CentOS 5 : openoffice.org (CESA-2011:0182)

high Nessus Plugin ID 53831

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated openoffice.org packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program.

An array index error and an integer signedness error were found in the way OpenOffice.org parsed certain Rich Text Format (RTF) files. An attacker could use these flaws to create a specially crafted RTF file that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-3451, CVE-2010-3452)

A heap-based buffer overflow flaw and an array index error were found in the way OpenOffice.org parsed certain Microsoft Office Word documents. An attacker could use these flaws to create a specially crafted Microsoft Office Word document that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-3453, CVE-2010-3454)

A heap-based buffer overflow flaw was found in the way OpenOffice.org parsed certain Microsoft Office PowerPoint files. An attacker could use this flaw to create a specially crafted Microsoft Office PowerPoint file that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-4253)

A heap-based buffer overflow flaw was found in the way OpenOffice.org parsed certain TARGA (Truevision TGA) files. An attacker could use this flaw to create a specially crafted TARGA file. If a document containing this specially crafted TARGA file was opened, or if a user tried to insert the file into an existing document, it would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-4643)

A directory traversal flaw was found in the way OpenOffice.org handled the installation of XSLT filter descriptions packaged in Java Archive (JAR) files, as well as the installation of OpenOffice.org Extension (.oxt) files. An attacker could use these flaws to create a specially crafted XSLT filter description or extension file that, when opened, would cause the OpenOffice.org Extension Manager to modify files accessible to the user installing the JAR or extension file.
(CVE-2010-3450)

A flaw was found in the script that launches OpenOffice.org. In some situations, a '.' character could be included in the LD_LIBRARY_PATH variable, allowing a local attacker to execute arbitrary code with the privileges of the user running OpenOffice.org, if that user ran OpenOffice.org from within an attacker-controlled directory.
(CVE-2010-3689)

Red Hat would like to thank OpenOffice.org for reporting the CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, and CVE-2010-4643 issues; and Dmitri Gribenko for reporting the CVE-2010-3689 issue. Upstream acknowledges Dan Rosenberg of Virtual Security Research as the original reporter of the CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, and CVE-2010-3454 issues.

All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
All running instances of OpenOffice.org applications must be restarted for this update to take effect.

Solution

Update the affected openoffice.org packages.

