Sun OpenOffice.org < 3.2 Multiple Vulnerabilities

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a program affected by multiple buffer
overflows.

Description :

The version of Sun Microsystems OpenOffice.org installed on the
remote host is prior to version 3.2. It is, therefore, affected by
several issues :

- Signatures may not be handled properly due to a
vulnerability in the libxml2 library. (CVE-2006-4339)

- There is an HMAC truncation authentication bypass
vulnerability in the libxmlsec library. (CVE-2009-0217)

- The application is bundled with a vulnerable version of
the Microsoft VC++ runtime. (CVE-2009-2493)

- Specially crafted XPM files are not processed properly,
which could lead to arbitrary code execution.
(CVE-2009-2949)

- Specially crafted GIF files are not processed properly,
which could lead to arbitrary code execution.
(CVE-2009-2950)

- Specially crafted Microsoft Word documents are not
processed properly, which could lead to arbitrary code
execution. (CVE-2009-3301 / CVE-2009-3302)

See also :

http://www.openoffice.org/security/cves/CVE-2006-4339.html
http://www.openoffice.org/security/cves/CVE-2009-0217.html
http://www.openoffice.org/security/cves/CVE-2009-2493.html
http://www.openoffice.org/security/cves/CVE-2009-2949.html
http://www.openoffice.org/security/cves/CVE-2009-2950.html
http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html

Solution :

Upgrade to Sun Microsystems OpenOffice.org version 3.2 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now