{"vuid":"VU#243681","idnumber":"243681","name":"OpenOffice.org may fail to properly contain certain Java applets","keywords":["OpenOffice.org","arbitrary code execution","sandbox evasion","Java","applet"],"overview":"The OpenOffice.org team has reported a vulnerability in how the 1.1 and 2.0 versions of OpenOffice.org handle certain Java applets.","clean_desc":"OpenOffice.org is an office suite that is available for multiple operating systems, including Windows, Linux, Apple Mac OS X, and BSD. It includes components such as a word processor, spreadsheet, and presentation tool. It features the ability for documents to contain Java applets in addition to static data content. The OpenOffice.org team has stated that there is a vulnerability in the 1.1 and 2.0 versions of OpenOffice.org that may allow some Java applets full access to the host operating system with the privileges of the user running OpenOffice.org. To exploit this vulnerability, an attacker would need to convince a user to open a document with a specially crafted Java applet. If successful, the attacker could use the java applet to access the operating system with the privileges of the user who opened the document.","impact":"A malicious Java applet could change, delete, transmit, overwrite, and read data on the affected computer. It may also be possible for an attacker to remotely execute arbitrary code.","resolution":"Upgrade\nSee the Systems Affected section of this document for information about specific vendors. Users who compile OpenOffice.org from source or get their binaries directly from OpenOffice.org are encouraged to upgrade to version 1.1.5 or 2.0.3.","workarounds":"Workarounds Disable Java Applets\nDisabling Java applets in OpenOffice documents will remove exposure to this vulnerability. The security advisory Sun Alert 102475 provides instructions on how to disable Java applets.","sysaffected":"","thanks":"","author":"This document was written by Ryan Giobbi.","public":["http://www.openoffice.org/security/CVE-2006-2199.html","http://secunia.com/advisories/20893/","http://secunia.com/advisories/20867/","http://secunia.com/advisories/20913/","http://secunia.com/advisories/20910/","http://secunia.com/advisories/20975/","http://rhn.redhat.com/errata/RHSA-2006-0573.html","http://www.debian.org/security/2006/dsa-1104","http://www.novell.com/linux/security/advisories/2006_40_openoffice.html","http://www.mandriva.com/security/advisories?name=MDKSA-2006:075","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1","http://www.auscert.org.au/6473","http://www.openoffice.org/security/CVE-2006-2199.html"," http://www.securityfocus.com/bid/18737"],"cveids":["CVE-2006-2199"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-30T15:04:12Z","publicdate":"2006-06-29T00:00:00Z","datefirstpublished":"2006-07-20T17:48:12Z","dateupdated":"2007-01-31T17:27:26Z","revision":31,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"1","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"9","cam_easeofexploitation":"6","cam_attackeraccessrequired":"1","cam_scorecurrent":"0.0567","cam_scorecurrentwidelyknown":"0.0972","cam_scorecurrentwidelyknownexploited":"0.17415","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0567,"vulnote":null}