グッデイ榎です
4本目の翻訳です。
レビューをお願いします。
----
CVE-2009-2949: Security Vulnerability in OpenOffice.org related to XPM
file processing
CVE-2009-2949: XPM ファイル処理に関する OpenOffice.org のセキュリティ脆弱性
* Synopsis: Security Vulnerability in OpenOffice.org related to XPM
file processing may lead to arbitrary code execution
* 概要: XPM ファイル処理に関する OpenOffice.org のセキュリティ脆弱性は
任意のコードの実行を引き起こす可能性があります
* State: Resolved
* ステータス: 解決
1. Impact
1. 影響
A security vulnerability in OpenOffice.org, related to XPM file
processing, may allow a remote unprivileged user to execute arbitrary
code on the system with the privileges of a local user running
OpenOffice.org, if the local user opens a crafted XPM file provided by
the remote user. XPM files can also be embedded in different kind of
documents, including documents in the OpenDocument Format (ODF), the
default format used by OpenOffice.org.
XPM ファイル処理に関するセキュリティ脆弱性は、リモートの非特権ユーザーに、
OpenOffice.org を実行しているローカルユーザーのユーザー権限で、任意の命令を
実行することを許すかもしれません。XPM ファイルを、OpenOffice.org のデフォルト
フォーマットであるOpenDocument format(ODF)形式のドキュメントを含む、異なる
種類のドキュメントに埋め込むことができます。
2. Affected releases
2. 影響を受けるリリース
All versions of OpenOffice.org prior to version 3.2
OpenOffice.org 3.2 より前の OpenOffice.org のすべてのバージョン
3. Symptoms
3. 兆候
There are no predictable symptoms that would indicate this issue has
occurred.
この問題が起こったことを示す、予想できる兆候はありません。
4. Relief/Workaround
4. 軽減/回避方法
To workaround the described issue, do not load documents from untrusted
sources.
問題を回避するには、信頼できない出所のドキュメントを読み込まないでください。
5. Resolution
5. 解決
This issue is addressed in the following release: OpenOffice.org 3.2
この問題は以下のリリースで対処されています。
OpenOffice.org 3.2
6. Comments
6. コメント
OpenOffice.org acknowledges with thanks Sebastian Apelt from siberas.
OpenOffice.org は、siberas の Sebastian Apelt さんに感謝します。
----
Begin forwarded message:
Date: Fri, 12 Feb 2010 12:03:05 +0100
From: Florian Effenberger <[email protected]>
To: [email protected]
Subject: [security-alerts] CVE-2009-2949: Security Vulnerability in
OpenOffice.org related to XPM file processing
CVE-2009-2949: Security Vulnerability in OpenOffice.org related to XPM
file processing
* Synopsis: Security Vulnerability in OpenOffice.org related to XPM
file processing may lead to arbitrary code execution
* State: Resolved
1. Impact
A security vulnerability in OpenOffice.org, related to XPM file
processing, may allow a remote unprivileged user to execute arbitrary
code on the system with the privileges of a local user running
OpenOffice.org, if the local user opens a crafted XPM file provided by
the remote user. XPM files can also be embedded in different kind of
documents, including documents in the OpenDocument Format (ODF), the
default format used by OpenOffice.org.
2. Affected releases
All versions of OpenOffice.org prior to version 3.2
3. Symptoms
There are no predictable symptoms that would indicate this issue has
occurred.
4. Relief/Workaround
To workaround the described issue, do not load documents from untrusted
sources.
5. Resolution
This issue is addressed in the following release: OpenOffice.org 3.2
6. Comments
OpenOffice.org acknowledges with thanks Sebastian Apelt from siberas.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
--
株式会社グッデイ
榎真治 <[email protected]>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]