All the vulnerabilites related to Apache Software Foundation - Apache OpenOffice
cve-2021-33035
Vulnerability from cvelistv5
Published
2021-09-23 08:10
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
Buffer overflow from a crafted DBF file
References
▼ | URL | Tags |
---|---|---|
https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f | x_refsource_MISC | |
https://lists.apache.org/thread.html/r929c0c6a53cad64a1007b878342756badbb05ddd9b8f31a6d0b424cb%40%3Cannounce.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/r1ab8532e11f41bc7ca057ac7e39cab25f2e1f9d5f4929788ae21c8b9%40%3Cusers.openoffice.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2021/10/07/3 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f" }, { "name": "[announce] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r929c0c6a53cad64a1007b878342756badbb05ddd9b8f31a6d0b424cb%40%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1ab8532e11f41bc7ca057ac7e39cab25f2e1f9d5f4929788ae21c8b9%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/07/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.10", "status": "affected", "version": "Apache OpenOffice", "versionType": "custom" }, { "lessThanOrEqual": "3.4", "status": "affected", "version": "OpenOffice.org", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10" } ], "metrics": [ { "other": { "content": { "other": "high" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-07T17:06:07", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f" }, { "name": "[announce] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r929c0c6a53cad64a1007b878342756badbb05ddd9b8f31a6d0b424cb%40%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1ab8532e11f41bc7ca057ac7e39cab25f2e1f9d5f4929788ae21c8b9%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/07/3" } ], "source": { "discovery": "UNKNOWN" }, "title": "Buffer overflow from a crafted DBF file", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-33035", "STATE": "PUBLIC", "TITLE": "Buffer overflow from a crafted DBF file" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache OpenOffice", "version_value": "4.1.10" }, { "version_affected": "\u003c=", "version_name": "OpenOffice.org", "version_value": "3.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "high" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f", "refsource": "MISC", "url": "https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f" }, { "name": "[announce] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r929c0c6a53cad64a1007b878342756badbb05ddd9b8f31a6d0b424cb@%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1ab8532e11f41bc7ca057ac7e39cab25f2e1f9d5f4929788ae21c8b9@%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/07/3" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-33035", "datePublished": "2021-09-23T08:10:10", "dateReserved": "2021-05-15T00:00:00", "dateUpdated": "2024-08-03T23:42:19.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37401
Vulnerability from cvelistv5
Published
2022-08-13 06:40
Modified
2024-08-03 10:29
Severity ?
EPSS score ?
Summary
Apache OpenOffice Weak Master Keys
References
▼ | URL | Tags |
---|---|---|
https://www.openoffice.org/security/cves/CVE-2022-37401.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/08/13/2 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2022-37401.html" }, { "name": "[oss-security] 20220812 CVE-2022-37401: Apache OpenOffice Weak Master Keys", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/13/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "4.1.13", "status": "affected", "version": "Apache OpenOffice 4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": " OpenSource Security GmbH on behalf of the German Federal Office for Information Security" } ], "descriptions": [ { "lang": "en", "value": "Apache OpenOffice supports the storage of passwords for web connections in the user\u0027s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice" } ], "metrics": [ { "other": { "content": { "other": "important" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331 Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T08:20:28.678Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.openoffice.org/security/cves/CVE-2022-37401.html" }, { "name": "[oss-security] 20220812 CVE-2022-37401: Apache OpenOffice Weak Master Keys", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/13/2" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache OpenOffice Weak Master Keys", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-37401", "STATE": "PUBLIC", "TITLE": "Apache OpenOffice Weak Master Keys" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "Apache OpenOffice 4", "version_value": "4.1.13" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": " OpenSource Security GmbH on behalf of the German Federal Office for Information Security" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache OpenOffice supports the storage of passwords for web connections in the user\u0027s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "important" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-331 Insufficient Entropy" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openoffice.org/security/cves/CVE-2022-37401.html", "refsource": "MISC", "url": "https://www.openoffice.org/security/cves/CVE-2022-37401.html" }, { "name": "[oss-security] 20220812 CVE-2022-37401: Apache OpenOffice Weak Master Keys", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/13/2" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-37401", "datePublished": "2022-08-13T06:40:25", "dateReserved": "2022-08-04T00:00:00", "dateUpdated": "2024-08-03T10:29:21.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47502
Vulnerability from cvelistv5
Published
2023-03-24 15:57
Modified
2024-08-03 14:55
Severity ?
