-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: OpenOffice_org
Announcement ID: SUSE-SA:2006:040
Date: Mon, 03 Jul 2006 16:00:00 +0000
Affected Products: Novell Linux Desktop 9
SUSE LINUX 10.1
SUSE LINUX 10.0
SUSE LINUX 9.3
SUSE LINUX 9.2
SUSE LINUX 9.1
SuSE Linux Desktop 1.0
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2006-2198, CVE-2006-2199, CVE-2006-3117
Content of This Advisory:
1) Security Vulnerability Resolved:
OpenOffice_org security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Following security problems were found and fixed in OpenOffice_org:
- CVE-2006-2198:
A security vulnerability in OpenOffice.org may make it possible to
inject basic code into documents which is executed upon loading
of the document. The user will not be asked or notified and the
macro will have full access to system resources with current user's
privileges. As a result, the macro may delete/replace system files,
read/send private data and/or cause additional security issues.
Note that this attack works even with Macro execution disabled.
This attack allows remote attackers to modify files / execute code
as the user opening the document.
- CVE-2006-2199:
A security vulnerability related to OpenOffice.org documents
may allow certain Java applets to break through the "sandbox"
and therefore have full access to system resources with current
user privileges. The offending Applets may be constructed to
destroy/replace system files, read or send private data, and/or
cause additional security issues.
Since Java applet support is only there for historical reasons,
as StarOffice was providing browser support, the support has now
been disabled by default.
- CVE-2006-3117:
A buffer overflow in the XML UTF8 converter allows for a value to
be written to an arbitrary location in memory. This may lead to
command execution in the context of the current user.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please close and restart all running instances of OpenOffice_org
after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
to apply the update, replacing with the filename of the
downloaded RPM package.
x86 Platform:
SUSE LINUX 10.1:
649b45c223e2eef491f3e89b457be3f2
09afa80d882ab9c1388139874e7107e9
70d9cf35ca87e78f8a30821ba271ac30
d044a2f22c518322ea35388adb7d8bd0
37cac5cbe14215491e65f78fd7d1f013
f458c2b61425e171b556a40e918d07db
0af5024dafc41d80456eb14950cbcdb5
ef66e97820d34e6f61c0f0dc61e0f690
d8055edb875cd9fe2e5f441873c7b1f1
1888f3c8225796823fb77a2ee40b7a3a
08114d9d40b506c69e8d801e4a7ed32c
5fab3729eecc0464eb10b28469057989
e4005f3cea8aabdd53be930297cd4f6d
d1e42f731b53e91831d408cd405368ac
