FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e87c2647-a188-11eb-8806-1c1b0d9ea7e6All versions of Apache OpenOffice through 4.1.9 can open non-http(s) hyperlinks. If the link is specifically crafted this could lead to untrusted code execution.

The Apache Openofffice project reports:

The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to be careful opening documents from unknown and unverified sources. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to open the hyperlink.


Discovery 2021-01-25
Entry 2021-04-20
apache-openoffice
< 4.1.10

apache-openoffice-devel
< 4.2.1619649022,4

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30245
CVE-2021-30245
4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents

The Apache Openofffice project reports:

CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in crafted documents

Description

A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.

Severity: Low

There are no known exploits of this vulnerability.

A proof-of-concept demonstration exists.

Thanks to the reporter for discovering this issue.

Acknowledgments

The Apache OpenOffice Security Team would like to thank Imre Rad for discovering and reporting this attack vector.


Discovery 2020-04-28
Entry 2020-11-10
apache-openoffice
< 4.1.8

apache-openoffice-devel
< 4.2.1602022694,4

https://www.openoffice.org/security/cves/CVE-2020-13958.html
CVE-2020-13958
72f71e26-4f69-11e6-ac37-ac9e174be3afApache OpenOffice 4.1.2 -- Memory Corruption Vulnerability (Impress Presentations)

The Apache OpenOffice Project reports:

An OpenDocument Presentation .ODP or Presentation Template .OTP file can contain invalid presentation elements that lead to memory corruption when the document is loaded in Apache OpenOffice Impress. The defect may cause the document to appear as corrupted and OpenOffice may crash in a recovery-stuck mode requiring manual intervention. A crafted exploitation of the defect can allow an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.


Discovery 2016-07-17
Entry 2016-07-21
apache-openoffice
< 4.1.2_8

apache-openoffice-devel
< 4.2.1753426,4

CVE-2016-1513
http://www.openoffice.org/security/cves/CVE-2015-4551.html
18b3c61b-83de-11e5-905b-ac9e174be3afOpenOffice 4.1.1 -- multiple vulnerabilities

The Apache OpenOffice Project reports:

A vulnerability in OpenOffice settings of OpenDocument Format files and templates allows silent access to files that are readable from an user account, over-riding the user's default configuration settings. Once these files are imported into a maliciously-crafted document, the data can be silently hidden in the document and possibly exported to an external party without being observed.

The Apache OpenOffice Project reports:

A crafted ODF document can be used to create a buffer that is too small for the amount of data loaded into it, allowing an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.

The Apache OpenOffice Project reports:

A crafted Microsoft Word DOC file can be used to specify a document buffer that is too small for the amount of data provided for it. Failure to detect the discrepancy allows an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.

The Apache OpenOffice Project reports:

A crafted Microsoft Word DOC can contain invalid bookmark positions leading to memory corruption when the document is loaded or bookmarks are manipulated. The defect allows an attacker to cause denial of service (memory corruption and application crash) and possible execution of arbitrary code.


Discovery 2015-11-04
Entry 2015-11-05
Modified 2015-11-05
apache-openoffice
< 4.1.2

apache-openoffice-devel
< 4.2.1705368,3

CVE-2015-4551
http://www.openoffice.org/security/cves/CVE-2015-4551.html
CVE-2015-5212
http://www.openoffice.org/security/cves/CVE-2015-5212.html
CVE-2015-5213
http://www.openoffice.org/security/cves/CVE-2015-5213.html
CVE-2015-5214
http://www.openoffice.org/security/cves/CVE-2015-5214.html
27229c67-b8ff-11e7-9f79-ac9e174be3afApache OpenOffice -- multiple vulnerabilities

The Apache Openofffice project reports:

CVE-2017-3157: Arbitrary file disclosure in Calc and Writer

By exploiting the way OpenOffice renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to sent the document back to the attacker.

The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.

CVE-2017-9806: Out-of-Bounds Write in Writer's WW8Fonts Constructor

A vulnerability in the OpenOffice Writer DOC file parser, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.

CVE-2017-12607: Out-of-Bounds Write in Impress' PPT Filter

A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.

CVE-2017-12608: Out-of-Bounds Write in Writer's ImportOldFormatStyles

A vulnerability in OpenOffice Writer DOC file parser, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.


Discovery 2016-09-11
Entry 2017-10-24
Modified 2017-10-26
apache-openoffice
< 4.1.4

apache-openoffice-devel
< 4.2.1810071_1,4

https://www.openoffice.org/security/cves/CVE-2017-3157.html
https://www.openoffice.org/security/cves/CVE-2017-9806.html
https://www.openoffice.org/security/cves/CVE-2017-12607.html
https://www.openoffice.org/security/cves/CVE-2017-12608.html
CVE-2017-3157
CVE-2017-9806
CVE-2017-12607
CVE-2017-12608
04d2cf7f-2942-11ec-b48c-1c1b0d9ea7e6Apache OpenOffice -- multiple vulnerabilities.

The Apache Openoffice project reports:

Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10

It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory

It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory.

It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory.


Discovery 2021-05-04
Entry 2021-10-09
apache-openoffice
< 4.1.11

apache-openoffice-devel
< 4.2.1633255994,4

CVE-2021-33035
CVE-2021-41830
CVE-2021-41831
CVE-2021-41832
https://cwiki.apache.org/confluence/display/OOOUSERS/AOO+4.1.11+Release+Notes/#AOO4.1.11ReleaseNotes-Security