Lucene search

K
certCERTVU:220288
HistoryJan 05, 2007 - 12:00 a.m.

OpenOffice fails to properly process WMF and EMF files

2007-01-0500:00:00
www.kb.cert.org
15

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.118

Percentile

95.3%

Overview

Multiple buffer overflow vulnerabilities exist in the OpenOffice.org office suite. If successfully exploited, these vulnerabilities may allow an attacker to execute arbitrary code on a vulnerable system.

Description

OpenOffice.org is a free office suite that is available for multiple operating systems.

Windows Metafile (WMF) is a vector graphics format that was designed by Microsoft for Windows 3.0. A newer version of WMF, known as Enhanced Metafile (EMF) was designed for 32-bit operating systems.

OpenOffice.org supports importing and exporting to WMF and EMF files. There are multiple errors within the handling of the EMR_POLYPOLYGON, EMR_POLYPOLYGON16, and META_ESCAPE records that may result in a buffer overflow. An attacker may be able to exploit these vulnerabilities by convincing a user to open a specially crafted WMF or EMF file that triggers the overflow.

Note that Sun StarOffice versions 6, 7, and 8 are also vulnerable.


Impact

A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.


Solution

Upgrade
OpenOffice.org has issued an update to address these issues in version 2.0.4. The OpenOffice team has reported that this issue does not affect version 2.1. The update is available for all operating systems supported by the OpenOffice.org team.

StarOffice users and administrators should see the Sunsolve support site for more details about available updates…


Do not run OpenOffice or StarOffice with superuser privileges
Running OpenOffice or StarOffice with a non-privileged user account may mitigate the affects of this vulnerability.


Vendor Information

220288

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

OpenOffice.org Affected

Updated: January 05, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Sun Microsystems, Inc. __ Affected

Updated: June 06, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://sunsolve.sun.com/search/document.do?assetkey=1-26-102735-1&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23220288 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to the OpenOffice.org team for information used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-5870
Date Public: 2007-01-04 Date First Published:

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.118

Percentile

95.3%