English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75803 CVE descriptions
and 40037 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59502
Category:Fedora Local Security Checks
Title:Fedora Core 5 FEDORA-2007-375 (openoffice.org)
Summary:Fedora Core 5 FEDORA-2007-375 (openoffice.org)
Description:
The remote host is missing an update to openoffice.org
announced via advisory FEDORA-2007-375.

OpenOffice.org is an Open Source, community-developed, multi-platform
office productivity suite. It includes the key desktop applications,
such as a word processor, spreadsheet, presentation manager, formula
editor and drawing program, with a user interface and feature set
similar to other office suites. Sophisticated and flexible,
OpenOffice.org also works transparently with a variety of file
formats, including Microsoft Office.

Usage: Simply type ooffice to run OpenOffice.org or select the
requested component (Writer, Calc, Draw, Impress, etc.) from your
desktop menu. On first start a few files will be installed in the
user's home, if necessary.

The OpenOffice.org team hopes you enjoy working with OpenOffice.org!

Update Information:

CVE-2007-0239 rhbz#228008 potential shell escape problem in
some hyperlinks
CVE-2007-0238 rhbz#226966 potential buffer overflows in calc
legacy file format

* Tue Feb 20 2007 Caolan McNamara - 1:2.0.2-5.21
- Resolves: CVE-2007-0239 rhbz#228008 shell escape
- Resolves: CVE-2007-0238 rhbz#226966 buffer overflows
* Mon Dec 4 2006 Caolan McNamara - 1:2.0.2-5.20
- Resolves: rhbz#217347 openoffice.org-2.1.0.ooo70042.wmfoverflow.svtools.patch
* Wed Sep 27 2006 Caolan McNamara - 1:2.0.2-5.19
- add openoffice.org-2.0.4.ooo69236.slideshow.esccrash.patch for rh#206177#
- add openoffice.org-2.0.4.ooo63086.vcl.focusfollowsmouse.patch for rh#206051#
* Tue Sep 5 2006 Caolan McNamara - 1:2.0.2-5.18
- add openoffice.org-2.0.3.ooo67740.xmlhelp.doublefree.patch
- add openoffice.org-2.0.4.ooo69213.xmlhelp.db4.patch
* Fri Jul 7 2006 Caolan McNamara - 1:2.0.2-5.17
- rh#197618# add openoffice.org-2.0.1.ooo64206.sfx2.saveas.patch
- add openoffice.org.2.0.3.ooo66510.shell.recentlyused.patch to make
~
/.recently-used safe
- add openoffice.org-2.0.3.rh187919.gtkunderkde.patch
- rh#198603# gcc ate my office suite, add openoffice.org-2.0.3.gcc28357.binfilter.constcrash.patch
- gcc#28370# I'm suspicious of these statics lately
* Fri Jun 30 2006 Caolan McNamara - 1:2.0.2-5.16
- CVE-2006-2198 macro security
- CVE-2006-2199 java applets
- CVE-2006-3117 corrupt file format
- rh#195637# add openoffice.org-2.0.3.ooo65519.printing.samba.patch
- add openoffice.org.2.0.3-ooo66018.cppuhelper.dangerousvisibility.patch to
fix visibility problem
* Thu Jun 8 2006 Caolan McNamara - 1:2.0.2-5.13
- rh#193918# add openoffice.org.2.0.3.ooo66067.embeddedobj.crash.patch

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-375

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0239
Debian Security Information: DSA-1270 (Google Search)
http://www.debian.org/security/2007/dsa-1270
http://www.gentoo.org/security/en/glsa/glsa-200704-12.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:073
http://www.redhat.com/support/errata/RHSA-2007-0033.html
http://www.redhat.com/support/errata/RHSA-2007-0069.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102807-1
SuSE Security Announcement: SUSE-SA:2007:023 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0007.html
http://www.ubuntu.com/usn/usn-444-1
BugTraq ID: 22812
http://www.securityfocus.com/bid/22812
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11422
http://www.vupen.com/english/advisories/2007/1032
http://www.vupen.com/english/advisories/2007/1117
http://www.securitytracker.com/id?1017799
http://secunia.com/advisories/24465
http://secunia.com/advisories/24550
http://secunia.com/advisories/24646
http://secunia.com/advisories/24647
http://secunia.com/advisories/24676
http://secunia.com/advisories/24810
http://secunia.com/advisories/24906
http://secunia.com/advisories/24588
http://secunia.com/advisories/24613
XForce ISS Database: openoffice-shell-command-execution(33113)
http://xforce.iss.net/xforce/xfdb/33113
Common Vulnerability Exposure (CVE) ID: CVE-2007-0238
Bugtraq: 20070404 High Risk Vulnerability in OpenOffice (Google Search)
http://www.securityfocus.com/archive/1/archive/1/464724/100/0/threaded
http://www.ngssoftware.com/advisories/high-risk-vulnerabilities-in-the-openoffice-suite/
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102794-1
BugTraq ID: 23067
http://www.securityfocus.com/bid/23067
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8968
XForce ISS Database: openoffice-starcalc-bo(33112)
http://xforce.iss.net/xforce/xfdb/33112
Common Vulnerability Exposure (CVE) ID: CVE-2006-2198
Bugtraq: 20060926 rPSA-2006-0173-1 openoffice.org (Google Search)
http://www.securityfocus.com/archive/1/archive/1/447035/100/0/threaded
Debian Security Information: DSA-1104 (Google Search)
http://www.debian.org/security/2006/dsa-1104
http://fedoranews.org/cms/node/2343
http://security.gentoo.org/glsa/glsa-200607-12.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:118
http://www.redhat.com/support/errata/RHSA-2006-0573.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102490-1
SuSE Security Announcement: SUSE-SA:2006:040 (Google Search)
http://www.novell.com/linux/security/advisories/2006_40_openoffice.html
http://www.ubuntu.com/usn/usn-313-1
http://www.ubuntu.com/usn/usn-313-2
CERT/CC vulnerability note: VU#170113
http://www.kb.cert.org/vuls/id/170113
BugTraq ID: 18738
http://www.securityfocus.com/bid/18738
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11082
http://www.vupen.com/english/advisories/2006/2607
http://www.vupen.com/english/advisories/2006/2621
http://securitytracker.com/id?1016414
http://secunia.com/advisories/20867
http://secunia.com/advisories/20893
http://secunia.com/advisories/20911
http://secunia.com/advisories/20913
http://secunia.com/advisories/20910
http://secunia.com/advisories/20975
http://secunia.com/advisories/20995
http://secunia.com/advisories/21278
http://secunia.com/advisories/22129
http://secunia.com/advisories/23620
XForce ISS Database: openoffice-macro-code-execution(27564)
http://xforce.iss.net/xforce/xfdb/27564
Common Vulnerability Exposure (CVE) ID: CVE-2006-2199
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1
CERT/CC vulnerability note: VU#243681
http://www.kb.cert.org/vuls/id/243681
BugTraq ID: 18737
http://www.securityfocus.com/bid/18737
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11338
XForce ISS Database: openoffice-applet-sandbox-bypass(27569)
http://xforce.iss.net/xforce/xfdb/27569
Common Vulnerability Exposure (CVE) ID: CVE-2006-3117
http://www.ngssoftware.com/advisories/openoffice.txt
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1
BugTraq ID: 18739
http://www.securityfocus.com/bid/18739
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9704
XForce ISS Database: openoffice-xml-document-bo(27571)
http://xforce.iss.net/xforce/xfdb/27571
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.