Severity: High
ID: 32189
File Name: ubuntu_USN-609-1.nasl
Version: 1.25
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 5/9/2008
Updated: 1/19/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:canonical:ubuntu_linux:broffice.org, p-cpe:/a:canonical:ubuntu_linux:hsqldb-server, p-cpe:/a:canonical:ubuntu_linux:libhsqldb-java, p-cpe:/a:canonical:ubuntu_linux:libhsqldb-java-doc, p-cpe:/a:canonical:ubuntu_linux:libhsqldb-java-gcj, p-cpe:/a:canonical:ubuntu_linux:libmythes-dev, p-cpe:/a:canonical:ubuntu_linux:libuno-cil, p-cpe:/a:canonical:ubuntu_linux:mozilla-openoffice.org, p-cpe:/a:canonical:ubuntu_linux:openoffice.org, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-base, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-calc, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-common, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-core, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-dev, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-dev-doc, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-draw, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-dtd-officedocument1.0, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-evolution, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-filter-binfilter, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-filter-mobiledev, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-filter-so52, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-gcj, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-gnome, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-gtk, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-gtk-gnome, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-headless, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-impress, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-java-common, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-kde, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-l10n-en-us, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-l10n-in, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-l10n-za, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-math, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-officebean, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-qa-api-tests, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-qa-tools, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-report-builder, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-sdbc-postgresql, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-andromeda, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-crystal, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-default, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-hicontrast, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-human, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-industrial, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-style-tango, p-cpe:/a:canonical:ubuntu_linux:openoffice.org-writer, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-base, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-calc, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-draw, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-evolution, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-gnome, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-impress, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-kde, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-math, p-cpe:/a:canonical:ubuntu_linux:openoffice.org2-writer, p-cpe:/a:canonical:ubuntu_linux:python-uno, p-cpe:/a:canonical:ubuntu_linux:ttf-opensymbol, cpe:/o:canonical:ubuntu_linux:6.06:-:lts, cpe:/o:canonical:ubuntu_linux:7.04, cpe:/o:canonical:ubuntu_linux:7.10
Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/6/2008
CANVAS (CANVAS)
Core Impact
Metasploit (OpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow)
CVE: CVE-2007-4575, CVE-2007-5745, CVE-2007-5746, CVE-2007-5747, CVE-2008-0320