also affected.</li> + </ul> + + <h4>Description:</h4> + <p>The vulnerability is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file. + Specially crafted documents can be used for denial-of-service attacks. + Further exploits are possible but have not been verified. + + <h4>Mitigation</h4> + <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>. + Users who are unable to upgrade immediately should be cautious when opening untrusted documents. + + <h4>Credits</h4> + <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p> + + <hr /> + + <p><a href="http://security.openoffice.org">Security Home</a> + -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/cves/CVE-2013-2189.html">CVE-2013-2189</a></p> + + </div> +<!--#include virtual="/footer.html" --> +</body> +</html> Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-4156.html ============================================================================== --- websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-4156.html (added) +++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2013-4156.html Fri Jul 26 07:29:40 2013 @@ -0,0 +1,58 @@ +<!--#include virtual="/doctype.html" --> +<html> +<head> +<link href="/css/ooo.css" rel="stylesheet" type="text/css"> + + <title>CVE-2013-4156</title> + <style type="text/css"></style> + +<!--#include virtual="/google-analytics.js" --> +</head> +<body> +<!--#include virtual="/brand.html" --> + <div id="topbara"> + <!--#include virtual="/topnav.html" --> + <div id="breadcrumbsa"><a href="/">home</a> » <a href="/security/">security</a> » <a href="/security/cves/">cves</a></div> + </div> + <div id="clear"></div> + + + <div id="content"> + + + + <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156">CVE-2013-4156</a></h2> + + <h3>OpenOffice DOCM Memory Corruption Vulnerability</h3> + + <ul> + <h4>Severity: Important</h4> + <h4>Vendor: The Apache Software Foundation</h4> + <h4>Versions Affected:</h4> + <ul> + <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li> + <li>Earlier versions may be also affected.</li> + </ul> + + <h4>Description:</h4> + <p>The vulnerability is caused by mishandling of unknown XML elements when parsing OOXML document files. + Specially crafted documents can be used for denial-of-service attacks. + Further exploits are possible but have not been verified. + + <h4>Mitigation</h4> + <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>. + Users who are unable to upgrade immediately should be cautious when opening untrusted documents. + + <h4>Credits</h4> + <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p> + + <hr /> + + <p><a href="http://security.openoffice.org">Security Home</a> + -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/cves/CVE-2013-4156.html">CVE-2013-4156</a></p> + + </div> +<!--#include virtual="/footer.html" --> +</body> +</html>