Bug 1134172 (CVE-2014-3524) - CVE-2014-3524 libreoffice/openoffice.org: CSV command injection and DDE formulas
Summary: CVE-2014-3524 libreoffice/openoffice.org: CSV command injection and DDE formulas
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2014-3524
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1138878
TreeView+ depends on / blocked
 
Reported: 2014-08-27 04:09 UTC by Murray McAllister
Modified: 2021-02-17 06:16 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2014-08-27 04:10:20 UTC
Embargoed:


Attachments (Terms of Use)

Description Murray McAllister 2014-08-27 04:09:43 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-3524 to
the following vulnerability:

Name: CVE-2014-3524
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3524
Assigned: 20140514
Reference: BUGTRAQ:20140821 CVE-2014-3524: Apache OpenOffice Calc Command Injection Vulnerability
Reference: http://www.securityfocus.com/archive/1/archive/1/533200/100/0/threaded
Reference: http://www.securityfocus.com/bid/69351
Reference: SECTRACK:1030755
Reference: http://www.securitytracker.com/id/1030755
Reference: XF:apache-openoffice-cve20143524-command-exec(95421)
Reference: http://xforce.iss.net/xforce/xfdb/95421

Apache OpenOffice before 4.1.1 allows remote attackers to execute
arbitrary commands and possibly have other unspecified impact via a
crafted Calc spreadsheet.

Comment 1 Murray McAllister 2014-08-27 04:10:20 UTC
This is a flaw in the way LibreOffice/OpenOffice works with Dynamic Data Exchange in Windows. It does not affect Linux builds.

Statement:

Not vulnerable. This issue does not affect the version of OpenOffice as shipped in Red Hat Enterprise Linux 5. This issue does not affect the version of LibreOffice as shipped in Red Hat Enterprise Linux 6 and 7.


Note You need to log in before you can comment on or make changes to this bug.