Vulnerabilities > CVE-2012-2665 - Out-of-bounds Write vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple heap-based buffer overflows in the XML manifest encryption tag parsing functionality in OpenOffice.org and LibreOffice before 3.5.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Open Document Text (.odt) file with (1) a child tag within an incorrect parent tag, (2) duplicate tags, or (3) a Base64 ChecksumAttribute whose length is not evenly divisible by four.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2012-123.NASL description A Security issue was identified and fixed in libreoffice : Multiple heap-based buffer overflow flaws were found in the XML manifest encryption tag parsing code of LibreOffice. An attacker could create a specially crafted file in the Open Document Format for Office Applications (ODF) format which when opened could cause arbitrary code execution (CVE-2012-2665). libreoffice for Mandriva Linux 2011 has been upgraded to the 3.5.5 version which is not vulnerable to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 61973 published 2012-09-06 reporter This script is Copyright (C) 2012-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/61973 title Mandriva Linux Security Advisory : libreoffice (MDVSA-2012:123) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2012:123. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(61973); script_version("1.8"); script_cvs_date("Date: 2019/08/02 13:32:54"); script_cve_id("CVE-2012-2665"); script_bugtraq_id(54769); script_xref(name:"MDVSA", value:"2012:123"); script_name(english:"Mandriva Linux Security Advisory : libreoffice (MDVSA-2012:123)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A Security issue was identified and fixed in libreoffice : Multiple heap-based buffer overflow flaws were found in the XML manifest encryption tag parsing code of LibreOffice. An attacker could create a specially crafted file in the Open Document Format for Office Applications (ODF) format which when opened could cause arbitrary code execution (CVE-2012-2665). libreoffice for Mandriva Linux 2011 has been upgraded to the 3.5.5 version which is not vulnerable to this issue." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64exttextcat-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64exttextcat0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libexttextcat-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libexttextcat-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libexttextcat0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-calc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-core"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-devel-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-draw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-dtd-officedocument1.0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-filter-binfilter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-gnome"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-bg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-bn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-bs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-ca"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-cs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-da"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-de"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-dz"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-el"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-en_GB"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-en_US"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-es"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-et"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-eu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-fi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-fr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-gl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-gu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-he"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-hi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-hr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-hu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-it"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-ja"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-ko"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-mk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-nb"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-nl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-nn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-pl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-pt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-pt_BR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-ru"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-si"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-sk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-sl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-sv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-tr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-uk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-zh_CN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-help-zh_TW"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-impress"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-java-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-kde4"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-af"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ar"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-as"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-bg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-bn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-br"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-bs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ca"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-cs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-cy"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-da"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-de"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-dz"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-el"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-en_GB"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-es"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-et"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-eu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-fa"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-fi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-fr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ga"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-gl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-gu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-he"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-hi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-hr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-hu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-it"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ja"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-kn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ko"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-lt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-lv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-mai"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-mk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ml"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-mr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-nb"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-nl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-nn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-nr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-nso"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-or"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-pa_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-pl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-pt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-pt_BR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ro"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ru"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-sh"