This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated openoffice.org packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System
(CVSS) base score, which gives a detailed severity rating, is
available from the CVE link in the References section.
OpenOffice.org is an office productivity suite that includes desktop
applications, such as a word processor, spreadsheet application,
presentation manager, formula editor, and a drawing program.
OpenOffice.org embeds a copy of Raptor, which provides parsers for
Resource Description Framework (RDF) files.
An XML External Entity expansion flaw was found in the way Raptor
processed RDF files. If OpenOffice.org were to open a specially
crafted file (such as an OpenDocument Format or OpenDocument
Presentation file), it could possibly allow a remote attacker to
obtain a copy of an arbitrary local file that the user running
OpenOffice.org had access to. A bug in the way Raptor handled external
entities could cause OpenOffice.org to crash or, possibly, execute
arbitrary code with the privileges of the user running OpenOffice.org.
Red Hat would like to thank Timothy D. Morgan of VSR for reporting
All OpenOffice.org users are advised to upgrade to these updated
packages, which contain backported patches to correct this issue. All
running instances of OpenOffice.org applications must be restarted for
this update to take effect.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 58442 ()
Bugtraq ID: 52681
CVE ID: CVE-2012-0037
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.