RHEL 4 : openoffice.org and openoffice.org2 (RHSA-2011:0181)

high Nessus Plugin ID 51825

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated openoffice.org and openoffice.org2 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program.

An array index error and an integer signedness error were found in the way OpenOffice.org parsed certain Rich Text Format (RTF) files. An attacker could use these flaws to create a specially crafted RTF file that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-3451, CVE-2010-3452)

A heap-based buffer overflow flaw and an array index error were found in the way OpenOffice.org parsed certain Microsoft Office Word documents. An attacker could use these flaws to create a specially crafted Microsoft Office Word document that, when opened, would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-3453, CVE-2010-3454)

A heap-based buffer overflow flaw was found in the way OpenOffice.org parsed certain TARGA (Truevision TGA) files. An attacker could use this flaw to create a specially crafted TARGA file. If a document containing this specially crafted TARGA file was opened, or if a user tried to insert the file into an existing document, it would cause OpenOffice.org to crash or, possibly, execute arbitrary code with the privileges of the user running OpenOffice.org. (CVE-2010-4643)

A directory traversal flaw was found in the way OpenOffice.org handled the installation of XSLT filter descriptions packaged in Java Archive (JAR) files, as well as the installation of OpenOffice.org Extension (.oxt) files. An attacker could use these flaws to create a specially crafted XSLT filter description or extension file that, when opened, would cause the OpenOffice.org Extension Manager to modify files accessible to the user installing the JAR or extension file.
(CVE-2010-3450)

Red Hat would like to thank OpenOffice.org for reporting the CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, and CVE-2010-4643 issues. Upstream acknowledges Dan Rosenberg of Virtual Security Research as the original reporter of the CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, and CVE-2010-3454 issues.

All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
All running instances of OpenOffice.org applications must be restarted for this update to take effect.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2010-3450

https://access.redhat.com/security/cve/cve-2010-3451

https://access.redhat.com/security/cve/cve-2010-3452

https://access.redhat.com/security/cve/cve-2010-3453

https://access.redhat.com/security/cve/cve-2010-3454

https://access.redhat.com/security/cve/cve-2010-4643

https://access.redhat.com/errata/RHSA-2011:0181

Plugin Details

Severity: High

ID: 51825

File Name: redhat-RHSA-2011-0181.nasl

Version: 1.22

Type: local

Agent: unix

Published: 1/31/2011

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openoffice.org2-emailmerge, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-graphicfilter, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-impress, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-javafilter, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-af_za, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ar, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-bg_bg, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-bn, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ca_es, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ms_my, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-nb_no, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-nl, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-nn_no, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-pa_in, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-pl_pl, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-pt_br, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-pt_pt, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ru, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-sk_sk, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-sl_si, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-sr_cs, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-sv, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ta_in, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-th_th, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-tr_tr, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-zh_cn, p-cpe:/a:redhat:enterprise_linux:openoffice.org, p-cpe:/a:redhat:enterprise_linux:openoffice.org-i18n, p-cpe:/a:redhat:enterprise_linux:openoffice.org-kde, p-cpe:/a:redhat:enterprise_linux:openoffice.org-libs, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-base, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-calc, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-core, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-draw, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-cs_cz, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-cy_gb, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-da_dk, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-de, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-el_gr, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-es, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-et_ee, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-eu_es, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-fi_fi, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-fr, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ga_ie, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-gl_es, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-gu_in, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-he_il, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-hi_in, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-hr_hr, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-hu_hu, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-it, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ja_jp, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-ko_kr, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-lt_lt, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-zh_tw, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-langpack-zu_za, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-math, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-pyuno, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-testtools, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-writer, p-cpe:/a:redhat:enterprise_linux:openoffice.org2-xsltfilter, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/28/2011

Vulnerability Publication Date: 1/28/2011

Reference Information

CVE: CVE-2010-3450, CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454, CVE-2010-3689, CVE-2010-4253, CVE-2010-4643

RHSA: 2011:0181