Lucene search

K
gentooGentoo FoundationGLSA-200607-12
HistoryJul 28, 2006 - 12:00 a.m.

OpenOffice.org: Multiple vulnerabilities

2006-07-2800:00:00
Gentoo Foundation
security.gentoo.org
17

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

88.9%

Background

OpenOffice.org is an open source office productivity suite, including word processing, spreadsheet, presentation, drawing, data charting, formula editing, and file conversion facilities.

Description

Internal security audits by OpenOffice.org have discovered three security vulnerabilities related to Java applets, macros and the XML file format parser.

  • Specially crafted Java applets can break through the “sandbox”.
  • Specially crafted macros make it possible to inject BASIC code into documents which is executed when the document is loaded.
  • Loading a malformed XML file can cause a buffer overflow.

Impact

An attacker might exploit these vulnerabilities to escape the Java sandbox, execute arbitrary code or BASIC code with the permissions of the user running OpenOffice.org.

Workaround

Disabling Java applets will protect against the vulnerability in the handling of Java applets. There are no workarounds for the macro and file format vulnerabilities.

Resolution

All OpenOffice.org users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-office/openoffice< 2.0.3UNKNOWN
Gentooanyallapp-office/openoffice-bin< 2.0.3UNKNOWN

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

88.9%