Bug 1138882 (CVE-2014-3575)
Summary: | CVE-2014-3575 openoffice: Arbitrary file disclosure via crafted OLE objects | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | caolanm, dtardon, erack, jrusnack, ltinkl, mstahl, sbergman |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openoffice.org 4.1.1 | Doc Type: | Bug Fix |
Doc Text: |
A flaw was found in the OLE (Object Linking and Embedding) generation in LibreOffice. An attacker could use this flaw to embed malicious OLE code in a LibreOffice document, allowing for arbitrary code execution.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-10 03:13:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1139592, 1164736 | ||
Bug Blocks: | 1121513, 1138878 |
Description
Vincent Danen
2014-09-05 22:31:38 UTC
Created libreoffice tracking bugs for this issue: Affects: fedora-all [bug 1139592] As per the upstream advisory: The vulnerability allows an attacker to send a document which when opened will trigger the prompt to "Update Links" but if the user cancels that prompt may still generate and insert into the document an OLE2 preview image of a file on the victims filesystem, Data exposure is possible if the updated document is then distributed to other parties. Reference: http://www.libreoffice.org/about-us/security/advisories/cve-2014-3575/ Mitigation: - Whenever possible, exercise caution when opening documents sent by unknown/untrusted parties. - If "Update Links" dialog is seen, when opening a document, do not send this document to others, since it may be possible that local files got attached to the document. (The exploit only works when the document is sent over to the attacker after opening it on your system using LibreOffice/OpenOffice) Statement: This issue affects the version of OpenOffice.org as shipped in Red Hat Enterprise Linux 5, and the version of LibreOffice as shipped in Red Hat Enterprise Linux 6. Red Hat Product Security has rated this issue as having Moderate security impact and is not planned to be addressed in any future updates. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:0377 https://rhn.redhat.com/errata/RHSA-2015-0377.html |