CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
EPSS
Percentile
89.1%
The OpenOffice.org team has reported a vulnerability in how the 1.1 and 2.0 versions of OpenOffice.org handle certain Java applets.
OpenOffice.org is an office suite that is available for multiple operating systems, including Windows, Linux, Apple Mac OS X, and BSD. It includes components such as a word processor, spreadsheet, and presentation tool. It features the ability for documents to contain Java applets in addition to static data content.
The OpenOffice.org team has stated that there is a vulnerability in the 1.1 and 2.0 versions of OpenOffice.org that may allow some Java applets full access to the host operating system with the privileges of the user running OpenOffice.org.
To exploit this vulnerability, an attacker would need to convince a user to open a document with a specially crafted Java applet. If successful, the attacker could use the java applet to access the operating system with the privileges of the user who opened the document.
A malicious Java applet could change, delete, transmit, overwrite, and read data on the affected computer. It may also be possible for an attacker to remotely execute arbitrary code.
Upgrade
See the Systems Affected section of this document for information about specific vendors. Users who compile OpenOffice.org from source or get their binaries directly from OpenOffice.org are encouraged to upgrade to version 1.1.5 or 2.0.3.
Workarounds
Disable Java Applets
Disabling Java applets in OpenOffice documents will remove exposure to this vulnerability. The security advisory Sun Alert 102475 provides instructions on how to disable Java applets.
243681
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 12, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: July 12, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: July 20, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: July 12, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: July 12, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: July 14, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-2199 |
---|---|
Severity Metric: | 0.06 Date Public: |
www.securityfocus.com/bid/18737
rhn.redhat.com/errata/RHSA-2006-0573.html
secunia.com/advisories/20867/
secunia.com/advisories/20893/
secunia.com/advisories/20910/
secunia.com/advisories/20913/
secunia.com/advisories/20975/
sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1
www.auscert.org.au/6473
www.debian.org/security/2006/dsa-1104
www.mandriva.com/security/advisories?name=MDKSA-2006:075
www.novell.com/linux/security/advisories/2006_40_openoffice.html
www.openoffice.org/security/CVE-2006-2199.html
www.openoffice.org/security/CVE-2006-2199.html