Linux Security
Linux Security
Linux Security

Debian: fix several vulnerabilities DSA-1104-1

Date 29 Jun 2006
Posted By LinuxSecurity Advisories
Several vulnerabilities have been discovered in, a free office suite. The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2006-2198 CVE-2006-2199 CVE-2006-3117
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1104-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
June 30th, 2006               
- --------------------------------------------------------------------------

Package        :
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE IDs        : CVE-2006-2198 CVE-2006-2199 CVE-2006-3117

Several vulnerabilities have been discovered in, a free
office suite.  The Common Vulnerabilities and Exposures Project
identifies the following problems:


    It turned out to be possible to embed arbitrary BASIC macros in
    documents in a way that does not see them but
    executes them anyway without any user interaction.


    It is possible to evade the Java sandbox with specially crafted
    Java applets.


    Loading malformed XML documents can cause buffer overflows and
    cause a denial of service or execute arbitrary code.

This update has the Mozilla component disabled, so that the
Mozilla/LDAP adressbook feature won't work anymore.  It didn't work on
anything else than i386 on sarge either.

The old stable distribution (woody) does not contain

For the stable distribution (sarge) this problem has been fixed in
version 1.1.3-9sarge2.

For the unstable distribution (sid) this problem has been fixed in
version 2.0.3-1.

We recommend that you upgrade your packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     2878 c29af36cea3d6f22c13f00dbe8247322
      Size/MD5 checksum:  4627106 93c4a9d88d0a115df537a3d61cca82b9
      Size/MD5 checksum: 166568714 5250574bad9906b38ce032d04b765772

  Architecture independent components:
      Size/MD5 checksum:  2648322 4f7714aad4409e00e14ce332e486662e
      Size/MD5 checksum:  2695762 4141052d3207816b5368408da9b15975
      Size/MD5 checksum:  2692534 b4ccab7fbac287c3e217abd35763c63d
      Size/MD5 checksum:  3587602 f0e95ccc9b8d7b355584a8bc052e5686
      Size/MD5 checksum:  2664462 1c4c270ce73b183f56adb7e7b6ab79ab
      Size/MD5 checksum:  3584076 ad6d82e05d64ed9e0e5bfa9fdb8ea1a3
      Size/MD5 checksum:  3454874 6cc643abc1a34367f357b01979a9e74e
      Size/MD5 checksum:  2742632 e21a6035232fe123b92da0e1a8b4ad6a
      Size/MD5 checksum:  3526678 1dca9def45f48a04b58a1c8794280dfd
      Size/MD5 checksum:  3563056 da70a829bcdf5357b1a9fb0d0c024f58
      Size/MD5 checksum:  2646184 822b4acde201446a26ac6632688bbad9
      Size/MD5 checksum:  2670064 ad10df5ab47cd27da0249e03c472a042
      Size/MD5 checksum:  2674846 f72f73f8933d2e23d9fc02e3ef17330f
      Size/MD5 checksum:  3495714 83d82fdeb236ab9fe8468d71282e95a1
      Size/MD5 checksum:  2658848 9c107e3b269ab7ffa57a0adc72968f8e
      Size/MD5 checksum:  2661050 fb2e7b56a4ec4d83241d018a88cb1088
      Size/MD5 checksum:  2696714 4acbd63edac85a4b74d948db27dfce12
      Size/MD5 checksum:  2772276 3919e225857c1b6b4687aa9194ddcc9a
      Size/MD5 checksum:  3556994 7ad5254da0f8354be0bc099d044cab1a
      Size/MD5 checksum:  3564520 f46caf42dc24a488a5ca61cb20ae3929
      Size/MD5 checksum:  2686182 1ab244880350c7f960d75323119fafd4
      Size/MD5 checksum:  3540942 6cc85e55ee6c4a6cd9f25bd33aee58fa
      Size/MD5 checksum:  2673538 0ebdfd84d88a08a6ed0bf3dd145188e6
      Size/MD5 checksum:  2665356 9ee46edc78bc00520dbdf019de2212b2
      Size/MD5 checksum:  3561370 11edb164c42cfb1c5141253bf730545b
      Size/MD5 checksum:  2665342 b030e20a7f32bf270bc1a1637c6d430e
      Size/MD5 checksum:  2667280 f48a54299a81f5b1197c1c4a2aa856e9
      Size/MD5 checksum:  3240660 594ca6fef1ea5e172eeebe9583777442
      Size/MD5 checksum:  3527454 32a915788eb695a53477f26796caeb2d
      Size/MD5 checksum:  3163760 987764f8fbb68de32bdf8ac52f53e089
      Size/MD5 checksum:  3332890 d41efa6a8574aae797cb4e80ef146492
      Size/MD5 checksum:  3604492 f457b77875e59d3de1bc581790ac1757
      Size/MD5 checksum:  3600290 bc7520ecae4c8c57fc715a339378f3a2
      Size/MD5 checksum:  3543580 81428bd8c9c18023c7bafbbb70fb67d0
      Size/MD5 checksum:  2689546 a1e8b5d97b5727fc019fc2a345a79621
      Size/MD5 checksum:  2652358 5646c499f10db23e7ebe7a705fe106ac
      Size/MD5 checksum:  2894872 32b6ad9a61744971ea404bf359ab32df
      Size/MD5 checksum:  3553752 addfff128953d5d8ff750d17bf46d85d
      Size/MD5 checksum:  3549254 d76933e96608ce1f061a103e35cb64b0
      Size/MD5 checksum:  2673156 92b6bfb587118375597db859d365ff7a
      Size/MD5 checksum:    67170 751a987f42c32c66d58873e6db56f403
      Size/MD5 checksum:  3130996 b7066c65ee5f48ecde70207bbd42c280
      Size/MD5 checksum:  6852018 d5634c24311188bcc5b6a2c02ce2f40c
      Size/MD5 checksum:   137102 5b3988d68d82fb5203edd42382740df2

