A security patch has been made available for Windows and Mac versions of the software. The thread on the users' list begins with this message which does not render well in my browser at least, so I quote it here:
Please note, this is the official security bulletin, targeted for
security professionals. If you are an OpenOffice.org 3.3 user, and
are able to apply the mentioned patch, then you are encouraged to do
so. If someone else supports or manages your desktop, then please
forward this information to them.
Additional support is available on our Community Forums:
http://user.services.openoffice.org/
And via our ooo-users mailing list:
http://incubator.apache.org/openofficeo ... iling-list
Note: This security patch for OpenOffice.org is made available to
legacy OpenOffice.org users as a service by the Apache OpenOffice
Project Management Committee. The patch is made available under the
Apache License, and due to its importance, we are releasing it outside
of the standard release cycle.
-Rob
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
CVE-2012-0037: OpenOffice.org data leakage vulnerability
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected: OpenOffice.org 3.3 and 3.4 Beta, on all platforms.
Earlier versions may be also affected.
Description: An XML External Entity (XXE) attack is possible in the
above versions of OpenOffice.org. This vulnerability exploits the way
in which external entities are processed in certain XML components of ODF
documents. By crafting an external entity to refer to other local
file system resources, an attacker would be able to inject contents of other
locally- accessible files into the ODF document, without the user's
knowledge or permission. Data leakage then becomes possible when that
document is later distributed to other parties.
Mitigation: OpenOffice.org 3.3.0 and 3.4 beta users should install the
patch at: http://www.openoffice.org/security/cves ... -0037.html
This vulnerability is also fixed in Apache OpenOffice 3.4 dev
snapshots since March 1st, 2012.
Source and Building: Information on obtaining the source code for this
patch, and for porting it or adapting it to OpenOffice.org derivatives
can be found here: http://www.openoffice.org/security/cves ... 37-src.txt
Credit: The Apache OpenOffice project acknowledges and thanks the
discoverer of this issue, Timothy D. Morgan of Virtual Security
Research, LLC.
References: http://security.openoffice.org