OpenOffice.org is warning users of security vulnerabilities that can crash the OpenOffice.org productivity software and give malicious hackers access to full system resources.The vulnerabilities affect users of OpenOffice.org versions 2.0.x and 1.1.x, though no known exploits exist, the company said in an advisory issued last week. The company is urging OpenOffice.org 2.0.x users to upgrade to version 2.0.3, released last week. A patch for OpenOffice.org 1.1.x will be available soon, the company said.One vulnerability allows a malicious hacker to use certain Java applets to break into a secure execution environment to access system resources. A workaround to this vulnerability is to disable Java applets from current OpenOffice.org versions, the company said.Another vulnerability injects macro code into documents without notification and gives hackers full access to system resources. In the third vulnerability, malformed XML documents cause buffer overflows and crash OpenOffice.org. The vulnerabilities also affect users of Sun Microsystems’ StarOffice Office Suite versions 6, 7 and 8, according to security vendor Secunia.-Agam Shah, IDG News Service (San Francisco Bureau) Keep checking in at our Security Feed page, or subscribe via RSS, for updated news coverage. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Vulnerabilities Security brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe