This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
OpenOffice.org is an office productivity suite that includes desktop
applications, such as a word processor, spreadsheet application,
presentation manager, formula editor, and a drawing program.
OpenOffice.org embeds a copy of Raptor, which provides parsers for
Resource Description Framework (RDF) files.
An XML External Entity expansion flaw was found in the way Raptor
processed RDF files. If OpenOffice.org were to open a specially
crafted file (such as an OpenDocument Format or OpenDocument
Presentation file), it could possibly allow a remote attacker to
obtain a copy of an arbitrary local file that the user running
OpenOffice.org had access to. A bug in the way Raptor handled external
entities could cause OpenOffice.org to crash or, possibly, execute
arbitrary code with the privileges of the user running OpenOffice.org.
All OpenOffice.org users are advised to upgrade to these updated
packages, which contain backported patches to correct this issue. All
running instances of OpenOffice.org applications must be restarted for
this update to take effect.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.3
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 61287 ()
CVE ID: CVE-2012-0037
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.