svn commit: r452959 - head/security/vuxml
Don Lewis
truckman at FreeBSD.org
Thu Oct 26 22:46:36 UTC 2017
Author: truckman
Date: Thu Oct 26 22:46:35 2017
New Revision: 452959
URL: https://svnweb.freebsd.org/changeset/ports/452959
Log:
Update Apache OpenOffice entry.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Oct 26 22:34:30 2017 (r452958)
+++ head/security/vuxml/vuln.xml Thu Oct 26 22:46:35 2017 (r452959)
@@ -142,7 +142,7 @@ Notes:
</vuln>
<vuln vid="27229c67-b8ff-11e7-9f79-ac9e174be3af">
- <topic>openoffice -- multiple vulnerabilities</topic>
+ <topic>Apache OpenOffice -- multiple vulnerabilities</topic>
<affects>
<package>
<name>apache-openoffice</name>
@@ -156,14 +156,35 @@ Notes:
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The Apache Openofffice project reports:</p>
+ <blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-3157.html">
+ <p>By exploiting the way OpenOffice renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to sent the document back to the attacker.</p>
+ <p>The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.</p>
+ </blockquote>
+ <blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-9806.html">
+ <p>A vulnerability in the OpenOffice Writer DOC file parser, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+ </blockquote>
+ <blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-12607.html">
+ <p>A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+ </blockquote>
+ <blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-12608.html">
+ <p>A vulnerability in OpenOffice Writer DOC file parser, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+ </blockquote>
</body>
</description>
<references>
- <url/>
+ <url>https://www.openoffice.org/security/cves/CVE-2017-3157.html</url>
+ <url>https://www.openoffice.org/security/cves/CVE-2017-9806.html</url>
+ <url>https://www.openoffice.org/security/cves/CVE-2017-12607.html</url>
+ <url>https://www.openoffice.org/security/cves/CVE-2017-12608.html</url>
+ <cvename>CVE-2017-3157</cvename>
+ <cvename>CVE-2017-9806</cvename>
+ <cvename>CVE-2017-12607</cvename>
+ <cvename>CVE-2017-12608</cvename>
</references>
<dates>
- <discovery>2017-10-24</discovery>
+ <discovery>2016-09-11</discovery>
<entry>2017-10-24</entry>
+ <modified>2017-10-26</modified>
</dates>
</vuln>
More information about the svn-ports-head
mailing list