Description: | Description: The remote host is missing an update to openoffice.org announced via advisory MDVSA-2010:035.
This updates provides a new OpenOffice.org version 3.1.1. It holds security and bug fixes described as follow:
An integer underflow might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow (CVE-2009-0200).
A heap-based buffer overflow might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to table parsing (CVE-2009-0201).
A heap-based buffer overflow allows remote attackers to execute arbitrary code via a crafted EMF file (CVE-2009-2139).
Multiple heap-based buffer overflows allow remote attackers to execute arbitrary code via a crafted EMF+ file (CVE-2009-2140).
OpenOffice's xmlsec uses a bundled Libtool which might load .la file in the current working directory allowing local users to gain privileges via a Trojan horse file. For enabling such vulnerability xmlsec has to use --enable-crypto_dl building flag however it does not, although the fix keeps protected against this threat whenever that flag had been enabled (CVE-2009-3736).
Further this update provides following bug fixes:
OpenOffice.org is not properly configure to use the xdg-email functionality of the FreeDesktop standard (#52195).
As the template desktop icons are not properly set, it's not presented under the context menu of applications like Dolphin (#56439).
The Firefox plugin which enables viewing of OpenOffice documents inside the browser was not enabled.
Affected: 2009.1
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2010:035
Risk factor : Critical
CVSS Score: 9.3
|