This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200805-16
(OpenOffice.org: Multiple vulnerabilities)
iDefense Labs reported multiple vulnerabilities in OpenOffice.org:
multiple heap-based buffer overflows when parsing the 'Attribute' and
'Font' Description records of Quattro Pro (QPRO) files
an integer overflow when parsing the EMR_STRETCHBLT record of an EMF
file, resulting in a heap-based buffer overflow (CVE-2007-5746),
an integer underflow when parsing Quattro Pro (QPRO) files, resulting
in an excessive loop and a stack-based buffer overflow
and a heap-based buffer overflow when parsing the
'DocumentSummaryInformation' stream in an OLE file (CVE-2008-0320).
Furthermore, Will Drewry (Google Security) reported vulnerabilities in
the memory management of the International Components for Unicode
(CVE-2007-4770, CVE-2007-4771), which was resolved with GLSA 200803-20.
However, the binary version of OpenOffice.org uses an internal copy of
A remote attacker could entice a user to open a specially crafted
document, possibly resulting in the remote execution of arbitrary code
with the privileges of the user running OpenOffice.org.
There is no known workaround at this time.
See also :
All OpenOffice.org users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-office/openoffice-2.4.0'
All OpenOffice.org binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-office/openoffice-bin-2.4.0'
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 32353 (gentoo_GLSA-200805-16.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now