EPSS score ?
Summary
Apache OpenOffice: Macro URL arbitrary script execution
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:55:08.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/xr6tl91jj2jgcq8pdbrc4d8w13s6xn80" }, { "tags": [ "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2022-47502.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/28/3" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/03/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.13", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Altin Thartori (tin-z)" }, { "lang": "en", "type": "reporter", "value": "Joachim Mammele" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eApache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eLinks can be activated by clicks, or by automatic document events.\u003c/p\u003e\u003cp\u003eThe execution of such links must be subject to user approval.\u003c/p\u003e\u003cp\u003eIn the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.\u003cbr\u003e\u003c/p\u003e" } ], "value": "Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.\n\n\nLinks can be activated by clicks, or by automatic document events.\n\nThe execution of such links must be subject to user approval.\n\nIn the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.\n\n\n" } ], "metrics": [ { "other": { "content": { "text": "critical" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T13:26:21.613Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/xr6tl91jj2jgcq8pdbrc4d8w13s6xn80" }, { "url": "https://www.openoffice.org/security/cves/CVE-2022-47502.html" }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/28/3" }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/03/3" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache OpenOffice: Macro URL arbitrary script execution", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-47502", "datePublished": "2023-03-24T15:57:28.611Z", "dateReserved": "2022-12-15T17:45:04.193Z", "dateUpdated": "2024-08-03T14:55:08.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41832
Vulnerability from cvelistv5
Published
2021-10-11 08:10
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Content Manipulation with Certificate Validation Attack
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd3214a568b43dd335b5d558f521377f4bff750684dea18eb041fc1bb%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41832: Apache OpenOffice: Content Manipulation with Certificate Validation Attack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbc93cd7cea40e2ad3b6e080f688dd02566cdd2b1984fcbb6f8b0fb6%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.10", "status": "affected", "version": "Apache OpenOffice", "versionType": "custom" }, { "lessThanOrEqual": "3.4", "status": "affected", "version": "OpenOffice.org", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache OpenOffice would like to thank Simon Rohlmann, Vladislav Mladenov, Christian Mainka, and Jorg Schwenk of Ruhr University Bochum, Germany" } ], "descriptions": [ { "lang": "en", "value": "It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory." } ], "metrics": [ { "other": { "content": { "other": "moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-11T11:06:13", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/rd3214a568b43dd335b5d558f521377f4bff750684dea18eb041fc1bb%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41832: Apache OpenOffice: Content Manipulation with Certificate Validation Attack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbc93cd7cea40e2ad3b6e080f688dd02566cdd2b1984fcbb6f8b0fb6%40%3Cannounce.apache.org%3E" } ], "source": { "discovery": "UNKNOWN" }, "title": "Content Manipulation with Certificate Validation Attack", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-41832", "STATE": "PUBLIC", "TITLE": "Content Manipulation with Certificate Validation Attack" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache OpenOffice", "version_value": "4.1.10" }, { "version_affected": "\u003c=", "version_name": "OpenOffice.org", "version_value": "3.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache OpenOffice would like to thank Simon Rohlmann, Vladislav Mladenov, Christian Mainka, and Jorg Schwenk of Ruhr University Bochum, Germany" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "moderate" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347 Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/rd3214a568b43dd335b5d558f521377f4bff750684dea18eb041fc1bb%40%3Cusers.openoffice.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/rd3214a568b43dd335b5d558f521377f4bff750684dea18eb041fc1bb%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41832: Apache OpenOffice: Content Manipulation with Certificate Validation Attack", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbc93cd7cea40e2ad3b6e080f688dd02566cdd2b1984fcbb6f8b0fb6@%3Cannounce.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-41832", "datePublished": "2021-10-11T08:10:15", "dateReserved": "2021-09-30T00:00:00", "dateUpdated": "2024-08-04T03:22:24.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-11790
Vulnerability from cvelistv5
Published
2019-01-31 16:00
Modified
2024-09-16 19:30
Severity ?
EPSS score ?
Summary
When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation.
References
▼ | URL | Tags |
---|---|---|
https://www.openoffice.org/security/cves/CVE-2018-11790.html | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3883-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/106803 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:17:09.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2018-11790.html" }, { "name": "USN-3883-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3883-1/" }, { "name": "106803", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106803" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Apache OpenOffice 4.1.5 and earlier" } ] } ], "datePublic": "2018-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-17T00:06:09", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2018-11790.html" }, { "name": "USN-3883-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3883-1/" }, { "name": "106803", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106803" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2018-11-18T00:00:00", "ID": "CVE-2018-11790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "Apache OpenOffice 4.1.5 and earlier" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openoffice.org/security/cves/CVE-2018-11790.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2018-11790.html" }, { "name": "USN-3883-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3883-1/" }, { "name": "106803", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106803" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b@%3Ccommits.openoffice.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2018-11790", "datePublished": "2019-01-31T16:00:00Z", "dateReserved": "2018-06-05T00:00:00", "dateUpdated": "2024-09-16T19:30:22.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12608
Vulnerability from cvelistv5
Published
2017-11-20 20:00
Modified
2024-09-16 20:17
Severity ?
EPSS score ?
Summary
A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039735 | vdb-entry, x_refsource_SECTRACK | |
https://www.openoffice.org/security/cves/CVE-2017-12608.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4022 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/101585 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1039733 | vdb-entry, x_refsource_SECTRACK |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039735", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039735" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2017-12608.html" }, { "name": "DSA-4022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4022" }, { "name": "101585", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101585" }, { "name": "[debian-lts-announce] 20171220 [SECURITY] [DLA 1214-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html" }, { "name": "1039733", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039733" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } ], "datePublic": "2017-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Potential Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T10:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "1039735", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039735" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2017-12608.html" }, { "name": "DSA-4022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4022" }, { "name": "101585", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101585" }, { "name": "[debian-lts-announce] 20171220 [SECURITY] [DLA 1214-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html" }, { "name": "1039733", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039733" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-11-19T00:00:00", "ID": "CVE-2017-12608", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Potential Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "1039735", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039735" }, { "name": "https://www.openoffice.org/security/cves/CVE-2017-12608.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2017-12608.html" }, { "name": "DSA-4022", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4022" }, { "name": "101585", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101585" }, { "name": "[debian-lts-announce] 20171220 [SECURITY] [DLA 1214-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html" }, { "name": "1039733", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039733" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-12608", "datePublished": "2017-11-20T20:00:00Z", "dateReserved": "2017-08-07T00:00:00", "dateUpdated": "2024-09-16T20:17:10.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6803
Vulnerability from cvelistv5
Published
2017-11-13 14:00
Modified
2024-09-16 17:54
Severity ?
EPSS score ?
Summary
An installer defect known as an "unquoted Windows search path vulnerability" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/94418 | vdb-entry, x_refsource_BID | |
https://www.openoffice.org/security/cves/CVE-2016-6803.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1037015 | vdb-entry, x_refsource_SECTRACK |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94418", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2016-6803.html" }, { "name": "1037015", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.2" }, { "status": "affected", "version": "Older versions, including some using the previous OpenOffice.org brand, are also affected." } ] } ], "datePublic": "2016-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "An installer defect known as an \"unquoted Windows search path vulnerability\" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit." } ], "problemTypes": [ { "descriptions": [ { "description": "Trojan Execution (on previously infected system)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "94418", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2016-6803.html" }, { "name": "1037015", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037015" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2016-10-11T00:00:00", "ID": "CVE-2016-6803", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.2" }, { "version_value": "Older versions, including some using the previous OpenOffice.org brand, are also affected." } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An installer defect known as an \"unquoted Windows search path vulnerability\" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Trojan Execution (on previously infected system)" } ] } ] }, "references": { "reference_data": [ { "name": "94418", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94418" }, { "name": "https://www.openoffice.org/security/cves/CVE-2016-6803.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2016-6803.html" }, { "name": "1037015", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037015" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-6803", "datePublished": "2017-11-13T14:00:00Z", "dateReserved": "2016-08-12T00:00:00", "dateUpdated": "2024-09-16T17:54:04.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28129
Vulnerability from cvelistv5
Published
2021-10-07 15:50
Modified
2024-08-03 21:33
Severity ?
EPSS score ?
Summary
DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E | x_refsource_MISC | |
https://lists.apache.org/thread.html/r9e72234dd662280fa1a3cca6164d3470a1dbc0d8e53e48ba27f787ce%40%3Cannounce.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2021/10/07/5 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:17.499Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9e72234dd662280fa1a3cca6164d3470a1dbc0d8e53e48ba27f787ce%40%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/07/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux DEB installs" ], "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Apache OpenOffice 4.1.8" } ] } ], "credits": [ { "lang": "en", "value": "Arrigo Marchiori" } ], "descriptions": [ { "lang": "en", "value": "While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. This both caused issues with desktop integration and could allow a crafted attack on files owned by that user or group if they exist. Users who installed the Apache OpenOffice 4.1.8 DEB packaging should upgrade to the latest version of Apache OpenOffice." } ], "metrics": [ { "other": { "content": { "other": "low" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-07T17:06:22", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9e72234dd662280fa1a3cca6164d3470a1dbc0d8e53e48ba27f787ce%40%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/07/5" } ], "source": { "discovery": "UNKNOWN" }, "title": "DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-28129", "STATE": "PUBLIC", "TITLE": "DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "platform": "Linux DEB installs", "version_affected": "=", "version_name": "Apache OpenOffice", "version_value": "4.1.8" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Arrigo Marchiori" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. This both caused issues with desktop integration and could allow a crafted attack on files owned by that user or group if they exist. Users who installed the Apache OpenOffice 4.1.8 DEB packaging should upgrade to the latest version of Apache OpenOffice." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "low" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9e72234dd662280fa1a3cca6164d3470a1dbc0d8e53e48ba27f787ce@%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc9090ab48b4699494b63b35cd6d7414c52d665ecae12add3cdc56c9b@%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-28129: DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/07/5" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-28129", "datePublished": "2021-10-07T15:50:11", "dateReserved": "2021-03-10T00:00:00", "dateUpdated": "2024-08-03T21:33:17.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30245
Vulnerability from cvelistv5
Published
2021-04-15 19:30
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[openoffice-dev] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cdev.openoffice.apache.org%3E" }, { "name": "[openoffice-dev] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5%40%3Cdev.openoffice.apache.org%3E" }, { "name": "[openoffice-users] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[openoffice-users] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r7c01173f763b0c4212ada0e6ab283984d6e058d72258efce85c006ab%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "Apache OpenOffice", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Fabian Br\u00e4unlein and Lukas Euler of Positive Security" } ], "descriptions": [ { "lang": "en", "value": "The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to be careful opening documents from unknown and unverified sources. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to open the hyperlink." } ], "metrics": [ { "other": { "content": { "other": "moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "Insecure non-http(s) Hyperlinks could lead to untrusted code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-16T01:06:21", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[openoffice-dev] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cdev.openoffice.apache.org%3E" }, { "name": "[openoffice-dev] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5%40%3Cdev.openoffice.apache.org%3E" }, { "name": "[openoffice-users] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[openoffice-users] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r7c01173f763b0c4212ada0e6ab283984d6e058d72258efce85c006ab%40%3Cannounce.apache.org%3E" } ], "source": { "discovery": "UNKNOWN" }, "title": "Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-30245", "STATE": "PUBLIC", "TITLE": "Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache OpenOffice", "version_value": "4.1.9" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Fabian Br\u00e4unlein and Lukas Euler of Positive Security" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to be careful opening documents from unknown and unverified sources. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to open the hyperlink." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "moderate" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure non-http(s) Hyperlinks could lead to untrusted code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cusers.openoffice.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[openoffice-dev] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735@%3Cdev.openoffice.apache.org%3E" }, { "name": "[openoffice-dev] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5@%3Cdev.openoffice.apache.org%3E" }, { "name": "[openoffice-users] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r87ff11512e4883052991e6b725e20294224034ea8453b811fb3ee735@%3Cusers.openoffice.apache.org%3E" }, { "name": "[openoffice-users] 20210415 Re: CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra2cabdc083d5160a84de9a6436296ee5030fb3a16dc490dee4f983d5@%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20210415 CVE-2021-30245: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7c01173f763b0c4212ada0e6ab283984d6e058d72258efce85c006ab@%3Cannounce.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-30245", "datePublished": "2021-04-15T19:30:14", "dateReserved": "2021-04-07T00:00:00", "dateUpdated": "2024-08-03T22:24:59.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41831