c79f60fe55e03dd7cd6600f202187479
9c7972e70611f20134f9fe5475789717
13ee2cd4fd0e32622bae32eaa1bf1256
b979f10a559b5cb0e76c6933840af921
2d0e850814a6283c5d179a33b1da7b2d
bce3d5bd63fc5e11789162c8fb223cee
e0afe5d68098a3bd247db2451315bb28
3a68ebbe6dc351903f6242618ad645fb
570b6f273047682706dd3d4fe64f4bc7
70c75a7e0e15f701e35228c8d7ec8c55
c6a70315e98476882cf77a393efd6974
3f5c0a8af36797b3a554d3a24b2c00ef
160ea2698657b98e7e621d942919b65e
d810b4aee9fe30edd0263cdae3196060
e511be49fe7e2c967e3da2905a3f7fbe
82a12d481f04d019c0cec2209c2a2971
61d2b26bfa1f51afaf80ec617bf3e663
fa19baea78646e2b4991431d3ddfec27
66828e59320aa46d7e54a0f1235872c1
d23fa6f7f3913c13ba5b8bd1c04f0df8
e57a48a0cc278bd99793defe4201eefe
eb6ef2bc250858f9b20db76c5cd706da
4e6209b8d5247782d9d84ad1f30d34fa
0f191b0c65719f13b8f8f044f8f39e69
10bc6833827d7ec7c07c4a8116a3d12e
dfd0aca0d185b942c613e93acd48d8ce
c5cc18748bb6b9b6bca0435f07c7a253
cf1a3177bdedeff1ae1e491ac11530c1
519ea269f02a82bfd1f8d958fa370738
4003034be001b7775dca81ddb9a97a83
021db8f722c96457843f03d62b10a649
67a45bee7269d2ef389e583b7e3508e4
4d61096578a3755addedd9bbeffadaaa
fdb321de8e74127118b49a8d7ce41434
7cd9351904a78c9171694cd0b9e02f32
deb40352002369f87ef792393b49ce86
b797651549b5bb641e041980ff0a8141
b7d6c8f0289d43ea2f8faec91350aadc
SUSE LINUX 10.0:
da78f2aa9188797b1cd3e299b49209b5
caa54cab09c89e637f3f1c1df7a67dce
48487a3fb8fa411db5d370f6aa6eafb7
b4fdab8ecd23508fd55d277b2bb5f11a
ff685813e964117486bc5c711db3e561
deebd2abe143a43f48fda9a3446e41a5
a49e6ccee5faf1add6910ad40e291b17
ec4c7b05bf68fe257a914cf2711ef5c8
1e942a4ba31edd58f1545f0df035c6f3
19a16d84bb786add605f3ad611598d7c
711ce212e0d745a208844dbb42742ab5
5609ba537669f78b844434631c40c3c7
10f730be1719398ebbc333a42e7bb8f7
ae5ccd77c6250a093710011aaebd58b2
825f37194b7791ba2b26d724050d430b
e87717e887825ef26215f5e00234914e
a08767175cbc2cb92fd43bdc85847d32
23bc8ec9d9be1f6713f27c79ceacbb49
17af1071ce462563c17edadc195c070f
bef07a2731af1b2c8ebc54bc274b9cb7
70498b4072c1d36e97907947744a65cd
abafcf2c00d0a339632a1e8f45380a7d
65bdb71368174c3f2f14942be4d66544
f9af53897841b85754a2c228beee72e1
f8ceceef6b26f932435537e8f5062eb7
95f52980240c4904ae35dc3d34e59363
971ac59d5c5e7fb123d710dadbace416
ff3ad25a65a8c463ebb1797b2ba9175b
b550d2826df4ef2b806e9e719055a05e
db460e9c304252e2b7c986c958476d9e
89c4e4cee07eb4b200f82151176f9c7a
21e44d9925f756ff1898af3a864a93d6
84330671533bd4c5808487280dee2f5b
e3ec47019c925d90393c91a5ddf25124
5fe40d8ac239fe2fda04b7b536bc49c1
d6434c0982660b35cc6817f40b5c1c94
10c350525d66fd482edd5714622a7b69
f9a347406c614908c53f7cff130a1d30
b9873b16314f7d2af4ba13f7920a9a4d
3248cb2fdde4037305da28bb83b41250
1fbc7f91551db60b1ee0698b3558ec11
