{"vuid":"VU#232232","idnumber":"232232","name":"Groove Virtual Office may not correctly display file names","keywords":["Goove Virtual Office","File type","Object Linking and Embedding","OLE"],"overview":"Groove Virtual Office may not correctly display the names of attached or embedded files. A remote attacker may be able to trick a user into executing arbitrary code.","clean_desc":"Groove Virtual Office provides a collaborative working environment that includes shared documents, databases, applications, and various other tools to facilitate communication and productivity. Groove allows files to be attached  to, or embedded in a document via Microsoft Windows Object Linking and Embedding (OLE). Microsoft OLE is a technology that allows applications to create and edit compound documents. Compound documents are those consisting of one format that contain embeddings of (or links to) documents in another format. If a specially crafted file is attached to, or embedded in a compound document, its file extension may not be shown correctly. As a result, the user may be tricked into believing the embedded file is of a type that does not contain executable code/content. However, if the crafted file contains code, it may be executed when the file is opened.","impact":"If a remote attacker can persuade a user to open a specially crafted file, that attacker may be able to execute arbitrary code with the privileges of the user.","resolution":"Update\nThis vulnerability is addressed in Groove Virtual Office 3.1 build 2338, 3.1a build 2364, and Groove Workspace Version 2.5n build 1871. These updates are available from http://www.groove.net/update and http://www.groove.net/archive.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by US-CERT.","author":"This document was written by Jeff Gennari.","public":["http://www.groove.net","http://www.groove.net/index.cfm?pagename=Support_Overview","http://www.groove.net/update","http://www.groove.net/archive"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-06T18:28:26Z","publicdate":"2005-05-19T00:00:00Z","datefirstpublished":"2005-05-19T15:30:10Z","dateupdated":"2005-05-26T01:13:56Z","revision":87,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"10","cam_attackeraccessrequired":"7","cam_scorecurrent":"2.3625","cam_scorecurrentwidelyknown":"6.7921875","cam_scorecurrentwidelyknownexploited":"12.6984375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.3625,"vulnote":null}