Lucene search

K
gentooGentoo FoundationGLSA-201603-05
HistoryMar 09, 2016 - 12:00 a.m.

LibreOffice, OpenOffice: Multiple vulnerabilities

2016-03-0900:00:00
Gentoo Foundation
security.gentoo.org
43

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.789 High

EPSS

Percentile

98.2%

Background

Apache OpenOffice is the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more.

LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.

Description

Multiple vulnerabilities were found in both LibreOffice and OpenOffice that allow the remote execution of arbitrary code and potential Denial of Service. These vulnerabilities may be exploited through multiple vectors including crafted documents, link handling, printer setup in ODF document types, DOC file formats, and Calc spreadsheets. Please review the referenced CVE’s for specific information regarding each.

Impact

A remote attacker could entice a user to open a specially crafted file using the LibreOffice or OpenOffice suite of software. Execution of these attacks could possibly result in the execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known work around at this time.

Resolution

All LibreOffice users should upgrade their respective packages to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/libreoffice-4.4.2"
 # emerge --ask --oneshot --verbose
 ">=app-office/libreoffice-bin-4.4.2"# emerge --ask --oneshot --verbose
 ">=app-office/libreoffice-bin-debug-4.4.2"

All OpenOffice users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-4.1.2"

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.789 High

EPSS

Percentile

98.2%