See Also

http://www.nessus.org/u?b0001f35

http://www.nessus.org/u?bce28c2e

Plugin Details

Severity: High

ID: 53831

File Name: centos_RHSA-2011-0182.nasl

Version: 1.14

Type: local

Agent: unix

Published: 5/9/2011

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:openoffice.org-base, p-cpe:/a:centos:centos:openoffice.org-langpack-cy_gb, p-cpe:/a:centos:centos:openoffice.org-langpack-da_dk, p-cpe:/a:centos:centos:openoffice.org-langpack-de, p-cpe:/a:centos:centos:openoffice.org-langpack-el_gr, p-cpe:/a:centos:centos:openoffice.org-langpack-es, p-cpe:/a:centos:centos:openoffice.org-langpack-et_ee, p-cpe:/a:centos:centos:openoffice.org-langpack-eu_es, p-cpe:/a:centos:centos:openoffice.org-langpack-fi_fi, p-cpe:/a:centos:centos:openoffice.org-langpack-fr, p-cpe:/a:centos:centos:openoffice.org-langpack-ga_ie, p-cpe:/a:centos:centos:openoffice.org-langpack-gl_es, p-cpe:/a:centos:centos:openoffice.org-langpack-gu_in, p-cpe:/a:centos:centos:openoffice.org-langpack-he_il, p-cpe:/a:centos:centos:openoffice.org-langpack-hi_in, p-cpe:/a:centos:centos:openoffice.org-langpack-hr_hr, p-cpe:/a:centos:centos:openoffice.org-langpack-hu_hu, p-cpe:/a:centos:centos:openoffice.org-langpack-it, p-cpe:/a:centos:centos:openoffice.org-langpack-ja_jp, p-cpe:/a:centos:centos:openoffice.org-langpack-kn_in, p-cpe:/a:centos:centos:openoffice.org-calc, p-cpe:/a:centos:centos:openoffice.org-core, p-cpe:/a:centos:centos:openoffice.org-draw, p-cpe:/a:centos:centos:openoffice.org-emailmerge, p-cpe:/a:centos:centos:openoffice.org-graphicfilter, p-cpe:/a:centos:centos:openoffice.org-headless, p-cpe:/a:centos:centos:openoffice.org-impress, p-cpe:/a:centos:centos:openoffice.org-javafilter, p-cpe:/a:centos:centos:openoffice.org-langpack-af_za, p-cpe:/a:centos:centos:openoffice.org-langpack-ar, p-cpe:/a:centos:centos:openoffice.org-langpack-as_in, p-cpe:/a:centos:centos:openoffice.org-langpack-bg_bg, p-cpe:/a:centos:centos:openoffice.org-langpack-bn, p-cpe:/a:centos:centos:openoffice.org-langpack-ca_es, p-cpe:/a:centos:centos:openoffice.org-langpack-cs_cz, p-cpe:/a:centos:centos:openoffice.org-langpack-ko_kr, p-cpe:/a:centos:centos:openoffice.org-langpack-lt_lt, p-cpe:/a:centos:centos:openoffice.org-langpack-ml_in, p-cpe:/a:centos:centos:openoffice.org-langpack-mr_in, p-cpe:/a:centos:centos:openoffice.org-langpack-ms_my, p-cpe:/a:centos:centos:openoffice.org-langpack-nb_no, p-cpe:/a:centos:centos:openoffice.org-langpack-nl, p-cpe:/a:centos:centos:openoffice.org-langpack-nn_no, p-cpe:/a:centos:centos:openoffice.org-langpack-nr_za, p-cpe:/a:centos:centos:openoffice.org-langpack-nso_za, p-cpe:/a:centos:centos:openoffice.org-langpack-or_in, p-cpe:/a:centos:centos:openoffice.org-langpack-pa_in, p-cpe:/a:centos:centos:openoffice.org-langpack-pl_pl, p-cpe:/a:centos:centos:openoffice.org-langpack-pt_br, p-cpe:/a:centos:centos:openoffice.org-langpack-pt_pt, p-cpe:/a:centos:centos:openoffice.org-langpack-ru, p-cpe:/a:centos:centos:openoffice.org-langpack-sk_sk, p-cpe:/a:centos:centos:openoffice.org-langpack-sl_si, p-cpe:/a:centos:centos:openoffice.org-langpack-sr_cs, p-cpe:/a:centos:centos:openoffice.org-langpack-ss_za, p-cpe:/a:centos:centos:openoffice.org-langpack-st_za, p-cpe:/a:centos:centos:openoffice.org-langpack-sv, p-cpe:/a:centos:centos:openoffice.org-langpack-ta_in, p-cpe:/a:centos:centos:openoffice.org-langpack-te_in, p-cpe:/a:centos:centos:openoffice.org-langpack-th_th, p-cpe:/a:centos:centos:openoffice.org-langpack-tn_za, p-cpe:/a:centos:centos:openoffice.org-langpack-tr_tr, p-cpe:/a:centos:centos:openoffice.org-langpack-ts_za, p-cpe:/a:centos:centos:openoffice.org-langpack-ur, p-cpe:/a:centos:centos:openoffice.org-langpack-ve_za, p-cpe:/a:centos:centos:openoffice.org-langpack-xh_za, p-cpe:/a:centos:centos:openoffice.org-langpack-zh_cn, p-cpe:/a:centos:centos:openoffice.org-langpack-zh_tw, p-cpe:/a:centos:centos:openoffice.org-langpack-zu_za, p-cpe:/a:centos:centos:openoffice.org-math, p-cpe:/a:centos:centos:openoffice.org-pyuno, p-cpe:/a:centos:centos:openoffice.org-sdk, p-cpe:/a:centos:centos:openoffice.org-sdk-doc, p-cpe:/a:centos:centos:openoffice.org-testtools, p-cpe:/a:centos:centos:openoffice.org-ure, p-cpe:/a:centos:centos:openoffice.org-writer, p-cpe:/a:centos:centos:openoffice.org-xsltfilter, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/7/2011

Vulnerability Publication Date: 1/28/2011

Reference Information

CVE: CVE-2010-3450, CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, CVE-2010-3689, CVE-2010-4253, CVE-2010-4643

RHSA: 2011:0182