Want to stay on top of
the latest security updates? Automatically
sign up for our free IT Locksmith newsletter
, delivered each Tuesday!

OpenOffice.org has patched its vulnerabilities, but threats
related to Microsoft Office Suite and Outlook are still out there.

Details

Vulnerabilities in office suite applications seem to be the
name of the game this week in the security world. Some versions of OpenOffice (the free edition of Sun
Microsystems’ StarOffice that you can download from Download.com)
contain a highly critical threat (CAN-2005-0941).

The threat involves a buffer overflow vulnerability related
to how OpenOffice 1.1.x opens
.doc files. OpenOffice.org has released a patch for this vulnerability. For
more details, see this Secunia report.

In addition, a vulnerability has surfaced in the Red Hat
version of OpenOffice, which allows an attacker to compromise a user’s system.
Red Hat has released a patch for this flaw. For more information, see this Secunia report.

To stay on top of OpenOffice vulnerabilities, check out
Secunia’s vulnerability summary pages for OpenOffice 1.0.x and OpenOffice 1.1.x. A few other threats have
also affected OpenOffice, but Secunia reports that all have received patches.

However, we can’t say the same for Microsoft Office, which sports
at least one highly critical but unpatched threat (CAN-2005-0944)
that affects a number of Office versions. This threat stems from a
vulnerability in the Microsoft Jet Database—specifically Msjet40.dll. The
original warning came
from HexView
.

Secunia has also reported a long-unpatched, moderately critical
vulnerability
present in both Microsoft Word and Microsoft Outlook. To stay
on top of this issue, I recommend Office users and managers bookmark Secunia’s
vulnerability summary page for Microsoft
Office 2003 Professional Edition
.

Applicability

The OpenOffice buffer overflow vulnerability affects
OpenOffice 1.1.x. The Red Hat version-specific vulnerability affects these
versions of Red Hat Enterprise Linux: AS 3, AS 4, ES 3, ES 4, WS 3, and WS 4.

The Jet Database vulnerability affects these versions of Microsoft
Windows: 2000 Advanced Server, 2000 Datacenter Server, 2000 Professional
Edition, 2000 Server, XP Home Edition, and XP Professional Edition. Also
affected are Microsoft Access 2000, 2002, and 2003 as well as Microsoft Office
2000, 2003 Professional Edition, 2003 Small Business Edition, and 2003 Standard
Edition.

The unpatched Word and Outlook threat affects these versions
of Microsoft Office: 2000, 2003 Professional Edition, 2003 Small Business
Edition, 2003 Standard Edition, and 2003 Student and Teacher Edition. This
threat also affects Microsoft Outlook 2000, Microsoft Outlook 2003, Microsoft
Word 2000, and Microsoft Works Suite 2003.

Risk level
– Critical

According to Secunia, both the OpenOffice 1.1.x threat and the
Jet Database vulnerability are “highly critical.” However, I consider
them to be only “critical.”

Fix

Patches are available for the OpenOffice threats, which you
can download from the vendors’ Web sites. For the patch for the OpenOffice
1.1.x threat, visit
the OpenOffice Web site
. For the patch for Red Hat-specific OpenOffice
vulnerability, check
out Red Hat’s Web site.

No patch is currently available for the Jet Database threat.
As a workaround, avoid opening untrusted .mdb database files.

In addition, no patch is currently available for the Word
and Outlook threat either. But you can mitigate or completely eliminate the
threat by not using Word to edit e-mail documents.

Final word

OK, I understand the reasons behind the hype about the
Firefox browser. Until the recent slew of vulnerabilities, it looked for a
brief time as if it really were significantly more secure than Internet Explorer.

Firefox is still a great choice for power users and other
individuals, but it hasn’t caught on much in big offices simply because IE is
free and already installed. There just isn’t enough incentive to install and
support hundreds or thousands of users with a new browser as opposed to
properly locking down the latest version of IE 6.

But I wonder why there’s been so little user-driven hype
over OpenOffice? Not only is it quite good—in fact, I use it daily—but it’s
also free, and Microsoft Office certainly isn’t! For that reason, I often
recommend OpenOffice to companies simply on a cost-saving basis.

While OpenOffice is a stripped-down version of Sun’s
StarOffice, I’ve never missed any of the fonts or other StarOffice components
left out of OpenOffice. And neither have most of my client’s users.


Also watch for …

  • Now,
    for your weekly dose of irony, a small California ISP is suing
    Kraft Foods
    over violations of the CAN-SPAM Act and California’s
    anti-spam law. The ISP reported a continuing stream of 8,500 advertising
    e-mails for Gevalia coffee over the past year. The ISP alleges that the
    e-mails contained fake headers, making them appear to come from fictitious
    individuals—a clear violation of the laws if true.
    The irony, of course, is that SPAM is a trademark of Hormel, not Kraft.
    With fines based on a per-message toll, the ISP is suing for millions of
    dollars, which should be enough to pay for a good espresso machine and a
    lifetime supply of quality beans for the entire ISP staff.
  • If you
    needed any proof that today’s hackers aren’t always up to the same
    standards as when we used PEEK and POKE and perused assembly language
    listings, check out The
    Inquirer.net’s report
    on the self-proclaimed “baddest hacker in
    town,” who got in a snit in a chat room and threatened the moderator,
    demanding the moderator’s IP address. The moderator responded with some
    information that apparently included IP address 127.0.0.1. You got it—the
    “baddest” hacker ended up wiping his own hard drives.
  • A News.com
    report
    has vindicated my previous recommendations to smash and burn
    hard drives before discarding computers. Confirming what I’ve always
    believed, News.com reports that the mere wiping of hard drives with
    software isn’t enough unless you are very, very careful. It simply costs
    more to wipe most drives properly than a used drive is worth, so drill
    them or use them as secondary drives in new equipment.
  • RealNetworks
    has released patches for critical vulnerabilities in its media players. Discovered by
    Piotr Bania
    , the threat (CAN-2005-0755)
    received a “highly
    critical” rating from Secunia
    because it can allow remote system
    access. This vulnerability affects several versions of RealPlayer, Helix
    Player, and RealOne Player. There’s been some confusion over this threat due
    to another apparently similar threat announced at the beginning of April. So,
    if this might affect you, check to make sure you have the latest patches.
  • Online
    stock broker Ameritrade
    has notified 200,000 customers
    that it has lost backup tapes containing
    account information. Unfortunately—and incredibly—the company apparently
    didn’t take steps to encrypt the tapes.

John McCormick is a
security consultant and well-known author in the field of IT, with more than
17,000 published articles. He has written the IT Locksmith column for
TechRepublic for more than four years.