a3e9ce2da19dc3a8e60408099191c477
983421f7b45c6ccc3abcdd17d951e768
6f4a51458731a1d160e30d40d0bb5e5c
4b2421c9d8408c70017b097459e9a25c
SUSE LINUX 9.3:
26b4d9dbc015942ccb19d701acb328df
338dbc688a48f9db20087d544340a14f
b6cde4d6483eb17f7a925cbf153f8b83
270729a1ddb07753e2eba7327763f136
50e03a4624b3401afa756881616676da
09aba02d13551ecd5ec002f3794b9d68
49dcfc49c4b53bd825fdea5491bcaf95
c950792706b2a595166ed94cad4c13ce
2b9e239e2bfed188f38ace3f2e263a2a
e436591bb58f036d6dbc9c563b36bc60
cafed2dbe15aeb4ee30ea34748f2b3aa
7da16da80c36abf50270ae764bdf60f8
1446b0f9bedb86b9fb62ad769ca52379
44fac316ec36214a9f5f82c11eebe910
b4692f2c954216c3e149a7464cde5574
c929442e498729484723c476a8956eea
9261e230d4ee41317585f55f74e6b4bd
1fdcc5d6d3c6dfb30d0060c53adfc0ca
de4fe2b074eace927af5814cb8d5e4ac
303cc03f4ca6f1d4fc316abe5e9e087a
8923c18240d104c19849f9a3b5b719ca
ede0ae1a4cf6a960d8529bb3b82b18ed
b5ae3309f069c95bad88b1a39e47c33e
442a18ee93e2bcdff52f7e92122747c3
cebf0930ab9475628c176dc833c87055
46d852b7681131e640dec1d11d9b5d67
9a388bab6e2af9d100e2964dd87b5e34
SUSE LINUX 9.2:
3404ebdb749babddc0065120e351da8f
5a2ab250098d10f224a08e9f85eb5038
824b17f0444ff9bbe255999a26c4d079
4f8bb4aa2df22a21ec8971e14189e19e
02d3606b13e6757ad889d8baadaab914
d316856e7d15e533f6c9d058534e1406
f2b4121b81fa40240f1930363bac4a54
bcbe1e06359210be24e1614242b65f3c
0f4d6a6283e92889e17540b3a819dea5
a5554ef59fa8498def24ddb860fdd672
30535e484bd1e0de6ce7822fd58c7c47
21fd9ea2f970870b5fdbd5ac282b01d7
04cbf860584bbfe640075912810d85b6
b7d2bd841d972a08f82c3a25b04cc985
9df2f98463db7e68095bf70194739f62
13f7e1fbba69c93d6f8618322c0653f7
d795619af7d8b78d3c378ce8f06c4a6e
9ae90d991758549494e457b418bd582b
c4df7b850627a94d1d7c497716da4a69
cb20f834ad2004159efe572007c8252c
84182e2dec58664fb4356f797e8bdec6
265f6aa28cfd6499eab7e7e5860a6b44
97560149c00f283860b372c67e3700ca
6f2864c9361f66457d8882d83b14b5b8
0591dfed4d88e1d400230eaa0392f479
666edec0b1a397ad2413ad72ebc6b4c1
689edd2066ecf91916a1d4c7ba23aa99
06c44a641a1b617d7c6b501688972655
SUSE LINUX 9.1:
53e8171e949bc12da39a29388a118d44
11814b3f46dc0be180421f5e1a79d12a
a8c9285df1bbdc320b4c5b5aee056559
ddd367fa5f6cbb427e9d148115b49c34
7eaca9d4205c29926684f20d3eababb3
bdecfc05bde7573b0eb153fb05396f33
693d371adf34246154c1c4f181cbd32a
f52dd53e16f0a21e9136d99867a4db82
bedf5c2c7496cbcfc2ccd2ca7f6db9ca
b49ccc9ba19ea53fe35c8d4e8f1f276f
67c337e0dbba37f5d81a60f47dfd1eb9
3a45967f359fae8fc4f3c701ad2231fc
4a91baac0693a23bc477136c2131fe1b
3880ef7ef1f60165d43a10cd6a746426
a5d9a200ae1c078217c62ee7a8a78b6e
508f34526e700e9ddf0234d5cd587aa4
bc160723b53a3c651737aebb251833bc
5630cdd456d7325a74071c0eefff2018
596010219ffb37e3df8d0f2a4c25d5af
b5610c4117a7914cc52d718be3d43878
adcfa58f60e1b0c75db2ac7e7da4bd0b
f7e2ee28b2d37369edd474d44e44e4bc
1ad1791f5b01cf29c3506c03b62ffaa8
97b11b36c15d44d8f7f751a13692bf68
53e8171e949bc12da39a29388a118d44
11814b3f46dc0be180421f5e1a79d12a
a8c9285df1bbdc320b4c5b5aee056559
ddd367fa5f6cbb427e9d148115b49c34
7eaca9d4205c29926684f20d3eababb3
bdecfc05bde7573b0eb153fb05396f33
693d371adf34246154c1c4f181cbd32a
f52dd53e16f0a21e9136d99867a4db82
bedf5c2c7496cbcfc2ccd2ca7f6db9ca
b49ccc9ba19ea53fe35c8d4e8f1f276f
67c337e0dbba37f5d81a60f47dfd1eb9
3a45967f359fae8fc4f3c701ad2231fc
4a91baac0693a23bc477136c2131fe1b
3880ef7ef1f60165d43a10cd6a746426
a5d9a200ae1c078217c62ee7a8a78b6e
508f34526e700e9ddf0234d5cd587aa4
bc160723b53a3c651737aebb251833bc
5630cdd456d7325a74071c0eefff2018
596010219ffb37e3df8d0f2a4c25d5af
b5610c4117a7914cc52d718be3d43878
adcfa58f60e1b0c75db2ac7e7da4bd0b
f7e2ee28b2d37369edd474d44e44e4bc
1ad1791f5b01cf29c3506c03b62ffaa8
97b11b36c15d44d8f7f751a13692bf68
Power PC Platform:
SUSE LINUX 10.1:
e21cad16a35adad9fd8e3d0e7e9ab498
876b500b3f18de7c0d58ce88e2df20ce
23cbab6c8716578bff90a9e02e743025
5a903ee3eb25bcb32777f6aec9bd175e
b292d0d57426a337922c24905eb5d750
f00188672e300175eb73f97aefa764d3
91120c3c2e6b9c76f9cff151d78b8cd6
4258ff54ce0dcb002fd22a315e9e9f75
a012edaed3561ac90cb35bcfbc8bfd3d
5a0e25512a8913b63aa13d8216fa5925
20134831a9f76cd62cb28a5e6522bc8b
56cf83797527301f0856027ce5ae8b8e
fab867572119eeb6e7a1fb9d201ca858
581316fc893fbc3c15937e070fea5458
3c49f9e412fda548b694d8ceadefbf2c
7523ade7b3403b9134968537c342af7a
94e609de323fd6f11ef227f72a986e65
d6675d798537c7383a36b33d3731f03e
0f5ee2d05b9de160f44368d75ec203ad
a9655d354b6cdd2dc9a7f7e77556b4ff
40b670c08df5a37aeb5a8f83c6d4b896
6807e1c5f023d405539f8625413e14a3
02293cd1817b99f636c88df6d9fd52cc
5269f63982b7b68278da1b69df3f2d57
f853f2d32b1f4c0f7ff805a0541cd106
835afe1890f61dd8b0b3bc52e4906a70
037e3fa756caeec84ec7f0834fbd976a
33047e34386cad97b73e10aa6d5eeb2f
4b84f8a6088ef595746854511bb6b233
b3bb797798bb3425c5c74117c83ade07
2960798993563198a0a82dfcba836054
77fbf36aa00f7ec5852417aa20e12b6d
30582274e6f6a11b53a9d612da184fb1
4d4664bad0185d33dcf04069094ddabe
f41533305958c65ad9b49e0f2b7ea49b
11099b4a2a05f50c64fe0becdf02a7d3
3f8b8b3c6f78152cf9b76086cd4587e9
c79c91f6bf2ca7fd9d2f82f996b1e347
24e59b2661985f3734648c8439419108
51b6ffbeeae68502a59883a5b0672fed
a5b6d505578753737ef297ea51c3ad01
6b477f4856b761eea4f661e59d055803
9e1251123ec54c499caf01f19c501bcb
fe44fe3998f9d7a30d9a9127c284eb92
c82836cdfe99eaa4c2ba82f37f93d72d
1e2fcbaa9f47748b446e1cd043de22bf
20db8260798bf038a591f649678945d7
8ef1e82d5bd643fd80e1c8bea67027da
e8659fe51475a2c8fdf758eaa307846c
99b5e6854a5d4c9d48f363add47628e0
ac398efb31231d9c8aa4ec858a36e6c6
33e7011b6af2919f2a12baacf208a9e6
SUSE LINUX 10.0:
61d9d5bc7aac7849cb4cbfb8790f37a6
da05207bba91da697c94c488e3156889
d1bc8359d869f1a4172eb51020b3326a
74053d44c643c03ffa40a6de76aa027d
c1725913b432af8f3ec439f04a40c7a2
414d67ef5587e8ac8603bf2c425562a5
b52cfc169e34ddd48ab924ef83260764
8454d64c4b93e4446597d7906508bf3c
d5912a847b4f5b5785c998992e588ca8
a96be7030a4ec3caea6b0546cd6bf8c9
470ae19a03ea33aac71519f175597f43
12e1b829b543c4de8f5cd30d6e7a2b11
07fe62feda63bd45b37b00b289cf4eee
0062b22b187ef897b7ba868653dac095
f6d38c40d984ae481482374a8eab6c65
b946608cdf61b99da92e1f5a671c2ff2
b49d7ae870ee8c00d051c5449fdaa7b1
6bbe65a7e920012e5595dd6bfdef48c5
29972433d06db409d3af4e9856921faa
677c7f83e4ab91c6396a910e955ac0ea
4d08a84837dfc2a0e6b2329f6c172d0b
5e3465a80a21b7632b21a35b83d4ed2c
b37e2abd09b9a1c385f9cfeefc7cb918
b399f2a47aa9fdc09c26b34ccead77d3
8ff6cc73c265b253c870a7b622f045f0
324bdcbc6d2e67e397e4fe025332fceb
96c3db3801bd35886c95e7af67bb6449
20b832a3190837501871d65011e0f7df
29735fa76ba9ecb3a794052ed1bb6cd6
93c364471320695312ce4f0d7e441fce
45b09d3f52fab3ef3abf682d610400f5
5430ae8cc447a0f9cfc5e56f594e9aa3
d38c63c6e62b5acd962bb89cec6e7bcc
7b197b21ad3473745726cb5cd034c73b
e4f5917800a94a1c9a220db9b20472c0
29b7170afbd030a79e3e165de7e70f5a
eb0cecbaa8ee9f990a60af2439d87247
478c2c8b3e40d94e629372f43bd0b2da
ecb2ac813fecdbe1fe0a30bf2b49343e
85a276e3fd03f0dba981f5a8f27043f3
3aad86d3301f6306c5ac40dcc8f680d4
0d8866b667cc40caba33c67c21d413a6
d7d069ad57a36f21fc07919566dcf38b
abce5f68f7398e6a2465cd489a826f8b
d9a220df58f6b192ee2a23271dc4bbe4
Sources:
SUSE LINUX 10.1:
b125986f9b6951f506ccfa47ee725f9e
SUSE LINUX 10.0:
38a6066b04cd70cb3f0b5a110ed61161
SUSE LINUX 9.3:
86d35626732e626bd123b526d45df374
SUSE LINUX 9.2:
c9983e539cbd07f2c7e260e955b1896b
SUSE LINUX 9.1:
a0c54aa34852c50994e32b1c688ffd8c
a0c54aa34852c50994e32b1c688ffd8c
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SuSE Linux Desktop 1.0
Novell Linux Desktop 9 for x86
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
replacing with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team "
where is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig
to verify the signature of the package, replacing with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
.
suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
.
For general information or the frequently asked questions (FAQ),
send mail to or
.
==================================================================== SUSE's security contact is or .
The public key is listed below.
====================================================================