![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.61262 |
Categoría: | Mandrake Local Security Checks |
Título: | Mandrake Security Advisory MDVSA-2008:137 (openoffice.org) |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing an update to openoffice.org announced via advisory MDVSA-2008:137. Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in OpenOffice.org (OOo) 2.0 through 2.4 allows remote attackers to execute arbitrary code via a crafted file that triggers a heap-based buffer overflow. (CVE-2008-2152) Also, according to bug #38874 decimal numbers on Hebrew documents would appear as Arabic characters. Another issue (#39799) is with measurements units configuration to format paragraphs on the menu: (Tools -> Options -> OpenOffice.org Writer -> General). Even setting to centimeters on (Indent & Spacing) option it shows as characters (ch) on (Indents & Spacing) configuration on the menu: (Format -> Paragraph -> Indents & Spacing). Moreover, a document holding Notes edited on Microsoft Office would not show when opened with OpenOffice. These and a number of other OpenOffice.org issues were fixed by the new version provided in this update. Affected: 2008.1 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2008:137 Risk factor : Critical CVSS Score: 9.3 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-2152 BugTraq ID: 29622 http://www.securityfocus.com/bid/29622 https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00385.html https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00473.html https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00499.html http://security.gentoo.org/glsa/glsa-200807-05.xml http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=714 http://www.mandriva.com/security/advisories?name=MDVSA-2008:137 http://www.mandriva.com/security/advisories?name=MDVSA-2008:138 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9787 http://www.redhat.com/support/errata/RHSA-2008-0537.html http://www.redhat.com/support/errata/RHSA-2008-0538.html http://www.securitytracker.com/id?1020219 http://secunia.com/advisories/30599 http://secunia.com/advisories/30633 http://secunia.com/advisories/30634 http://secunia.com/advisories/30635 http://secunia.com/advisories/31029 http://sunsolve.sun.com/search/document.do?assetkey=1-26-237944-1 http://www.vupen.com/english/advisories/2008/1773 http://www.vupen.com/english/advisories/2008/1804/references XForce ISS Database: openoffice-rtlallocatememory-bo(42957) https://exchange.xforce.ibmcloud.com/vulnerabilities/42957 |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |