Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 547880 (CVE-2015-1774) - <app-office/openoffice-bin-4.1.2: HWP Filter Remote Code Execution and Denial of Service (CVE-2015-1774)
Summary: <app-office/openoffice-bin-4.1.2: HWP Filter Remote Code Execution and Denial...
Alias: CVE-2015-1774
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: B2 [glsa cve cleanup]
Depends on:
Blocks: CVE-2015-4551
  Show dependency tree
Reported: 2015-04-27 09:09 UTC by Agostino Sarubbo
Modified: 2016-03-09 18:11 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-04-27 09:09:11 UTC
From ${URL} :

OpenOffice HWP Filter Remote Code Execution and Denial of Service
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
Apache OpenOffice 4.1.1 and older. versions are also affected.
A vulnerability in OpenOffice's HWP filter allows attackers to cause a denial of service (memory corruption and application crash) or possibly execution of arbitrary code by preparing specially crafted documents in the HWP document format.

Apache OpenOffice users are advised to remove the problematic library in the "program" folder of their OpenOffice installation. On Windows it is named "hwp.dll", on Mac it is named "libhwp.dylib" (step-by-step instructions: go to the Applications folder in 
Finder; right click on; click on "Show Package Contents"; then search for the file "libhwp.dylib" with Finder's search function, or Look for it in the folder "Contents/MacOS"; then delete the file) and on Linux it is named "". 
Alternatively the library can be renamed to anything else e.g. "hwp_renamed.dll". This mitigation will drop support for documents created in "Hangul Word Processor" versions from 1997 or older. Users of such documents are advised to convert their documents to 
other document formats such as OpenDocument before doing so.

Further information
Apache OpenOffice aims to fix the vulnerability in version 4.1.2, not released yet.

Thanks to an anonymous contributor working with VeriSign iDefense Labs.

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Agostino Sarubbo gentoo-dev 2015-11-11 14:46:19 UTC
Arches, please test and mark stable:
Target keywords : "amd64 x86"
Comment 2 Agostino Sarubbo gentoo-dev 2015-11-11 15:00:44 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2015-11-11 15:01:36 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 4 Yury German Gentoo Infrastructure gentoo-dev Security 2015-12-31 04:08:38 UTC
Arches, Thank you for your work.
Added to an existing GLSA Request.

Maintainer(s), please drop the vulnerable version(s).
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2016-03-09 18:11:01 UTC
This issue was resolved and addressed in
 GLSA 201603-05 at
by GLSA coordinator Kristian Fiskerstrand (K_F).