openSUSE 10 Security Update : OpenOffice_org (OpenOffice_org-1698)

This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Following security problems were found in OpenOffice_org :

- CVE-2006-2198: A security vulnerability in
OpenOffice.org may make it possible to inject basic code
into documents which is executed upon loading of the
document. The user will not be asked or notified and the
macro will have full access to system resources with
current user's privileges. As a result, the macro may
delete/replace system files, read/send private data
and/or cause additional security issues.

Note that this attack works even with Macro execution
disabled.

This attack allows remote attackers to modify files /
execute code as the user opening the document.

- CVE-2006-2199: A security vulnerability related to
OpenOffice.org documents may allow certain Java applets
to break through the 'sandbox' and therefore have full
access to system resources with current user privileges.
The offending Applets may be constructed to
destroy/replace system files, read or send private data,
and/or cause additional security issues.

Since Java applet support is only there for historical
reasons, as StarOffice was providing browser support,
the support has nown been disabled by default.

- CVE-2006-3117: A buffer overflow in the XML utf8
converter allows for a value to be written to an
arbitrary location in memory. This may lead to command
execution in the context of the current user.

Solution :

Update the affected OpenOffice_org packages.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 27134 ()

Bugtraq ID:

CVE ID: CVE-2006-2198
CVE-2006-2199
CVE-2006-3117

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now