CentOS 4 : openoffice.org / openoffice.org2 (CESA-2011:0181)

high Nessus Plugin ID 51887

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated openoffice.org and openoffice.org2 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program.

An array index error and an integer signedness error were found in the way OpenOffice.org parsed certain Rich Text Format (RTF) files. An attacker could use these flaws to create a specially crafted RTF file that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-3451, CVE-2010-3452)

A heap-based buffer overflow flaw and an array index error were found in the way OpenOffice.org parsed certain Microsoft Office Word documents. An attacker could use these flaws to create a specially crafted Microsoft Office Word document that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-3453, CVE-2010-3454)

A heap-based buffer overflow flaw was found in the way OpenOffice.org parsed certain TARGA (Truevision TGA) files. An attacker could use this flaw to create a specially crafted TARGA file. If a document containing this specially crafted TARGA file was opened, or if a user tried to insert the file into an existing document, it would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-4643)

A directory traversal flaw was found in the way OpenOffice.org handled the installation of XSLT filter descriptions packaged in Java Archive (JAR) files, as well as the installation of OpenOffice.org Extension (.oxt) files. An attacker could use these flaws to create a specially crafted XSLT filter description or extension file that, when opened, would cause the OpenOffice.org Extension Manager to modify files accessible to the user installing the JAR or extension file.
(CVE-2010-3450)

Red Hat would like to thank OpenOffice.org for reporting the CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, and CVE-2010-4643 issues. Upstream acknowledges Dan Rosenberg of Virtual Security Research as the original reporter of the CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, and CVE-2010-3454 issues.

All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
All running instances of OpenOffice.org applications must be restarted for this update to take effect.

Solution

Update the affected openoffice.org and / or openoffice.org2 packages.

See Also

http://www.nessus.org/u?7a99fd78

http://www.nessus.org/u?f5d3b56b

Plugin Details

Severity: High

ID: 51887

File Name: centos_RHSA-2011-0181.nasl

Version: 1.14

Type: local

Agent: unix

Published: 2/6/2011

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:openoffice.org-libs, p-cpe:/a:centos:centos:openoffice.org2-base, p-cpe:/a:centos:centos:openoffice.org2-calc, p-cpe:/a:centos:centos:openoffice.org2-core, p-cpe:/a:centos:centos:openoffice.org2-draw, p-cpe:/a:centos:centos:openoffice.org2-emailmerge, p-cpe:/a:centos:centos:openoffice.org2-graphicfilter, p-cpe:/a:centos:centos:openoffice.org2-impress, p-cpe:/a:centos:centos:openoffice.org2-javafilter, p-cpe:/a:centos:centos:openoffice.org2-langpack-af_za, p-cpe:/a:centos:centos:openoffice.org2-langpack-ar, p-cpe:/a:centos:centos:openoffice.org2-langpack-bg_bg, p-cpe:/a:centos:centos:openoffice.org2-langpack-bn, p-cpe:/a:centos:centos:openoffice.org2-langpack-ca_es, p-cpe:/a:centos:centos:openoffice.org2-langpack-cs_cz, p-cpe:/a:centos:centos:openoffice.org2-langpack-cy_gb, p-cpe:/a:centos:centos:openoffice.org2-langpack-da_dk, p-cpe:/a:centos:centos:openoffice.org2-langpack-de, p-cpe:/a:centos:centos:openoffice.org2-langpack-el_gr, p-cpe:/a:centos:centos:openoffice.org2-langpack-es, p-cpe:/a:centos:centos:openoffice.org2-langpack-et_ee, p-cpe:/a:centos:centos:openoffice.org2-langpack-eu_es, p-cpe:/a:centos:centos:openoffice.org2-langpack-fi_fi, p-cpe:/a:centos:centos:openoffice.org2-langpack-fr, p-cpe:/a:centos:centos:openoffice.org2-langpack-ga_ie, p-cpe:/a:centos:centos:openoffice.org2-langpack-gl_es, p-cpe:/a:centos:centos:openoffice.org2-langpack-gu_in, p-cpe:/a:centos:centos:openoffice.org2-langpack-he_il, p-cpe:/a:centos:centos:openoffice.org2-langpack-hi_in, p-cpe:/a:centos:centos:openoffice.org2-langpack-hr_hr, p-cpe:/a:centos:centos:openoffice.org2-langpack-hu_hu, p-cpe:/a:centos:centos:openoffice.org2-langpack-it, p-cpe:/a:centos:centos:openoffice.org, p-cpe:/a:centos:centos:openoffice.org-i18n, p-cpe:/a:centos:centos:openoffice.org-kde, p-cpe:/a:centos:centos:openoffice.org2-langpack-ja_jp, p-cpe:/a:centos:centos:openoffice.org2-langpack-ko_kr, p-cpe:/a:centos:centos:openoffice.org2-langpack-lt_lt, p-cpe:/a:centos:centos:openoffice.org2-langpack-ms_my, p-cpe:/a:centos:centos:openoffice.org2-langpack-nb_no, p-cpe:/a:centos:centos:openoffice.org2-langpack-nl, p-cpe:/a:centos:centos:openoffice.org2-langpack-nn_no, p-cpe:/a:centos:centos:openoffice.org2-langpack-pa_in, p-cpe:/a:centos:centos:openoffice.org2-langpack-pl_pl, p-cpe:/a:centos:centos:openoffice.org2-langpack-pt_br, p-cpe:/a:centos:centos:openoffice.org2-langpack-pt_pt, p-cpe:/a:centos:centos:openoffice.org2-langpack-ru, p-cpe:/a:centos:centos:openoffice.org2-langpack-sk_sk, p-cpe:/a:centos:centos:openoffice.org2-langpack-sl_si, p-cpe:/a:centos:centos:openoffice.org2-langpack-sr_cs, p-cpe:/a:centos:centos:openoffice.org2-langpack-sv, p-cpe:/a:centos:centos:openoffice.org2-langpack-ta_in, p-cpe:/a:centos:centos:openoffice.org2-langpack-th_th, p-cpe:/a:centos:centos:openoffice.org2-langpack-tr_tr, p-cpe:/a:centos:centos:openoffice.org2-langpack-zh_cn, p-cpe:/a:centos:centos:openoffice.org2-langpack-zh_tw, p-cpe:/a:centos:centos:openoffice.org2-langpack-zu_za, p-cpe:/a:centos:centos:openoffice.org2-math, p-cpe:/a:centos:centos:openoffice.org2-pyuno, p-cpe:/a:centos:centos:openoffice.org2-testtools, p-cpe:/a:centos:centos:openoffice.org2-writer, p-cpe:/a:centos:centos:openoffice.org2-xsltfilter, cpe:/o:centos:centos:4

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/4/2011

Vulnerability Publication Date: 1/28/2011

Reference Information

CVE: CVE-2010-3450, CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, CVE-2010-3689, CVE-2010-4253, CVE-2010-4643

RHSA: 2011:0181