VID |
28200 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The host has been detected as installed a version of OpenOffice.org which is older than version 2.2.1. OpenOffice.org (OOo) Office Suite versions prior to 2.2.1 could allow a user-assisted remote attacker to execute arbitrary code on the affected host, caused by a heap-based buffer overflow vulnerability in its handling of RTF files. By convincing a user to open a specially-crafted RTF file, a remote attacker could execute arbitrary code on the host or cause the application to crash. If the user is logged in with administrative privileges, the attacker could take complete control of a vulnerable system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.openoffice.org/issues/show_bug.cgi?id=77214 http://archives.neohapsis.com/archives/bugtraq/2007-06/0170.html http://www.frsirt.com/english/advisories/2007/2166 http://www.frsirt.com/english/advisories/2007/2229 http://securitytracker.com/alerts/2007/Jun/1018239.html http://secunia.com/advisories/25648
* Platforms Affected: OpenOffice.org Source Project, OpenOffice.org Office Suite versions prior to 2.2.1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of OpenOffice (2.2.1 or later), available from the OpenOffice.org Download Web site at http://download.openoffice.org/index.html |
Related URL |
CVE-2007-0245 (CVE) |
Related URL |
24450 (SecurityFocus) |
Related URL |
34843 (ISS) |
|