CVE-2016-6803
Vulnerability from cvelistv5
Published
2017-11-13 14:00
Modified
2024-09-16 17:54
Severity ?
EPSS score ?
Summary
An installer defect known as an "unquoted Windows search path vulnerability" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.securityfocus.com/bid/94418 | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.securitytracker.com/id/1037015 | Third Party Advisory, VDB Entry | |
security@apache.org | https://www.openoffice.org/security/cves/CVE-2016-6803.html | Issue Tracking, Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OpenOffice |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94418", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94418" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openoffice.org/security/cves/CVE-2016-6803.html" }, { "name": "1037015", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache OpenOffice", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.2" }, { "status": "affected", "version": "Older versions, including some using the previous OpenOffice.org brand, are also affected." } ] } ], "datePublic": "2016-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "An installer defect known as an \"unquoted Windows search path vulnerability\" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit." } ], "problemTypes": [ { "descriptions": [ { "description": "Trojan Execution (on previously infected system)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "94418", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94418" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openoffice.org/security/cves/CVE-2016-6803.html" }, { "name": "1037015", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037015" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2016-10-11T00:00:00", "ID": "CVE-2016-6803", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache OpenOffice", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.2" }, { "version_value": "Older versions, including some using the previous OpenOffice.org brand, are also affected." } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An installer defect known as an \"unquoted Windows search path vulnerability\" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Trojan Execution (on previously infected system)" } ] } ] }, "references": { "reference_data": [ { "name": "94418", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94418" }, { "name": "https://www.openoffice.org/security/cves/CVE-2016-6803.html", "refsource": "CONFIRM", "url": "https://www.openoffice.org/security/cves/CVE-2016-6803.html" }, { "name": "1037015", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037015" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-6803", "datePublished": "2017-11-13T14:00:00Z", "dateReserved": "2016-08-12T00:00:00", "dateUpdated": "2024-09-16T17:54:04.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-6803\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-11-13T14:29:00.417\",\"lastModified\":\"2017-11-29T17:15:19.737\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"An installer defect known as an \\\"unquoted Windows search path vulnerability\\\" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit.\"},{\"lang\":\"es\",\"value\":\"Un defecto de instalador conocido como \\\"unquoted Windows search path vulnerability\\\" afect\u00f3 a los instaladores de Apache OpenOffice en versiones anteriores a la 4.1.3. El PC debi\u00f3 haber sido previamente infectado por una aplicaci\u00f3n troyana (o usuario) que se ejecute con privilegios de administrador. Cualquier instalador con la vulnerabilidad de ruta de b\u00fasqueda sin entrecomillar se convierte en un detonador programado para el exploit.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"8A0A9AF4-3EBE-4441-BCC8-A9BDABAD2D45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/94418\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037015\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.openoffice.org/security/cves/CVE-2016-6803.html\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.