Lucene search

K
certCERTVU:243681
HistoryJul 20, 2006 - 12:00 a.m.

OpenOffice.org may fail to properly contain certain Java applets

2006-07-2000:00:00
www.kb.cert.org
18

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

89.0%

Overview

The OpenOffice.org team has reported a vulnerability in how the 1.1 and 2.0 versions of OpenOffice.org handle certain Java applets.

Description

OpenOffice.org is an office suite that is available for multiple operating systems, including Windows, Linux, Apple Mac OS X, and BSD. It includes components such as a word processor, spreadsheet, and presentation tool. It features the ability for documents to contain Java applets in addition to static data content.

The OpenOffice.org team has stated that there is a vulnerability in the 1.1 and 2.0 versions of OpenOffice.org that may allow some Java applets full access to the host operating system with the privileges of the user running OpenOffice.org.

To exploit this vulnerability, an attacker would need to convince a user to open a document with a specially crafted Java applet. If successful, the attacker could use the java applet to access the operating system with the privileges of the user who opened the document.


Impact

A malicious Java applet could change, delete, transmit, overwrite, and read data on the affected computer. It may also be possible for an attacker to remotely execute arbitrary code.


Solution

Upgrade
See the Systems Affected section of this document for information about specific vendors. Users who compile OpenOffice.org from source or get their binaries directly from OpenOffice.org are encouraged to upgrade to version 1.1.5 or 2.0.3.


Workarounds

Disable Java Applets
Disabling Java applets in OpenOffice documents will remove exposure to this vulnerability. The security advisory Sun Alert 102475 provides instructions on how to disable Java applets.


Vendor Information

243681

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Debian GNU/Linux Affected

Updated: July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Mandriva, Inc. Affected

Updated: July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

OpenOffice.org Affected

Updated: July 20, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Red Hat, Inc. Affected

Updated: July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

SUSE Linux Affected

Updated: July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Sun Microsystems, Inc. Affected

Updated: July 14, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-2199
Severity Metric: 0.06 Date Public:

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

89.0%