Author: buildbot
Date: Fri Oct 26 20:12:37 2012
New Revision: 836294
Log:
Staging update by buildbot for openofficeorg
Added:
websites/staging/ooo-site/trunk/content/security/CVE-2006-2198.html
websites/staging/ooo-site/trunk/content/security/CVE-2006-2199.html
websites/staging/ooo-site/trunk/content/security/CVE-2006-3117.html
websites/staging/ooo-site/trunk/content/security/bulletin-20060629.html
Modified:
websites/staging/ooo-site/trunk/cgi-bin/ (props changed)
websites/staging/ooo-site/trunk/content/ (props changed)
Propchange: websites/staging/ooo-site/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Fri Oct 26 20:12:37 2012
@@ -1 +1 @@
-1402515
+1402646
Propchange: websites/staging/ooo-site/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Fri Oct 26 20:12:37 2012
@@ -1 +1 @@
-1402515
+1402646
Added: websites/staging/ooo-site/trunk/content/security/CVE-2006-2198.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/CVE-2006-2198.html (added)
+++ websites/staging/ooo-site/trunk/content/security/CVE-2006-2198.html Fri Oct
26 20:12:37 2012
@@ -0,0 +1,67 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
+<title>CVE-2006-2198</title>
+ <style type="text/css">
+/*<![CDATA[*/
+ hr { display: block }
+ /*]]>*/
+ </style>
+
+<!--#include virtual="/google-analytics.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+
+<h2>Macro, CVE-2006-2198</h2>
+<h3>Macro Vulnerability</h3>
+<ul>
+ <li> <strong>Synopsis: </strong>Security Vulnerability With Macros in
OpenOffice.org
+ <li> <strong>Issue ID: </strong>66863
+ <li> <strong>State: </strong>Resolved
+</ul>
+<h4>1. Impact</h4>
+<p>A security vulnerability in OpenOffice.org may make it possible to inject
basic code into documents which is executed upon loading of the document. The
user will not be asked or notified and the macro will have full access to
system resources with current user's privileges. As a result, the macro may
delete/replace files, read/send private data and/or cause additional security
issues.</p>
+<p><b>Note:</b> Disabling document macros will not prevent this issue.</p>
+<p>
+This issue is also described in<br>
+CVE-2006-2198, <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2198">http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2198</a>,
+<br>
+Sun Alert 102490,
+<a href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102490-1">
+http://sunsolve.sun.com/search/document.do?assetkey=1-26-102490-1</a>
+</p>
+<h4>2. Contributing Factors</h4>
+<p>This issue can occur in the following releases:</p>
+<p><strong>OpenOffice.org 1.1.x,</strong> <strong>OpenOffice.org
2.0.x</strong></p>
+<h4>3. Symptoms</h4>
+<p>There are no predictable symptoms that would indicate the described issue
has been exploited.</p>
+<h4>4. Relief/Workaround</h4>
+<p>There is no workaround. Please see the "Resolution" section
below.</p>
+<h4>5. Resolution</h4>
+<p>This issue is addressed in the following releases:</p>
+<p><strong>OpenOffice.org 1.1.5 Patch, OpenOffice.org 2.0.3</strong></p>
+ <hr />
+ <p>
+ <a href="//security/">Security Home</a> ->
+ <a href="//security/bulletin.html">Bulletin</a> ->
+ <a href="//security/cves/CVE-2006-2198.html">CVE-2006-2198</a>
+ </p>
+
+ </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>
Added: websites/staging/ooo-site/trunk/content/security/CVE-2006-2199.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/CVE-2006-2199.html (added)
+++ websites/staging/ooo-site/trunk/content/security/CVE-2006-2199.html Fri Oct
26 20:12:37 2012
@@ -0,0 +1,80 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
+<title>CVE-2006-2199</title>
+ <style type="text/css">
+/*<![CDATA[*/
+ hr { display: block }
+ /*]]>*/
+ </style>
+
+
+<!--#include virtual="/google-analytics.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+
+<h2>Java Applets, CVE-2006-2199</h2>
+<h3>Java Applets </h3>
+<ul><li><strong>Synopsis:</strong> Security Vulnerability With Java Applets in
OpenOffice.org </li>
+ <li> <strong>Issue ID:</strong> 66862</li>
+ <li> <strong>State:</strong> Resolved</li>
+</ul>
+<h4><strong>1. Impact</strong></h4>
+<p>A security vulnerability related to OpenOffice.org documents may allow
certain Java applets to break through the "sandbox" and therefore
have full access to system resources with current user privileges. The
offending Applets may be constructed to destroy/replace files, read or send
private data, and/or cause additional security issues.</p>
+<p>This issue is also described in
+<br>
+CVE-2006-2199,
+<a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2199">http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2199</a>,
+<br>Sun Alert 102475
+<a href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1">
+http://sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1</a>
+</p>
+<h4><strong>2. Contributing Factors</strong></h4>
+<p>This issue can occur in the following releases:</p>
+<p><strong>OpenOffice.org 1.1.x, OpenOffice.org 2.0.x</strong></p>
+<h4><strong>3. Symptoms</strong></h4>
+<p>There are no predictable symptoms that would indicate the described issue
