How to Buy
This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated openoffice.org 2.x packages to correct multiple security
issues are now available for Red Hat Enterprise Linux 4 and Red Hat
Enterprise Linux 5.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation
manager, formula editor, and drawing program.
Multiple heap overflows and an integer underflow were found in the
Quattro Pro(R) import filter. An attacker could create a carefully
crafted Quattro Pro file that could cause OpenOffice.org to crash or
possibly execute arbitrary code if the file was opened by a victim.
A heap overflow flaw was found in the EMF parser. An attacker could
create a carefully crafted EMF file that could cause OpenOffice.org to
crash or possibly execute arbitrary code if the malicious EMF image
was added to a document or if a document containing the malicious EMF
file was opened by a victim. (CVE-2007-5746)
A heap overflow flaw was found in the OLE Structured Storage file
parser. (OLE Structured Storage is a format used by Microsoft Office
documents.) An attacker could create a carefully crafted OLE file that
could cause OpenOffice.org to crash or possibly execute arbitrary code
if the file was opened by a victim. (CVE-2008-0320)
All users of OpenOffice.org are advised to upgrade to these updated
packages, which contain backported fixes to correct these issues.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 32018 ()
Bugtraq ID: 28819
CVE ID: CVE-2007-5745CVE-2007-5746CVE-2007-5747CVE-2008-0320
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.