  Intel IA-32 architecture:
      Size/MD5 checksum: 55754028 a7fa3cd60830602a0166fb5a02b8d9ca
      Size/MD5 checksum:  1857498 551e7688230bcd13c2a408521d53c1d4
      Size/MD5 checksum:   219936 babea1358fdeb65abcff0215e882db91
      Size/MD5 checksum:   202086 0b6eada27c857f58739a7cca36169810
      Size/MD5 checksum:   179506 aae628723c95d47f26e37879cf0e79d4

  PowerPC architecture:
      Size/MD5 checksum: 39929012 7d12b1be517fc63e565c278e171675e7
      Size/MD5 checksum:  1865472 1893367338dc987090a5a013e6b5e326
      Size/MD5 checksum:   161442 d31cae826c4a0e274d168564782dedbf
      Size/MD5 checksum:   158680 4fa8bd46594f93713433b53e71ea0151
      Size/MD5 checksum:   142202 0eeaf1e9526a2b13f2b52f5b7967d6eb

  IBM S/390 architecture:
      Size/MD5 checksum: 42753100 8e42040126f1790a4b1f1383b2272d7e
      Size/MD5 checksum:  1852914 da327cab034af93e336e219c8a1acb84
      Size/MD5 checksum:   166720 edeffc825dfdbc0734bf235661d2e8c9
      Size/MD5 checksum:   166550 2c611012c1cf57e4452818ec954644c8
      Size/MD5 checksum:   145214 81ed5ca6496ef4fa00469a6d198d5726

  Sun Sparc architecture:
      Size/MD5 checksum: 47627108 43a094373b754c324d666ecf26dcf80f
      Size/MD5 checksum:  1847490 ff92173f9d209979fb6f87997079979b
      Size/MD5 checksum:   198066 192928ab2fda8cf14f2c7cd110467957
      Size/MD5 checksum:   182520 cf8b4e1cba1690cbf01280a415e0d7de
      Size/MD5 checksum:   164814 219624bd999b31c534401b78c98179a2

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.