FreeBSD : openoffice -- DOC document heap overflow vulnerability (b206dd82-ac67-11d9-a788-0001020eed82)

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

AD-LAB reports that a heap-based buffer overflow vulnerability exists
in OpenOffice's handling of DOC documents. When reading a DOC document
16 bit from a 32 bit integer is used for memory allocation, but the
full 32 bit is used for further processing of the document. This can
allow an attacker to crash OpenOffice, or potentially execute
arbitrary code as the user running OpenOffice, by tricking an user
into opening a specially crafted DOC document.

See also :

http://marc.info/?l=bugtraq&m=111325305109137
http://www.openoffice.org/issues/show_bug.cgi?id=46388
http://www.nessus.org/u?429f5d41

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19084 (freebsd_pkg_b206dd82ac6711d9a7880001020eed82.nasl)

Bugtraq ID: 13092

CVE ID: CVE-2005-0941

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now