Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2006-0573: openoffice.org


Vulnerability Assessment Details

RHSA-2006-0573: openoffice.org

Vulnerability Assessment Summary
Check for the version of the openoffice.org packages

Detailed Explanation for this Vulnerability Assessment


Updated openoffice.org packages are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation manager,
formula editor, and drawing program.

A Sun security specialist reported an issue with the application framework.
A possible hacker could put macros into document locations that could cause
OpenOffice.org to execute them when the file was opened by a victim.
(CVE-2006-2198)

A bug was found in the OpenOffice.org Java virtual machine implementation.
A possible hacker could write a carefully crafted Java applet that can break
through the "sandbox" and have full access to system resources with the
current user rights. (CVE-2006-2199)

A buffer overflow bug was found in the OpenOffice.org file processor. An
attacker could create a carefully crafted XML file that could cause
OpenOffice.org to write data to an arbitrary location in memory when the
file was opened by a victim. (CVE-2006-3117)

All users of OpenOffice.org are advised to upgrade to these updated
packages, which contain backported fixes for these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2006-0573.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


MITS Altair 680 Case Only LAST ONE LS3 picture

MITS Altair 680 Case Only LAST ONE LS3

$500.00



Bare S100 CPU Replacement for ALTAIR 8800 IMSAI 8080 JAIR Single Board Computer picture

Bare S100 CPU Replacement for ALTAIR 8800 IMSAI 8080 JAIR Single Board Computer

$42.00



MITS Altair 8800 Computer Bamboo  Reproduction Arduino Tested Working Assembled  picture

MITS Altair 8800 Computer Bamboo Reproduction Arduino Tested Working Assembled

$649.99



MITS ALTAIR 8800  Original Vintage Microcomputer picture

MITS ALTAIR 8800 Original Vintage Microcomputer

$6000.00



S-100 backplane motherboard bare PCB 9 slot (for Altair/IMSAI) picture

S-100 backplane motherboard bare PCB 9 slot (for Altair/IMSAI)

$30.00



MITS ALTAIR 8800  Original Vintage Microcomputer with 14 boards - Buy It Now picture

MITS ALTAIR 8800 Original Vintage Microcomputer with 14 boards - Buy It Now

$9500.00



MITS ALTAIR 8800  Original Vintage Microcomputer  S-100   Buy It Now $5999 picture

MITS ALTAIR 8800 Original Vintage Microcomputer S-100 Buy It Now $5999

$5999.00



Altair MITS 8800 CPU Parts Kit not IMSAI 8080 S100 (board NOT included) picture

Altair MITS 8800 CPU Parts Kit not IMSAI 8080 S100 (board NOT included)

$64.95



Vintage Altair 8088 CPU Wire Wrapped S100 Card w Mon EPROM circuit board #T71 picture

Vintage Altair 8088 CPU Wire Wrapped S100 Card w Mon EPROM circuit board #T71

$99.00



1974 Early Microcomputers by MITS Altair 8800's Ed Roberts HP-9810 Mark-8 Scelbi picture

1974 Early Microcomputers by MITS Altair 8800's Ed Roberts HP-9810 Mark-8 Scelbi

$55.00



Discussions

No Discussions have been posted on this vulnerability.