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-si"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-sk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-sl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-sr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ss"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-st"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-sv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ta"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-te"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-th"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-tn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-tr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ts"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-uk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-ve"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-xh"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-zh_CN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-zh_TW"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-l10n-zu"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-math"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-openclipart"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-pdfimport"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-postgresql"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-presentation-minimizer"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-presenter-screen"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-pyuno"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-report-builder"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-style-crystal"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-style-galaxy"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-style-hicontrast"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-style-oxygen"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-style-tango"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-wiki-publisher"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libreoffice-writer"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2011"); script_set_attribute(attribute:"patch_publication_date", value:"2012/08/04"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64exttextcat-devel-3.3.1-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64exttextcat0-3.3.1-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libexttextcat-devel-3.3.1-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libexttextcat-tools-3.3.1-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libexttextcat0-3.3.1-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-base-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-calc-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-common-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-core-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-devel-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-devel-doc-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-draw-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-dtd-officedocument1.0-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-filter-binfilter-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-gnome-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-bg-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-bn-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-bs-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-ca-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-cs-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-da-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-de-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-dz-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-el-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-en_GB-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-en_US-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-es-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-et-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-eu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-fi-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-fr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-gl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-gu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-he-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-hi-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-hr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-hu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-it-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-ja-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-ko-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-mk-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-nb-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-nl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-nn-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-pl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-pt-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-pt_BR-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-ru-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-si-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-sk-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-sl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-sv-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-tr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-uk-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-zh_CN-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-help-zh_TW-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-impress-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-java-common-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-kde4-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-af-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ar-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-as-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-bg-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-bn-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-br-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-bs-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ca-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-cs-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-cy-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-da-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-de-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-dz-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-el-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-en_GB-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-es-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-et-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-eu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-fa-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-fi-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-fr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ga-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-gl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-gu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-he-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-hi-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-hr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-hu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-it-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ja-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-kn-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ko-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-lt-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-lv-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-mai-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-mk-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ml-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-mr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-nb-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-nl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-nn-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-nr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-nso-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-or-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-pa_IN-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