search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenOffice.org may fail to properly contain certain Java applets

Vulnerability Note VU#243681

Original Release Date: 2006-07-20 | Last Revised: 2007-01-31

Overview

The OpenOffice.org team has reported a vulnerability in how the 1.1 and 2.0 versions of OpenOffice.org handle certain Java applets.

Description

OpenOffice.org is an office suite that is available for multiple operating systems, including Windows, Linux, Apple Mac OS X, and BSD. It includes components such as a word processor, spreadsheet, and presentation tool. It features the ability for documents to contain Java applets in addition to static data content.

The OpenOffice.org team has stated that there is a vulnerability in the 1.1 and 2.0 versions of OpenOffice.org that may allow some Java applets full access to the host operating system with the privileges of the user running OpenOffice.org.

To exploit this vulnerability, an attacker would need to convince a user to open a document with a specially crafted Java applet. If successful, the attacker could use the java applet to access the operating system with the privileges of the user who opened the document.

Impact

A malicious Java applet could change, delete, transmit, overwrite, and read data on the affected computer. It may also be possible for an attacker to remotely execute arbitrary code.

Solution

Upgrade
See the Systems Affected section of this document for information about specific vendors. Users who compile OpenOffice.org from source or get their binaries directly from OpenOffice.org are encouraged to upgrade to version 1.1.5 or 2.0.3.


Workarounds

Disable Java Applets
Disabling Java applets in OpenOffice documents will remove exposure to this vulnerability. The security advisory Sun Alert 102475 provides instructions on how to disable Java applets.

Vendor Information

243681
 

Debian GNU/Linux Affected

Updated:  July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Mandriva, Inc. Affected

Updated:  July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

OpenOffice.org Affected

Updated:  July 20, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Red Hat, Inc. Affected

Updated:  July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

SUSE Linux Affected

Updated:  July 12, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Sun Microsystems, Inc. Affected

Updated:  July 14, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-2199
Severity Metric: 0.06
Date Public: 2006-06-29
Date First Published: 2006-07-20
Date Last Updated: 2007-01-31 17:27 UTC
Document Revision: 31

Sponsored by CISA.