Vulnerability from cvelistv5
Published
2021-10-11 08:10
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Timestamp Manipulation with Signature Wrapping
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra74d5057cdc781a36286a83e8bcbc90a7678f030ae73339c35dfc4f9%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41831: Apache OpenOffice: Timestamp Manipulation with Signature Wrapping", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc5c277cb83e335696657c5f27da1d1e2b5cb48346b0b55415a233757%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.10", "status": "affected", "version": "Apache OpenOffice", "versionType": "custom" }, { "lessThanOrEqual": "3.4", "status": "affected", "version": "OpenOffice.org", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache OpenOffice would like to thank Simon Rohlmann, Vladislav Mladenov, Christian Mainka, and Jorg Schwenk of Ruhr University Bochum, Germany" } ], "descriptions": [ { "lang": "en", "value": "It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory." } ], "metrics": [ { "other": { "content": { "other": "moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-11T11:06:15", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/ra74d5057cdc781a36286a83e8bcbc90a7678f030ae73339c35dfc4f9%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41831: Apache OpenOffice: Timestamp Manipulation with Signature Wrapping", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc5c277cb83e335696657c5f27da1d1e2b5cb48346b0b55415a233757%40%3Cannounce.apache.org%3E" } ], "source": { "discovery": "UNKNOWN" }, "title": "Timestamp Manipulation with Signature Wrapping", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-41831", "STATE": "PUBLIC", "TITLE": "Timestamp Manipulation with Signature Wrapping" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache OpenOffice", "version_value": "4.1.10" }, { "version_affected": "\u003c=", "version_name": "OpenOffice.org", "version_value": "3.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache OpenOffice would like to thank Simon Rohlmann, Vladislav Mladenov, Christian Mainka, and Jorg Schwenk of Ruhr University Bochum, Germany" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "moderate" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347 Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/ra74d5057cdc781a36286a83e8bcbc90a7678f030ae73339c35dfc4f9%40%3Cusers.openoffice.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/ra74d5057cdc781a36286a83e8bcbc90a7678f030ae73339c35dfc4f9%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41831: Apache OpenOffice: Timestamp Manipulation with Signature Wrapping", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc5c277cb83e335696657c5f27da1d1e2b5cb48346b0b55415a233757@%3Cannounce.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-41831", "datePublished": "2021-10-11T08:10:14", "dateReserved": "2021-09-30T00:00:00", "dateUpdated": "2024-08-04T03:22:24.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47804
Vulnerability from cvelistv5
Published
2023-12-29 14:31
Modified
2024-08-02 21:16
Severity ?
EPSS score ?
Summary
Apache OpenOffice: Macro URL arbitrary script execution
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:16:43.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/ygp59swfcy6g46jf8v9s6qpwmxn8fsvb" }, { "tags": [ "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2023-47804.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/03/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.14", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Amel BOUZIANE-LEBLOND aka Icare Bug Bounty Hunter" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eApache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.\u003c/p\u003e\u003cp\u003eLinks can be activated by clicks, or by automatic document events.\u003c/p\u003e\u003cp\u003eThe execution of such links must be subject to user approval.\u003c/p\u003e\u003cp\u003eIn the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.\u003c/p\u003e\u003cp\u003eThis is a corner case of CVE-2022-47502.\u003c/p\u003e" } ], "value": "Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.\n\nLinks can be activated by clicks, or by automatic document events.\n\nThe execution of such links must be subject to user approval.\n\nIn the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.\n\nThis is a corner case of CVE-2022-47502.\n\n" } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-29T14:31:28.081Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/ygp59swfcy6g46jf8v9s6qpwmxn8fsvb" }, { "url": "https://www.openoffice.org/security/cves/CVE-2023-47804.html" }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/03/3" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache OpenOffice: Macro URL arbitrary script execution", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-47804", "datePublished": "2023-12-29T14:31:28.081Z", "dateReserved": "2023-11-12T12:50:12.826Z", "dateUpdated": "2024-08-02T21:16:43.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-3157
Vulnerability from cvelistv5
Published
2017-11-20 20:00
Modified
2024-09-16 20:16
Severity ?
EPSS score ?