-pl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-pt-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-pt_BR-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ro-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ru-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-sh-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-si-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-sk-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-sl-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-sr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ss-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-st-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-sv-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ta-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-te-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-th-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-tn-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-tr-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ts-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-uk-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-ve-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-xh-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-zh_CN-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-zh_TW-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-l10n-zu-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-math-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-openclipart-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-pdfimport-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-postgresql-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-presentation-minimizer-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-presenter-screen-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-pyuno-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-report-builder-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-style-crystal-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-style-galaxy-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-style-hicontrast-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-style-oxygen-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-style-tango-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-wiki-publisher-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2011", reference:"libreoffice-writer-3.5.5-0.1-mdv2011.0", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-1537-1.NASL description It was discovered that OpenOffice.org incorrectly handled certain encryption tags in Open Document Text (.odt) files. If a user were tricked into opening a specially crafted file, an attacker could cause OpenOffice.org to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 61526 published 2012-08-14 reporter Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61526 title Ubuntu 10.04 LTS : openoffice.org vulnerability (USN-1537-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-1537-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(61526); script_version("1.8"); script_cvs_date("Date: 2019/09/19 12:54:28"); script_cve_id("CVE-2012-2665"); script_bugtraq_id(54769); script_xref(name:"USN", value:"1537-1"); script_name(english:"Ubuntu 10.04 LTS : openoffice.org vulnerability (USN-1537-1)"); script_summary(english:"Checks dpkg output for updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Ubuntu host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "It was discovered that OpenOffice.org incorrectly handled certain encryption tags in Open Document Text (.odt) files. If a user were tricked into opening a specially crafted file, an attacker could cause OpenOffice.org to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/1537-1/" ); script_set_attribute( attribute:"solution", value:"Update the affected openoffice.org-core package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:openoffice.org-core"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:10.04:-:lts"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/06"); script_set_attribute(attribute:"patch_publication_date", value:"2012/08/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/14"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! preg(pattern:"^(10\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 10.04", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"10.04", pkgname:"openoffice.org-core", pkgver:"1:3.2.0-7ubuntu4.4")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openoffice.org-core"); }
NASL family MacOS X Local Security Checks NASL id MACOSX_LIBREOFFICE_355.NASL description A version of LibreOffice prior to 3.5.5 is installed on the remote Mac OS X host. It is, therefore, reportedly affected by multiple heap-based buffer overflow vulnerabilities related to XML manifest handling : - An error exists related to handling the XML tag hierarchy. - A boundary error exists when handling the duplication of certain unspecified XML tags. - An error exists in the base64 decoder related to XML export actions. last seen 2020-06-01 modified 2020-06-02 plugin id 61433 published 2012-08-06 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61433 title LibreOffice < 3.5.5 Multiple Heap-Based Buffer Overflows (Mac OS X) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(61433); script_version("1.5"); script_cvs_date("Date: 2019/12/04"); script_cve_id("CVE-2012-2665"); script_bugtraq_id(54769); script_name(english:"LibreOffice < 3.5.5 Multiple Heap-Based Buffer Overflows (Mac OS X)"); script_summary(english:"Checks version of LibreOffice"); script_set_attribute(attribute:"synopsis", value: "The remote host contains an application that is affected by multiple buffer overflow vulnerabilities."); script_set_attribute(attribute:"description", value: "A version of LibreOffice prior to 3.5.5 is installed on the remote Mac OS X host. It is, therefore, reportedly affected by multiple heap-based buffer overflow vulnerabilities related to XML manifest handling : - An error exists related to handling the XML tag hierarchy. - A boundary error exists when handling the duplication of certain unspecified XML tags. - An error exists in the base64 decoder related to XML export actions."); # http://blog.documentfoundation.org/2012/07/11/libreoffice-3-5-5-is-available/ script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bc6741ee"); script_set_attribute(attribute:"see_also", value:"http://www.libreoffice.org/advisories/CVE-2012-2665/"); script_set_attribute(attribute:"solution", value: "Upgrade to LibreOffice version 3.5.5 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-2665"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/02"); script_set_attribute(attribute:"patch_publication_date", value:"2012/07/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/06"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:libreoffice:libreoffice"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("macosx_libreoffice_installed.nasl"); script_require_keys("MacOSX/LibreOffice/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); kb_base = "MacOSX/LibreOffice"; get_kb_item_or_exit(kb_base+"/Installed"); path = get_kb_item_or_exit(kb_base+"/Path", exit_code:1); version = get_kb_item_or_exit(kb_base+"/Version", exit_code:1); ver = split(version, sep:".", keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); if ( # nb: first release of LibreOffice was 3.3.0. ver[0] == 3 && ( ver[1] < 5 || (ver[1] == 5 && ver[2] < 5) # < 3.5.5 ) ) { if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + version + '\n Fixed version : 3.5.5\n'; security_hole(port:0, extra:report); } else security_hole(0); exit(0); } else audit(AUDIT_INST_PATH_NOT_VULN, "LibreOffice", version, path);