has been exploited.</p>
+<h4><strong>4. Relief/Workaround</strong></h4>
+<p>To work around the described issue, disable support for Java Applets (for
OpenOffice.org) by doing the following:</p>
+<p><strong>OpenOffice.org 1.x :</strong></p>
+<p>In options dialog: Select --> Tools/Options/OpenOffice.org/Security
--> uncheck "Enable Applets"</p>
+<p><strong>OpenOffice.org 2.x </strong></p>
+<p>There is no longer a User Interface (UI) for configuring this option in
OpenOffice.org 2.0; the change must be done in configuration files with a text
editor. Add the following into your OpenOffice.org settings (typically) for
this file
<code>"~/.openoffice2.0/user/registry/data/org/openoffice/Office/Common.xcu":</code></p>
+<p><code><node oor:name="Java"><br>
+<node oor:name="Applet"><br>
+<prop oor:name="Enable" oor:type="xs:boolean"><br>
+<value>false</value><br>
+</prop><br>
+</node><br>
+</node></code></p>
+<h4>5. Resolution</h4>
+<p>This issue is addressed in the following releases:</p>
+<p><strong>OpenOffice.org 1.1.5 Patch, OpenOffice.org 2.0.3</strong></p>
+<p><strong>Notes:</strong></p>
+<p>With the updated versions for OpenOffice.org, support for Java applets in
OpenOffice.org will be disabled.</p>
+<p> </p>
+ <hr />
+ <p>
+ <a href="//security/">Security Home</a> ->
+ <a href="//security/bulletin.html">Bulletin</a> ->
+ <a href="//security/cves/CVE-2006-2199.html">CVE-2006-2199</a>
+ </p>
+
+ </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>
Added: websites/staging/ooo-site/trunk/content/security/CVE-2006-3117.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/CVE-2006-3117.html (added)
+++ websites/staging/ooo-site/trunk/content/security/CVE-2006-3117.html Fri Oct
26 20:12:37 2012
@@ -0,0 +1,74 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
+<title>CVE-2006-3117</title>
+ <style type="text/css">
+/*<![CDATA[*/
+ hr { display: block }
+ /*]]>*/
+ </style>
+
+
+<!--#include virtual="/google-analytics.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+
+<h2>File Format, CVE-2006-3117</h2>
+<h3>File Format</h3>
+<ul>
+ <li><strong>Synopsis</strong>: File Format / Buffer Overflow Vulnerability:
Loading malformed XML documents can cause buffer overflows and crash
OpenOffice.org.</li>
+ <li><strong>Issue ID:</strong> 66866</li>
+ <li><strong>State:</strong> Resolved</li>
+</ul>
+<h4> 1. Impact: </h4>
+<p> The buffer overflow allows for a value to be written to an arbitrary
location in memory. This may lead to command execution in the context of the
current user. </p>
+<p> This issue is also described in
+<br>
+ CVE-2006-3117 at: <a
HREF="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3117">http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3117</a>,
+<br>NGSSoftware Advisory,
+<a href="http://www.ngssoftware.com/advisories/openoffice.txt">
+http://www.ngssoftware.com/advisories/openoffice.txt</a>
+<br>
+Sun Alert 102501,
+<a href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1">
+http://sunsolve.sun.com/search/document.do?assetkey=1-26-102501-1
+</a>
+</p>
+<h4> 2. Contributing Factors: </h4>
+<p> This issue can occur in the following releases:<strong> OpenOffice.org
1.1.x</strong> and <strong>OpenOffice.org 2.0.x</strong> </p>
+<h4> 3. Symptoms: </h4>
+<p> OpenOffice.org can crash due to internal buffer overflows when loading a
malformed document. </p>
+<h4> 4. Relief/Workaround:</h4>
+<p> None.</p>
+<h4> 5. Resolution: </h4>
+<p><strong>OpenOffice.org 1.1.5 Patch, OpenOffice.org 2.0.3</strong></p>
+<h4> 6. Credits: </h4>
+<p>
+Wade Alcorn of NGSSoftware discovered the vulnerability and aided in the
explanation/fix.
+</P>
+<p> </p>
+ <hr />
+ <p>
+ <a href="//security/">Security Home</a> ->
+ <a href="//security/bulletin.html">Bulletin</a> ->
+ <a href="//security/cves/CVE-2006-3117.html">CVE-2006-3117</a>
+ </p>
+
+ </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>
Added: websites/staging/ooo-site/trunk/content/security/bulletin-20060629.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/bulletin-20060629.html
(added)
+++ websites/staging/ooo-site/trunk/content/security/bulletin-20060629.html Fri
Oct 26 20:12:37 2012
@@ -0,0 +1,39 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+ <title>
+ Security Bulletin 2006-06-29
+ </title>
+
+
+<!--#include virtual="/google-analytics.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+
+
+<h2>Security Bulletin 2006-06-29</h2>
+<p>OpenOffice.org 2.0.3 fixes three security vulnerabilites that have been
found through internal security audits. Although there are currently no known
exploits, we urge all users of 2.0.x prior to 2.0.2 to upgrade to the new
version or install their vendor's patches accordingly. Patches for users of
OpenOffice.org 1.1.5 will be available shortly.</p>
+<p>The three vulnerabilities involve:</p>
+<ul>
+ <li><a href="CVE-2006-2199.html"> Java Applets, CVE-2006-2199</a></li>
+ <li><a href="CVE-2006-2198.html">Macro, CVE-2006-2198</a>; and</li>
+ <li><a href="CVE-2006-3117.html">File Format, CVE-2006-3117</a></li>
+</ul>
+
+ </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>