Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202212-04

Gentoo Linux Security Advisory 202212-4 - A vulnerability has been discovered in LibreOffice which could result in arbitrary script execution via crafted links. Versions less than 7.3.6.2 are affected.

Packet Storm
#vulnerability#web#mac#linux

Gentoo Linux Security Advisory GLSA 202212-04


                                       https://security.gentoo.org/  

Severity: High
Title: LibreOffice: Arbitrary Code Execution
Date: December 19, 2022
Bugs: #876869
ID: 202212-04


Synopsis

A vulnerability has been discovered in LibreOffice which could result in
arbitrary script execution via crafted links.

Background

LibreOffice is a powerful office suite; its clean interface and powerful
tools let you unleash your creativity and grow your productivity.

Affected packages

-------------------------------------------------------------------  
 Package              /     Vulnerable     /            Unaffected  
-------------------------------------------------------------------  

1 app-office/libreoffice < 7.3.6.2 >= 7.3.6.2
2 app-office/libreoffice-bin < 7.3.6.2 >= 7.3.6.2

Description

LibreOffice links using the vnd.libreoffice.command scheme could be
constructed to call internal macros with arbitrary arguments. Which when
clicked on, or activated by document events, could result in arbitrary
script execution without warning.

Impact

An attacker able to coerce a victim into opening a crafted LibreOffice
document and execute certain actions with it could achieve remote code
execution.

Workaround

There is no known workaround at this time.

Resolution

All LibreOffice users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=app-office/libreoffice-7.3.6.2”

All LibreOffice binary users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=app-office/libreoffice-bin-7.3.6.2”

References

[ 1 ] CVE-2022-3140
https://nvd.nist.gov/vuln/detail/CVE-2022-3140

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202212-04

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Red Hat Security Advisory 2023-0089-01

Red Hat Security Advisory 2023-0089-01 - LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Issues addressed include a script execution vulnerability.

Ubuntu Security Notice USN-5694-1

Ubuntu Security Notice 5694-1 - It was discovered that LibreOffice incorrectly handled links using the Office URI Schemes. If a user were tricked into opening a specially crafted document, a remote attacker could use this issue to execute arbitrary scripts. Thomas Florian discovered that LibreOffice incorrectly handled crashes when an encrypted document is open. If the document is recovered upon restarting LibreOffice, subsequent saves of the document were unencrypted. This issue only affected Ubuntu 18.04 LTS.

CVE-2022-3140: CVE-2022-3140 | LibreOffice - Free Office Suite - Based on OpenOffice

LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6.

Packet Storm: Latest News

ABB Cylon Aspect 3.08.01 persistenceManagerAjax.php Directory Traversal