SynopsisThe remote Windows host has an application installed that is affected by multiple vulnerabilities.
Descriptionhe version of Apache OpenOffice installed on the remote host is a version prior to 4.1.11. It is, therefore, affected by multiple vulnerabilities :
- Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a 'Billion Laughs' entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched. (CVE-2021-40439)
- While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. This both caused issues with desktop integration and could allow a crafted attack on files owned by that user or group if they exist. Users who installed the Apache OpenOffice 4.1.8 DEB packaging should upgrade to the latest version of Apache OpenOffice. (CVE-2021-28129)
- Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10. (CVE-2021-33035)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
SolutionUpgrade to Apache OpenOffice version 4.1.11 or later.
File Name: openoffice_4111.nasl
Supported Sensors: Nessus Agent
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Required KB Items: installed_sw/OpenOffice
Exploit Ease: No known exploits are available
Patch Publication Date: 10/11/2021
Vulnerability Publication Date: 4/7/2021