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201408-19.NASL description The remote host is affected by the vulnerability described in GLSA-201408-19 (OpenOffice, LibreOffice: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in OpenOffice and Libreoffice. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted file using OpenOffice, possibly resulting in execution of arbitrary code with the privileges of the process, a Denial of Service condition, execution of arbitrary Python code, authentication bypass, or reading and writing of arbitrary files. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 77467 published 2014-09-01 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/77467 title GLSA-201408-19 : OpenOffice, LibreOffice: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201408-19. # # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(77467); script_version("1.10"); script_cvs_date("Date: 2019/08/12 17:35:38"); script_cve_id("CVE-2006-4339", "CVE-2009-0200", "CVE-2009-0201", "CVE-2009-0217", "CVE-2009-2949", "CVE-2009-2950", "CVE-2009-3301", "CVE-2009-3302", "CVE-2010-0395", "CVE-2010-2935", "CVE-2010-2936", "CVE-2010-3450", "CVE-2010-3451", "CVE-2010-3452", "CVE-2010-3453", "CVE-2010-3454", "CVE-2010-3689", "CVE-2010-4253", "CVE-2010-4643", "CVE-2011-2713", "CVE-2012-0037", "CVE-2012-1149", "CVE-2012-2149", "CVE-2012-2334", "CVE-2012-2665", "CVE-2014-0247"); script_bugtraq_id(35671, 36200, 38218, 40599, 42202, 46031, 49969, 52681, 53570, 54769, 68151); script_xref(name:"GLSA", value:"201408-19"); script_name(english:"GLSA-201408-19 : OpenOffice, LibreOffice: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201408-19 (OpenOffice, LibreOffice: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in OpenOffice and Libreoffice. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted file using OpenOffice, possibly resulting in execution of arbitrary code with the privileges of the process, a Denial of Service condition, execution of arbitrary Python code, authentication bypass, or reading and writing of arbitrary files. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201408-19" ); script_set_attribute( attribute:"solution", value: "All OpenOffice (binary) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=app-office/openoffice-bin-3.5.5.3' All LibreOffice users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=app-office/libreoffice-4.2.5.2' All LibreOffice (binary) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=app-office/libreoffice-bin-4.2.5.2' We recommend that users unmerge OpenOffice: # emerge --unmerge 'app-office/openoffice'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_cwe_id(94, 119, 189, 310); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:libreoffice"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:libreoffice-bin"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:openoffice"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:openoffice-bin"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/05"); script_set_attribute(attribute:"patch_publication_date", value:"2014/08/31"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/01"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"app-office/libreoffice", unaffected:make_list("ge 4.2.5.2"), vulnerable:make_list("lt 4.2.5.2"))) flag++; if (qpkg_check(package:"app-office/libreoffice-bin", unaffected:make_list("ge 4.2.5.2"), vulnerable:make_list("lt 4.2.5.2"))) flag++; if (qpkg_check(package:"app-office/openoffice-bin", unaffected:make_list("ge 3.5.5.3"), vulnerable:make_list("lt 3.5.5.3"))) flag++; if (qpkg_check(package:"app-office/openoffice", unaffected:make_list(), vulnerable:make_list("le 3.5.5.3"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "OpenOffice / LibreOffice"); }
NASL family Scientific Linux Local Security Checks NASL id SL_20120801_OPENOFFICE_ORG_ON_SL5_X.NASL description OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way OpenOffice.org processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in an OpenOffice.org application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of OpenOffice.org applications must be restarted for this update to take effect. last seen 2020-03-18 modified 2012-08-03 plugin id 61410 published 2012-08-03 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61410 title Scientific Linux Security Update : openoffice.org on SL5.x i386/x86_64 (20120801) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text is (C) Scientific Linux. # include("compat.inc"); if (description) { script_id(61410); script_version("1.6"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12"); script_cve_id("CVE-2012-2665"); script_name(english:"Scientific Linux Security Update : openoffice.org on SL5.x i386/x86_64 (20120801)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Scientific Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way OpenOffice.org processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in an OpenOffice.org application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of OpenOffice.org applications must be restarted for this update to take effect." ); # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1208&L=scientific-linux-errata&T=0&P=595 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?0efbf5a4" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-calc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-core"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-draw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-emailmerge"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-graphicfilter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-headless"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-impress"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-javafilter"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-af_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ar"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-as_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-bg_BG"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-bn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ca_ES"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-cs_CZ"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-cy_GB"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-da_DK"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-de"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-el_GR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-es"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-et_EE"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-eu_ES"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-fi_FI"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-fr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ga_IE"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-gl_ES"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-gu_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-he_IL"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-hi_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-hr_HR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-hu_HU"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-it"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ja_JP"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-kn_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ko_KR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-lt_LT"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ml_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-mr_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ms_MY"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-nb_NO"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-nl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-nn_NO"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-nr_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-nso_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-or_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-pa_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-pl_PL"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-pt_BR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-pt_PT"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ru"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-sk_SK"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-sl_SI"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-sr_CS"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ss_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-st_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-sv"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ta_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-te_IN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-th_TH"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-tn_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-tr_TR"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ts_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ur"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-ve_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-xh_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-zh_CN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-zh_TW"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-langpack-zu_ZA"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-math"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-pyuno"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-sdk"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-sdk-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-testtools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-ure"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-writer"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:openoffice.org-xsltfilter"); script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/06"); script_set_attribute(attribute:"patch_publication_date", value:"2012/08/01"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/03"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Scientific Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux"); os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux"); os_ver = os_ver[1]; if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 5.x", "Scientific Linux " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu); flag = 0; if (rpm_check(release:"SL5", reference:"openoffice.org-base-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-calc-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-core-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-debuginfo-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-draw-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-emailmerge-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-graphicfilter-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-headless-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-impress-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-javafilter-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-af_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ar-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-as_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-bg_BG-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-bn-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ca_ES-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-cs_CZ-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-cy_GB-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-da_DK-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-de-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-el_GR-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-es-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-et_EE-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-eu_ES-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-fi_FI-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-fr-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ga_IE-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-gl_ES-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-gu_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-he_IL-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-hi_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-hr_HR-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-hu_HU-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-it-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ja_JP-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-kn_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ko_KR-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-lt_LT-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ml_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-mr_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ms_MY-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-nb_NO-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-nl-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-nn_NO-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-nr_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-nso_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-or_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-pa_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-pl_PL-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-pt_BR-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-pt_PT-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ru-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-sk_SK-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-sl_SI-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-sr_CS-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ss_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-st_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-sv-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ta_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-te_IN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-th_TH-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-tn_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-tr_TR-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ts_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ur-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-ve_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-xh_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-zh_CN-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-zh_TW-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-langpack-zu_ZA-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-math-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-pyuno-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-sdk-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-sdk-doc-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-testtools-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-ure-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-writer-3.1.1-19.10.el5_8.4")) flag++; if (rpm_check(release:"SL5", reference:"openoffice.org-xsltfilter-3.1.1-19.10.el5_8.4")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openoffice.org-base / openoffice.org-calc / openoffice.org-core / etc"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2012-11402.NASL description Multiple heap-based buffer overflow flaws were found in the XML manifest encryption tag parsing code of LibreOffice. An attacker could create a specially crafted file in the Open Document Format for Office Applications (ODF) format which when opened could cause arbitrary code execution. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-03-17 modified 2012-08-13 plugin id 61498 published 2012-08-13 reporter This script is Copyright (C) 2012-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/61498 title Fedora 16 : libreoffice-3.4.5.2-18.fc16 (2012-11402) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201209-05.NASL description The remote host is affected by the vulnerability described in GLSA-201209-05 (LibreOffice: Multiple vulnerabilities) Multiple vulnerabilities have been found in LibreOffice: The Microsoft Word Document parser contains an out-of-bounds read error (CVE-2011-2713). The Raptor RDF parser contains an XML External Entity expansion error (CVE-2012-0037). The graphic loading parser contains an integer overflow error which could cause a heap-based buffer overflow (CVE-2012-1149). Multiple errors in the XML manifest handling code could cause a heap-based buffer overflow (CVE-2012-2665). Impact : A remote attacker could entice a user to open a specially crafted document file using LibreOffice, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 62286 published 2012-09-25 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/62286 title GLSA-201209-05 : LibreOffice: Multiple vulnerabilities NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2012-1136.NASL description Updated openoffice.org packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way OpenOffice.org processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in an OpenOffice.org application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) Upstream acknowledges Timo Warns as the original reporter of these issues. All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of OpenOffice.org applications must be restarted for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 