Novell is now a part of Micro Focus

Security update for OpenOffice_org


(Last modified: 30JUN2006)

solutions Security update for OpenOffice_org SuSE Linux Maintenance Web (fd3768697ff2063a850c558220951dd9)

Applies to

Package: OpenOffice_org
Product(s): SuSE Linux Desktop 1.0
Patch: patch-11092
Release: 20060630
Obsoletes: none


Install this update if you are using OpenOffice_org.



Problem description

The following security problems were found in OpenOffice_org:
  • CVE-2006-2198: A security vulnerability in may make it possible to inject basic code into documents which is executed upon loading of the document. The user will not be asked or notified and the macro will have full access to system resources with current user's privileges. As a result, the macro may delete/replace system files, read/send private data and/or cause additional security issues. Note that this attack works even with Macro execution disabled. This attack allows remote attackers to modify files / execute code as the user opening the document.
  • CVE-2006-2199: A security vulnerability related to documents may allow certain Java applets to break through the "sandbox" and therefore have full access to system resources with current user privileges. The offending Applets may be constructed to destroy/replace system files, read or send private data, and/or cause additional security issues. Since Java applet support is only there for historical reasons, as StarOffice was providing browser support, the support has nown been disabled by default.
  • CVE-2006-3117: A buffer overflow in the XML UTF-8 converter allows for a value to be written to an arbitrary location in memory. This may lead to command execution in the context of the current user.


Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Fvh OpenOffice_org.rpm OpenOffice_org-*.rpm

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Copyright Micro Focus or one of its affiliates