Lucene search

K
centosCentOS ProjectCESA-2006:0573
HistoryJul 04, 2006 - 5:29 a.m.

openoffice.org security update

2006-07-0405:29:17
CentOS Project
lists.centos.org
48

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

88.9%

CentOS Errata and Security Advisory CESA-2006:0573

OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation manager,
formula editor, and drawing program.

A Sun security specialist reported an issue with the application framework.
An attacker could put macros into document locations that could cause
OpenOffice.org to execute them when the file was opened by a victim.
(CVE-2006-2198)

A bug was found in the OpenOffice.org Java virtual machine implementation.
An attacker could write a carefully crafted Java applet that can break
through the “sandbox” and have full access to system resources with the
current user privileges. (CVE-2006-2199)

A buffer overflow bug was found in the OpenOffice.org file processor. An
attacker could create a carefully crafted XML file that could cause
OpenOffice.org to write data to an arbitrary location in memory when the
file was opened by a victim. (CVE-2006-3117)

All users of OpenOffice.org are advised to upgrade to these updated
packages, which contain backported fixes for these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-July/075151.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075152.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075153.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075154.html

Affected packages:
openoffice.org
openoffice.org-i18n
openoffice.org-kde
openoffice.org-libs

Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0573

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

88.9%