Summary
By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:0914 | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2017/dsa-3792 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securitytracker.com/id/1037893 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/96402 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2017:0979 | vendor-advisory, x_refsource_REDHAT | |
https://www.openoffice.org/security/cves/CVE-2017-3157.html | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:28.361Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:0914", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0914" }, { "name": "DSA-3792", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3792" }, { "name": "1037893", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037893" }, { "name": "96402", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96402" }, { "name": "RHSA-2017:0979", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0979" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2017-3157.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } ], "datePublic": "2017-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user\u0027s filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "RHSA-2017:0914", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0914" }, { "name": "DSA-3792", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3792" }, { "name": "1037893", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037893" }, { "name": "96402", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96402" }, { "name": "RHSA-2017:0979", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0979" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2017-3157.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-11-19T00:00:00", "ID": "CVE-2017-3157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user\u0027s filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0914", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0914" }, { "name": "DSA-3792", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3792" }, { "name": "1037893", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037893" }, { "name": "96402", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96402" }, { "name": "RHSA-2017:0979", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0979" }, { "name": "https://www.openoffice.org/security/cves/CVE-2017-3157.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2017-3157.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-3157", "datePublished": "2017-11-20T20:00:00Z", "dateReserved": "2016-12-05T00:00:00", "dateUpdated": "2024-09-16T20:16:57.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12607
Vulnerability from cvelistv5
Published
2017-11-20 19:00
Modified
2024-09-16 19:11
Severity ?
EPSS score ?
Summary
A vulnerability in OpenOffice's PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2017/dsa-4022 | vendor-advisory, x_refsource_DEBIAN | |
https://www.openoffice.org/security/cves/CVE-2017-12607.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101585 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1039734 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1039732 | vdb-entry, x_refsource_SECTRACK |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4022" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2017-12607.html" }, { "name": "101585", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101585" }, { "name": "[debian-lts-announce] 20171220 [SECURITY] [DLA 1214-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html" }, { "name": "1039734", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039734" }, { "name": "1039732", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039732" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } ], "datePublic": "2017-11-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in OpenOffice\u0027s PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Potential Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T10:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "DSA-4022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4022" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2017-12607.html" }, { "name": "101585", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101585" }, { "name": "[debian-lts-announce] 20171220 [SECURITY] [DLA 1214-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html" }, { "name": "1039734", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039734" }, { "name": "1039732", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039732" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-11-19T00:00:00", "ID": "CVE-2017-12607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in OpenOffice\u0027s PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Potential Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4022", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4022" }, { "name": "https://www.openoffice.org/security/cves/CVE-2017-12607.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2017-12607.html" }, { "name": "101585", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101585" }, { "name": "[debian-lts-announce] 20171220 [SECURITY] [DLA 1214-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html" }, { "name": "1039734", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039734" }, { "name": "1039732", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039732" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-12607", "datePublished": "2017-11-20T19:00:00Z", "dateReserved": "2017-08-07T00:00:00", "dateUpdated": "2024-09-16T19:11:04.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-9806
Vulnerability from cvelistv5
Published
2017-11-20 17:00
Modified
2024-09-16 22:45
Severity ?
EPSS score ?
Summary
A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.openoffice.org/security/cves/CVE-2017-9806.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101585 | vdb-entry, x_refsource_BID |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:02.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openoffice.org/security/cves/CVE-2017-9806.html" }, { "name": "101585", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } ], "datePublic": "2017-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Potential Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T10:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openoffice.org/security/cves/CVE-2017-9806.html" }, { "name": "101585", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101585" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-11-18T00:00:00", "ID": "CVE-2017-9806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.3, and some previous releases, including some using our old OpenOffice.org brand" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Potential Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openoffice.org/security/cves/CVE-2017-9806.html", "refsource": "CONFIRM", "url": "http://www.openoffice.org/security/cves/CVE-2017-9806.html" }, { "name": "101585", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101585" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9806", "datePublished": "2017-11-20T17:00:00Z", "dateReserved": "2017-06-21T00:00:00", "dateUpdated": "2024-09-16T22:45:39.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38745
Vulnerability from cvelistv5
Published
2023-03-24 15:56
Modified
2024-08-03 11:02
Severity ?
EPSS score ?
