exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-056

Mandriva Linux Security Advisory 2008-056
Posted Mar 3, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in the excel_read_HLINK function in the Microsoft Excel plugin in Gnumeric prior to version 1.8.1 that would allow for the execution of arbitrary code via a crafted XLS file containing XLS HLINK opcodes.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2008-0668
SHA-256 | 729e13042570e0a5e94ffd2c41f67775327ad84c3683758d2df4fc08db4fc11a

Mandriva Linux Security Advisory 2008-056

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:056
http://www.mandriva.com/security/
_______________________________________________________________________

Package : gnumeric
Date : February 29, 2008
Affected: 2007.1, 2008.0
_______________________________________________________________________

Problem Description:

A vulnerability was found in the excel_read_HLINK function in the
Microsoft Excel plugin in Gnumeric prior to version 1.8.1 that would
allow for the execution of arbitrary code via a crafted XLS file
containing XLS HLINK opcodes.

The updated packages have been patched to correct this issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
9d8d8e51ff3a059eed49ca4cb2caa7c1 2007.1/i586/gnumeric-1.7.8-1.1mdv2007.1.i586.rpm
e77664872cf575b6d20b09679b8c76fd 2007.1/i586/libspreadsheet1.7.8-1.7.8-1.1mdv2007.1.i586.rpm
46d182a8e884e501acde85c393244731 2007.1/i586/libspreadsheet1.7.8-devel-1.7.8-1.1mdv2007.1.i586.rpm
1ab5fc67822a4f8a7761a306b71ddcce 2007.1/SRPMS/gnumeric-1.7.8-1.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
ba90d08b24803f60a689a6b6e2fea6e5 2007.1/x86_64/gnumeric-1.7.8-1.1mdv2007.1.x86_64.rpm
18828470ec4a1166c1cef952c5327c24 2007.1/x86_64/lib64spreadsheet1.7.8-1.7.8-1.1mdv2007.1.x86_64.rpm
9f904d184b861fb174f39a6175571a26 2007.1/x86_64/lib64spreadsheet1.7.8-devel-1.7.8-1.1mdv2007.1.x86_64.rpm
1ab5fc67822a4f8a7761a306b71ddcce 2007.1/SRPMS/gnumeric-1.7.8-1.1mdv2007.1.src.rpm

Mandriva Linux 2008.0:
63839f24270516e305ed421c8d21860f 2008.0/i586/gnumeric-1.7.12-3.1mdv2008.0.i586.rpm
d5163cf3052826111112ec069aecdfc1 2008.0/i586/libspreadsheet1.7.12-1.7.12-3.1mdv2008.0.i586.rpm
af9f36dc9c6227ab3770670077fb9e32 2008.0/i586/libspreadsheet1.7.12-devel-1.7.12-3.1mdv2008.0.i586.rpm
8c9de4fac183cf3238558a43d389bc8c 2008.0/SRPMS/gnumeric-1.7.12-3.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
769b6a33e45f6b6623f103928c5538bf 2008.0/x86_64/gnumeric-1.7.12-3.1mdv2008.0.x86_64.rpm
e01cda022a31439821bef9bee12ee01a 2008.0/x86_64/lib64spreadsheet1.7.12-1.7.12-3.1mdv2008.0.x86_64.rpm
8b69a00a121046a58fd7f63bab13c682 2008.0/x86_64/lib64spreadsheet1.7.12-devel-1.7.12-3.1mdv2008.0.x86_64.rpm
8c9de4fac183cf3238558a43d389bc8c 2008.0/SRPMS/gnumeric-1.7.12-3.1mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHyEXvmqjQ0CJFipgRAu3XAKDhc+n0MDYAXq5QXoJ42NEYcK/EDQCg0PJW
BHx9EcXmj5mzLr4MmuOYePQ=
=1/5U
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close