61398 published 2012-08-03 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61398 title CentOS 5 : openoffice.org (CESA-2012:1136) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2012-1135.NASL description Updated libreoffice packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. LibreOffice is an open source, community-developed office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way LibreOffice processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in a LibreOffice application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) Upstream acknowledges Timo Warns as the original reporter of these issues. All LibreOffice users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of LibreOffice applications must be restarted for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 61389 published 2012-08-02 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61389 title RHEL 6 : libreoffice (RHSA-2012:1135) NASL family Windows NASL id OPENOFFICE_341.NASL description The version of Apache OpenOffice installed on the remote host is prior to 3.4.1. It is, therefore, affected by multiple heap-based buffer overflow vulnerabilities related to XML manifest handling : - An error exists related to handling the XML tag hierarchy. - A boundary error exists when handling the duplication of certain unspecified XML tags. - An error exists in the base64 decoder related to XML export actions. last seen 2020-06-01 modified 2020-06-02 plugin id 61731 published 2012-08-30 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61731 title Apache OpenOffice < 3.4.1 Multiple Heap-Based Buffer Overflows NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2012-1135.NASL description Updated libreoffice packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. LibreOffice is an open source, community-developed office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way LibreOffice processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in a LibreOffice application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) Upstream acknowledges Timo Warns as the original reporter of these issues. All LibreOffice users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of LibreOffice applications must be restarted for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 61397 published 2012-08-03 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61397 title CentOS 6 : libreoffice (CESA-2012:1135) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-1536-1.NASL description It was discovered that LibreOffice incorrectly handled certain encryption tags in Open Document Text (.odt) files. If a user were tricked into opening a specially crafted file, an attacker could cause LibreOffice to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 61525 published 2012-08-14 reporter Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61525 title Ubuntu 11.04 / 11.10 / 12.04 LTS : libreoffice vulnerability (USN-1536-1) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-2520.NASL description Timo Warns from PRE-CERT discovered multiple heap-based buffer overflows in OpenOffice.org, an office productivity suite. The issues lies in the XML manifest encryption tag parsing code. Using specially crafted files, an attacker can cause application crash and could cause arbitrary code execution. last seen 2020-03-17 modified 2012-08-03 plugin id 61401 published 2012-08-03 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61401 title Debian DSA-2520-1 : openoffice.org - Multiple heap-based buffer overflows NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2012-1135.NASL description From Red Hat Security Advisory 2012:1135 : Updated libreoffice packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. LibreOffice is an open source, community-developed office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way LibreOffice processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in a LibreOffice application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) Upstream acknowledges Timo Warns as the original reporter of these issues. All LibreOffice users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of LibreOffice applications must be restarted for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 68591 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/68591 title Oracle Linux 6 : libreoffice (ELSA-2012-1135) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2012-1136.NASL description Updated openoffice.org packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. OpenOffice.org is an office productivity suite that includes desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way OpenOffice.org processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in an OpenOffice.org application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) Upstream acknowledges Timo Warns as the original reporter of these issues. All OpenOffice.org users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of OpenOffice.org applications must be restarted for this update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 61390 published 2012-08-02 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61390 title RHEL 5 : openoffice.org (RHSA-2012:1136) NASL family Windows NASL id LIBREOFFICE_355.NASL description A version of LibreOffice prior to 3.5.5 is installed on the remote Windows host. It is, therefore, reportedly affected by multiple heap-based buffer overflow vulnerabilities related to XML manifest handling : - An error exists related to handling the XML tag hierarchy. - A boundary error exists when handling the duplication of certain unspecified XML tags. - An error exists in the base64 decoder related to XML export actions. last seen 2020-06-01 modified 2020-06-02 plugin id 61432 published 2012-08-06 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61432 title LibreOffice < 3.5.5 Multiple Heap-Based Buffer Overflows NASL family Scientific Linux Local Security Checks NASL id SL_20120801_LIBREOFFICE_ON_SL6_X.NASL description LibreOffice is an open source, community-developed office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet application, presentation manager, formula editor, and a drawing program. Multiple heap-based buffer overflow flaws were found in the way LibreOffice processed encryption information in the manifest files of OpenDocument Format files. An attacker could provide a specially crafted OpenDocument Format file that, when opened in a LibreOffice application, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2665) All LibreOffice users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running instances of LibreOffice applications must be restarted for this update to take effect. last seen 2020-03-18 modified 2012-08-03 plugin id 61409 published 2012-08-03 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/61409 title Scientific Linux Security Update : libreoffice on SL6.x i386/x86_64 (20120801) NASL family Windows NASL id LOTUS_SYMPHONY_3_0_1_FP2.NASL description The version of IBM Lotus Symphony is a version prior to 3.0.1 Fix Pack 2. Such versions are affected by multiple vulnerabilities : - Flaws exist in the way certain XML components are processed for external entities in ODF documents. These flaws can be utilized to access and inject the content of local files into an ODF document without a user last seen 2020-06-01 modified 2020-06-02 plugin id 63266 published 2012-12-14 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/63266 title IBM Lotus Symphony < 3.0.1 Fix Pack 2 Multiple Vulnerabilities
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://www.securitytracker.com/id?1027332
- http://www.securitytracker.com/id?1027331
- http://secunia.com/advisories/50146
- http://rhn.redhat.com/errata/RHSA-2012-1135.html
- http://secunia.com/advisories/50142
- https://bugzilla.redhat.com/show_bug.cgi?id=826077
- http://www.ubuntu.com/usn/USN-1536-1
- http://www.debian.org/security/2012/dsa-2520
- http://www.ubuntu.com/usn/USN-1537-1
- http://www.securityfocus.com/bid/54769
- http://security.gentoo.org/glsa/glsa-201209-05.xml
- http://secunia.com/advisories/50692
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/60799
- http://www.pre-cert.de/advisories/PRE-SA-2012-05.txt
- http://www.libreoffice.org/about-us/security/advisories/cve-2012-2665/