Summary
Apache OpenOffice: Empty entry in Java class path
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:02:14.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/q3noq7m681kvtb29m28x74q8cnwnzzo0" }, { "tags": [ "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2022-38745.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "4.1.14", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "sponsor", "value": "European Commission\u0027s Open Source Programme Office" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eApache OpenOffice versions before 4.1.14 may be configured to add an empty entry to the Java class path. This may lead to run arbitrary Java code from the current directory.\u003cbr\u003e\u003c/div\u003e" } ], "value": "Apache OpenOffice versions before 4.1.14 may be configured to add an empty entry to the Java class path. This may lead to run arbitrary Java code from the current directory.\n\n\n" } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-24T15:56:48.549Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/q3noq7m681kvtb29m28x74q8cnwnzzo0" }, { "url": "https://www.openoffice.org/security/cves/CVE-2022-38745.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache OpenOffice: Empty entry in Java class path", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-38745", "datePublished": "2023-03-24T15:56:48.549Z", "dateReserved": "2022-08-25T07:16:01.549Z", "dateUpdated": "2024-08-03T11:02:14.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6804
Vulnerability from cvelistv5
Published
2017-11-20 15:00
Modified
2024-09-16 17:32
Severity ?
EPSS score ?
Summary
The Apache OpenOffice installer (versions prior to 4.1.3, including some branded as OpenOffice.org) for Windows contains a defective operation that allows execution of arbitrary code with elevated privileges. This requires that the location in which the installer is run has been previously poisoned by a file that impersonates a dynamic-link library that the installer depends upon.
References
▼ | URL | Tags |
---|---|---|
https://www.openoffice.org/security/cves/CVE-2016-6804.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/93774 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037016 | vdb-entry, x_refsource_SECTRACK |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:37.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2016-6804.html" }, { "name": "93774", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93774" }, { "name": "1037016", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.2" }, { "status": "affected", "version": "older releases are also affected, including some branded as OpenOffice.org" } ] } ], "datePublic": "2017-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The Apache OpenOffice installer (versions prior to 4.1.3, including some branded as OpenOffice.org) for Windows contains a defective operation that allows execution of arbitrary code with elevated privileges. This requires that the location in which the installer is run has been previously poisoned by a file that impersonates a dynamic-link library that the installer depends upon." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Code Execution at installation time", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T10:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2016-6804.html" }, { "name": "93774", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93774" }, { "name": "1037016", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037016" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-11-18T00:00:00", "ID": "CVE-2016-6804", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.2" }, { "version_value": "older releases are also affected, including some branded as OpenOffice.org" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Apache OpenOffice installer (versions prior to 4.1.3, including some branded as OpenOffice.org) for Windows contains a defective operation that allows execution of arbitrary code with elevated privileges. This requires that the location in which the installer is run has been previously poisoned by a file that impersonates a dynamic-link library that the installer depends upon." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Code Execution at installation time" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openoffice.org/security/cves/CVE-2016-6804.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2016-6804.html" }, { "name": "93774", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93774" }, { "name": "1037016", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037016" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-6804", "datePublished": "2017-11-20T15:00:00Z", "dateReserved": "2016-08-12T00:00:00", "dateUpdated": "2024-09-16T17:32:53.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40439
Vulnerability from cvelistv5
Published
2021-10-07 15:50
Modified
2024-08-04 02:44
Severity ?
EPSS score ?
