svn commit: r554861 - head/security/vuxml

Don Lewis truckman at FreeBSD.org
Tue Nov 10 23:56:31 UTC 2020


Author: truckman
Date: Tue Nov 10 23:56:30 2020
New Revision: 554861
URL: https://svnweb.freebsd.org/changeset/ports/554861

Log:
  Document vulnerability in editors/openoffice-4 < 4.1.8 and openoffice-devel
  
  CVE-2020-13958 Unrestricted actions leads to arbitrary code execution
  in crafted documents
  
  A vulnerability in Apache OpenOffice scripting events allows an
  attacker to construct documents containing hyperlinks pointing to
  an executable on the target users file system. These hyperlinks can
  be triggered unconditionally. In fixed versions no internal protocol
  may be called from the document event handler and other hyperlinks
  require a control-click.
  
  <https://www.openoffice.org/security/cves/CVE-2020-13958.html>

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Nov 10 23:56:00 2020	(r554860)
+++ head/security/vuxml/vuln.xml	Tue Nov 10 23:56:30 2020	(r554861)
@@ -58,6 +58,43 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6">
+    <topic>Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents</topic>
+    <affects>
+      <package>
+	<name>apache-openoffice</name>
+	<range><lt>4.1.8</lt></range>
+      </package>
+      <package>
+	<name>apache-openoffice-devel</name>
+	<range><lt>4.2.1602022694,4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The Apache Openofffice project reports:</p>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2020-13958.html">
+	  <h1>CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in crafted documents</h1>
+	  <h2>Description</h2>
+	  <p>A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.</p>
+	  <h2>Severity: Low</h2>
+	  <p>There are no known exploits of this vulnerability.<br/>A proof-of-concept demonstration exists.</p>
+	  <p>Thanks to the reporter for discovering this issue.</p>
+	  <h2>Acknowledgments</h2>
+	  <p>The Apache OpenOffice Security Team would like to thank Imre Rad for discovering and reporting this attack vector.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.openoffice.org/security/cves/CVE-2020-13958.html</url>
+      <cvename>CVE-2020-13958</cvename>
+    </references>
+    <dates>
+      <discovery>2020-04-28</discovery>
+      <entry>2020-11-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="07c7ae7a-224b-11eb-aa6e-e0d55e2a8bf9">
     <topic>raptor2 -- buffer overflow</topic>
     <affects>


More information about the svn-ports-all mailing list