For the stable distribution (jessie), these problems have been fixed in version 1.4.4-2+deb8u2.
For the unstable distribution (sid), these problems have been fixed in version 1.10.1-2.
We recommend that you upgrade your gst-plugins-good1.0 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at:https://www.debian.org/security/
This update removes the insecure FLIC file format plugin.
For the stable distribution (jessie), these problems have been fixed in version 0.10.31-3+nmu4+deb8u2.
We recommend that you upgrade your gst-plugins-good0.10 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at:https://www.debian.org/security/
Title: Windows Installer Can Enable Privileged Trojan Execution
Version 1.0 Announced October 11, 2016
Description
The Apache OpenOffice installer for Windows contained a defective operation that could trigger execution of unwanted software installed by a Trojan Horse application. The installer defect is known as an "unquoted Windows search path vulnerability."
In the case of Apache OpenOffice installers for Windows, the PC must have previously been infected by a Trojan Horse application (or user) running with administrator privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit. The exploit may already have operated on the user's PC.
Severity: Medium
There are no known exploits of this vulnerability. A proof-of-concept demonstration exists.
Vendor: The Apache Software Foundation
Versions Affected:
All Apache OpenOffice versions 4.1.2 and older are affected. Old OpenOffice.org versions are also affected.
If instead of a typical installation you use a custom-installation option to change the location where Apache OpenOffice is installed, use a location that has no spaces in its full-path name.
Defenses and Work-Arounds:
If you are unable to update to 4.1.3, there are other precautions that can be taken. These precautions are also recommended as protection against other software that may have the unquoted search path vulnerability.
Ensure that there are no programs installed at the top-level folder (usually C:\) where Windows is installed. All are dangerous, especially ones named "Program", whether "Program.exe" or some other variation.
If such programs are found, install or update to current anti-virus/-malware software. Perform a complete system scan. The scan may provide for removal of programs where there should not be any. If that does not happen, it is necessary to remove any Program.exe and others manually using administrator privilege.