FKIE_CVE-2024-6472
Vulnerability from fkie_nvd - Published: 2024-08-05 13:15 - Updated: 2024-08-06 16:31
Severity ?
Summary
Certificate Validation user interface in LibreOffice allows potential vulnerability.
Signed macros are scripts that have been digitally signed by the
developer using a cryptographic signature. When a document with a signed
macro is opened a warning is displayed by LibreOffice before the macro
is executed.
Previously if verification failed the user could fail to understand the failure and choose to enable the macros anyway.
This issue affects LibreOffice: from 24.2 before 24.2.5.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certificate Validation user interface in LibreOffice allows potential vulnerability.\n\n\n\n\nSigned macros are scripts that have been digitally signed by the \ndeveloper using a cryptographic signature. When a document with a signed\n macro is opened a warning is displayed by LibreOffice before the macro \nis executed.\n\nPreviously if verification failed the user could fail to understand the failure and choose to enable the macros anyway.\n\n\nThis issue affects LibreOffice: from 24.2 before 24.2.5."
},
{
"lang": "es",
"value": "La interfaz de usuario de Validaci\u00f3n de certificados en LibreOffice permite una vulnerabilidad potencial. Las macros firmadas son scripts que el desarrollador ha firmado digitalmente mediante una firma criptogr\u00e1fica. Cuando se abre un documento con una macro firmada, LibreOffice muestra una advertencia antes de ejecutar la macro. Anteriormente, si la verificaci\u00f3n fallaba, el usuario pod\u00eda no comprender el error y optar por habilitar las macros de todos modos. Este problema afecta a LibreOffice: desde 24.2 antes de 24.2.5."
}
],
"id": "CVE-2024-6472",
"lastModified": "2024-08-06T16:31:05.780",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security@documentfoundation.org",
"type": "Secondary"
}
]
},
"published": "2024-08-05T13:15:47.033",
"references": [
{
"source": "security@documentfoundation.org",
"url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2024-6472"
}
],
"sourceIdentifier": "security@documentfoundation.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "security@documentfoundation.org",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…