Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:040: OpenOffice_org


Vulnerability Assessment Details

SUSE-SA:2006:040: OpenOffice_org

Vulnerability Assessment Summary
Check for the version of the OpenOffice_org package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:040 (OpenOffice_org).


Following security problems were found and fixed in OpenOffice_org:

- CVE-2006-2198:

A security vulnerability in OpenOffice.org may make it possible to
inject basic code into documents which is executed upon loading
of the document. The user will not be asked or notified and the
macro will have full access to system resources with current user's
rights. As a result, the macro may delete/replace system files,
read/send private data and/or cause additional security issues.

Note that this attack works even with Macro execution disabled.

This attack permits remote attackers to modify files / execute code
as the user opening the document.

- CVE-2006-2199:

A security vulnerability related to OpenOffice.org documents
may permit certain Java applets to break through the 'sandbox'
and therefore have full access to system resources with current
user rights. The offending Applets may be constructed to
destroy/replace system files, read or send private data, and/or
cause additional security issues.

Since Java applet support is only there for historical reasons,
as StarOffice was providing browser support, the support has now
been disabled by default.

- CVE-2006-3117:

A buffer overflow in the XML UTF8 converter permits for a value to
be written to an arbitrary location in memory. This may lead to
command execution in the context of the current user.



Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_40_openoffice.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

BookCase Book-Case/Cover/Pouch for Samsung SM-T550XXU1AOD1 Galaxy Tab A/TabA 9.7
$20.33
BookCase Book-Case/Cover/Pouch for Samsung SM-T550XXU1AOD1 Galaxy Tab A/TabA 9.7 pictureCASE COVER STAND POUCH PU LEATHER BLACK SAMSUNG GALAXY NOTE 8.0 8" N5100 N5110
$4.39
CASE COVER STAND POUCH PU LEATHER BLACK SAMSUNG GALAXY NOTE 8.0 8[SAMSUNG]Notebook 9 Always NT900X5N-X516 15" 7th i5-7200U FHD RAM 16GB 256GB SSD
$1819.99
[SAMSUNG]Notebook 9 Always NT900X5N-X516 15NIB - Belkin Cinema Leather Folio W/ Stand (Samsung Galaxy Tab 2 10.1) - 80824
$1.5
NIB - Belkin Cinema Leather Folio W/ Stand (Samsung Galaxy Tab 2 10.1) - 80824 picture


Discussions

No Discussions have been posted on this vulnerability.