Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: SuSE Local Security Checks --> Category: infos

SUSE-SA:2006:040: OpenOffice_org Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the OpenOffice_org package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory SUSE-SA:2006:040 (OpenOffice_org).

Following security problems were found and fixed in OpenOffice_org:

- CVE-2006-2198:

A security vulnerability in may make it possible to
inject basic code into documents which is executed upon loading
of the document. The user will not be asked or notified and the
macro will have full access to system resources with current user's
rights. As a result, the macro may delete/replace system files,
read/send private data and/or cause additional security issues.

Note that this attack works even with Macro execution disabled.

This attack allows remote attackers to modify files / execute code
as the user opening the document.

- CVE-2006-2199:

A security vulnerability related to documents
may allow certain Java applets to break through the 'sandbox'
and therefore have full access to system resources with current
user rights. The offending Applets may be constructed to
destroy/replace system files, read or send private data, and/or
cause additional security issues.

Since Java applet support is only there for historical reasons,
as StarOffice was providing browser support, the support has now
been disabled by default.

- CVE-2006-3117:

A buffer overflow in the XML UTF8 converter allows for a value to
be written to an arbitrary location in memory. This may lead to
command execution in the context of the current user.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.