Summary
Billion Laughs
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E | x_refsource_MISC | |
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2021/10/07/4 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:44:10.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/07/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.10", "status": "affected", "version": "Apache OpenOffice", "versionType": "custom" }, { "lessThanOrEqual": "3.4", "status": "affected", "version": "OpenOffice.org", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a \"Billion Laughs\" entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched." } ], "metrics": [ { "other": { "content": { "other": "medium" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-07T17:06:15", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/07/4" } ], "source": { "discovery": "UNKNOWN" }, "title": "Billion Laughs", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-40439", "STATE": "PUBLIC", "TITLE": "Billion Laughs" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache OpenOffice", "version_value": "4.1.10" }, { "version_affected": "\u003c=", "version_name": "OpenOffice.org", "version_value": "3.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a \"Billion Laughs\" entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "medium" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611 Improper Restriction of XML External Entity Reference" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E" }, { "name": "[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E" }, { "name": "[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/07/4" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-40439", "datePublished": "2021-10-07T15:50:12", "dateReserved": "2021-09-02T00:00:00", "dateUpdated": "2024-08-04T02:44:10.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41830
Vulnerability from cvelistv5
Published
2021-10-11 08:10
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
Double Certificate Attack
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r97d287c88881aa581f1b18cb01e2cbedc4e6eae85958491acb89b12e%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41830: Apache OpenOffice: Double Certificate Attack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/raaab8a3b91f8d7b7ba14f873b8d0fd13952c823acc3385b7a374e754%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "4.1.10", "status": "affected", "version": "Apache OpenOffice", "versionType": "custom" }, { "lessThanOrEqual": "3.4", "status": "affected", "version": "OpenOffice.org", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache OpenOffice would like to thank Simon Rohlmann, Vladislav Mladenov, Christian Mainka, and Jorg Schwenk of Ruhr University Bochum, Germany" } ], "descriptions": [ { "lang": "en", "value": "It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory." } ], "metrics": [ { "other": { "content": { "other": "high" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-11T11:06:11", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/r97d287c88881aa581f1b18cb01e2cbedc4e6eae85958491acb89b12e%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41830: Apache OpenOffice: Double Certificate Attack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/raaab8a3b91f8d7b7ba14f873b8d0fd13952c823acc3385b7a374e754%40%3Cannounce.apache.org%3E" } ], "source": { "discovery": "UNKNOWN" }, "title": "Double Certificate Attack", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-41830", "STATE": "PUBLIC", "TITLE": "Double Certificate Attack" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache OpenOffice", "version_value": "4.1.10" }, { "version_affected": "\u003c=", "version_name": "OpenOffice.org", "version_value": "3.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache OpenOffice would like to thank Simon Rohlmann, Vladislav Mladenov, Christian Mainka, and Jorg Schwenk of Ruhr University Bochum, Germany" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "high" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347 Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/r97d287c88881aa581f1b18cb01e2cbedc4e6eae85958491acb89b12e%40%3Cusers.openoffice.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r97d287c88881aa581f1b18cb01e2cbedc4e6eae85958491acb89b12e%40%3Cusers.openoffice.apache.org%3E" }, { "name": "[announce] 20211010 CVE-2021-41830: Apache OpenOffice: Double Certificate Attack", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/raaab8a3b91f8d7b7ba14f873b8d0fd13952c823acc3385b7a374e754@%3Cannounce.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-41830", "datePublished": "2021-10-11T08:10:12", "dateReserved": "2021-09-30T00:00:00", "dateUpdated": "2024-08-04T03:22:24.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37400
Vulnerability from cvelistv5
Published
2022-08-13 06:40
Modified
2024-08-03 10:29
Severity ?
EPSS score ?
Summary
Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password
References
▼ | URL | Tags |
---|---|---|
https://www.openoffice.org/security/cves/CVE-2022-37400.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/08/13/1 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:20.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2022-37400.html" }, { "name": "[oss-security] 20220812 CVE-2022-37400: Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/13/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "4.1.13", "status": "affected", "version": "Apache OpenOffice 4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "OpenSource Security GmbH on behalf of the German Federal Office for Information Security" } ], "descriptions": [ { "lang": "en", "value": "Apache OpenOffice supports the storage of passwords for web connections in the user\u0027s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user\u0027s configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice" } ], "metrics": [ { "other": { "content": { "other": "important" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330 Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T08:15:00.444Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.openoffice.org/security/cves/CVE-2022-37400.html" }, { "name": "[oss-security] 20220812 CVE-2022-37400: Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/13/1" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-37400", "STATE": "PUBLIC", "TITLE": "Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "Apache OpenOffice 4", "version_value": "4.1.13" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "OpenSource Security GmbH on behalf of the German Federal Office for Information Security" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache OpenOffice supports the storage of passwords for web connections in the user\u0027s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user\u0027s configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "important" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-330 Use of Insufficiently Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openoffice.org/security/cves/CVE-2022-37400.html", "refsource": "MISC", "url": "https://www.openoffice.org/security/cves/CVE-2022-37400.html" }, { "name": "[oss-security] 20220812 CVE-2022-37400: Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/13/1" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-37400", "datePublished": "2022-08-13T06:40:11", "dateReserved": "2022-08-04T00:00:00", "dateUpdated": "2024-08-03T10:29:20.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }