{"vuid":"VU#170113","idnumber":"170113","name":"OpenOffice.org may fail to recognize embedded Basic macros","keywords":["OpenOffice.org","arbitrary code execution","embedded Basic macro"],"overview":"The OpenOffice.org team has reported a vulnerability in how the 1.1 and 2.0 versions of OpenOffice.org process basic macros.","clean_desc":"A vulnerability in OpenOffice.org may allow an attacker to inject basic code into documents such that the code will be executed when the document is loaded. After the document is opened, the user will not be alerted that the macro is running. To exploit this vulnerability, an attacker would need to convince a user to open a document with a specially crafted basic macro inserted. If successful, the attacker could use the macro to access the operating system with the privileges of the user who opened the document.","impact":"A malicious basic macro could change, delete, transmit, overwrite, and read data on the affected computer. It may also be possible for an attacker to remotely execute arbitrary code.","resolution":"Upgrade See the systems affected section of this document for information about specific vendors. Users who compile OpenOffice.org from source or get their binaries directly from OpenOffice.org are encouraged to upgrade to version 1.1.5 or 2.0.3.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Ryan Giobbi.","public":["http://secunia.com/advisories/20893/","http://secunia.com/advisories/20867/","http://secunia.com/advisories/20913/","http://secunia.com/advisories/20910/","http://secunia.com/advisories/20975/","http://www.auscert.org.au/6473","http://www.debian.org/security/2006/dsa-1104","http://www.ubuntu.com/usn/usn-313-2","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102490-1","http://www.openoffice.org/security/CVE-2006-2198.html"],"cveids":["CVE-2006-2198"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-30T15:04:09Z","publicdate":"2006-06-29T00:00:00Z","datefirstpublished":"2006-07-24T13:30:49Z","dateupdated":"2006-07-24T17:42:17Z","revision":23,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0,"vulnote":null}