svn commit: r452959 - head/security/vuxml

Don Lewis truckman at FreeBSD.org
Thu Oct 26 22:46:36 UTC 2017


Author: truckman
Date: Thu Oct 26 22:46:35 2017
New Revision: 452959
URL: https://svnweb.freebsd.org/changeset/ports/452959

Log:
  Update Apache OpenOffice entry.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Oct 26 22:34:30 2017	(r452958)
+++ head/security/vuxml/vuln.xml	Thu Oct 26 22:46:35 2017	(r452959)
@@ -142,7 +142,7 @@ Notes:
   </vuln>
 
   <vuln vid="27229c67-b8ff-11e7-9f79-ac9e174be3af">
-    <topic>openoffice -- multiple vulnerabilities</topic>
+    <topic>Apache OpenOffice -- multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>apache-openoffice</name>
@@ -156,14 +156,35 @@ Notes:
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">
 	<p>The Apache Openofffice project reports:</p>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-3157.html">
+	  <p>By exploiting the way OpenOffice renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to sent the document back to the attacker.</p>
+	  <p>The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.</p>
+	</blockquote>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-9806.html">
+	  <p>A vulnerability in the OpenOffice Writer DOC file parser, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+	</blockquote>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-12607.html">
+	  <p>A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+	</blockquote>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-12608.html">
+	  <p>A vulnerability in OpenOffice Writer DOC file parser, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+	</blockquote>
       </body>
     </description>
     <references>
-      <url/>
+      <url>https://www.openoffice.org/security/cves/CVE-2017-3157.html</url>
+      <url>https://www.openoffice.org/security/cves/CVE-2017-9806.html</url>
+      <url>https://www.openoffice.org/security/cves/CVE-2017-12607.html</url>
+      <url>https://www.openoffice.org/security/cves/CVE-2017-12608.html</url>
+      <cvename>CVE-2017-3157</cvename>
+      <cvename>CVE-2017-9806</cvename>
+      <cvename>CVE-2017-12607</cvename>
+      <cvename>CVE-2017-12608</cvename>
     </references>
     <dates>
-      <discovery>2017-10-24</discovery>
+      <discovery>2016-09-11</discovery>
       <entry>2017-10-24</entry>
+      <modified>2017-10-26</modified>
     </dates>
   </vuln>
 


More information about the svn-ports-all mailing list