what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 24573

Secunia Security Advisory 24573
Posted Mar 20, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libwpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | d97c18cf4c388e6f4d4e6a886eb47be6769da3a062f145f50d9fac9b93faf2b8

Secunia Security Advisory 24573

Change Mirror Download


----------------------------------------------------------------------

Want a new job?
http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/

----------------------------------------------------------------------

TITLE:
Fedora update for libwpd

SECUNIA ADVISORY ID:
SA24573

VERIFY ADVISORY:
http://secunia.com/advisories/24573/

CRITICAL:
Moderately critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Fedora Core 6
http://secunia.com/product/12487/
Fedora Core 5
http://secunia.com/product/8808/

DESCRIPTION:
Fedora has issued an update for libwpd. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) or to compromise an application using the
library.

For more information:
SA24507

SOLUTION:
Apply updated packages.

-- Fedora Core 5 --

ac04c855a542713789b012c7c748955902f5e0d5
SRPMS/libwpd-0.8.9-1.fc5.src.rpm
ac04c855a542713789b012c7c748955902f5e0d5
noarch/libwpd-0.8.9-1.fc5.src.rpm
1641f2aa79faf2e7d6a1f40889d9cfa86c0d2e16
ppc/libwpd-devel-0.8.9-1.fc5.ppc.rpm
46fe9d4f8f67892b4aafb54561ca86acf14d564e
ppc/libwpd-tools-0.8.9-1.fc5.ppc.rpm
f60a4342b52c013822bc0757b3c77459bb784b0d
ppc/debug/libwpd-debuginfo-0.8.9-1.fc5.ppc.rpm
90b0e534b079e6cc4b9fe9d41ba6ce0dffb34953
ppc/libwpd-0.8.9-1.fc5.ppc.rpm
62c4e9cd4e26c42597702ed40b7b35d2db3eca44
x86_64/debug/libwpd-debuginfo-0.8.9-1.fc5.x86_64.rpm
9f906cbe021f4ecf4df1b08e97895827a1a4c534
x86_64/libwpd-devel-0.8.9-1.fc5.x86_64.rpm
c233b7981bb17d98ccc2880657d3b6c46a4cc599
x86_64/libwpd-0.8.9-1.fc5.x86_64.rpm
49be4992c42f05515a450453dec5cafc5afc375c
x86_64/libwpd-tools-0.8.9-1.fc5.x86_64.rpm
f8c04ab995ad24f8166a130415749f1696e41705
i386/libwpd-devel-0.8.9-1.fc5.i386.rpm
c87355919592e7faee65e6feead22bb1f488467a
i386/libwpd-tools-0.8.9-1.fc5.i386.rpm
8d328c869a9471fe92501f7c1039fb858a66325b
i386/libwpd-0.8.9-1.fc5.i386.rpm
cbfb43eb990771b494662032085de34aa5f24d56
i386/debug/libwpd-debuginfo-0.8.9-1.fc5.i386.rpm

-- Fedora Core 6 --

c19d2541e88b8056998e24b35787b6fcc0d180b8
SRPMS/libwpd-0.8.9-1.fc6.src.rpm
c19d2541e88b8056998e24b35787b6fcc0d180b8
noarch/libwpd-0.8.9-1.fc6.src.rpm
9a62af4f6bdc15e1f86f4994b36d2a5e308ba8cd
ppc/libwpd-tools-0.8.9-1.fc6.ppc.rpm
969a4eba1cf413a3dcd67c6922a08a33f3ea9653
ppc/debug/libwpd-debuginfo-0.8.9-1.fc6.ppc.rpm
f321d3a10543871abb9da7b3a25b24904c84be3c
ppc/libwpd-0.8.9-1.fc6.ppc.rpm
7e6745b9128b0ac3897c2777573d484093d35542
ppc/libwpd-devel-0.8.9-1.fc6.ppc.rpm
db32fec3ec0e96954b2d8ae3d45fbbd3dc9c3f3f
x86_64/libwpd-0.8.9-1.fc6.x86_64.rpm
200fd78dfb054e2baa86490d911e0d086af18de0
x86_64/libwpd-tools-0.8.9-1.fc6.x86_64.rpm
38824f1a522b860c1cac18c0dd4c0e1a64ff374d
x86_64/debug/libwpd-debuginfo-0.8.9-1.fc6.x86_64.rpm
3be810bc0cc4034654171c12909c0e60f116a635
x86_64/libwpd-devel-0.8.9-1.fc6.x86_64.rpm
bc601298c43b4c327e1a4899e20878326c9936f5
i386/debug/libwpd-debuginfo-0.8.9-1.fc6.i386.rpm
ddfced7f9b7f179b4a1d7e71a1fc0ae4b92c2578
i386/libwpd-devel-0.8.9-1.fc6.i386.rpm
fbbdd9387496f1838be01e9e62376bc691474dbb
i386/libwpd-0.8.9-1.fc6.i386.rpm
d835a4ca83ebb234908bbd4129d2ac959f802264
i386/libwpd-tools-0.8.9-1.fc6.i386.rpm

ORIGINAL ADVISORY:
http://fedoranews.org/cms/node/2804
http://fedoranews.org/cms/node/2805

OTHER REFERENCES:
SA24507:
http://secunia.com/advisories/24507/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close