Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Oct 2017 22:46:35 +0000 (UTC)
From:      Don Lewis <truckman@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r452959 - head/security/vuxml
Message-ID:  <201710262246.v9QMkZ8N005497@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: truckman
Date: Thu Oct 26 22:46:35 2017
New Revision: 452959
URL: https://svnweb.freebsd.org/changeset/ports/452959

Log:
  Update Apache OpenOffice entry.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Oct 26 22:34:30 2017	(r452958)
+++ head/security/vuxml/vuln.xml	Thu Oct 26 22:46:35 2017	(r452959)
@@ -142,7 +142,7 @@ Notes:
   </vuln>
 
   <vuln vid="27229c67-b8ff-11e7-9f79-ac9e174be3af">
-    <topic>openoffice -- multiple vulnerabilities</topic>
+    <topic>Apache OpenOffice -- multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>apache-openoffice</name>
@@ -156,14 +156,35 @@ Notes:
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>The Apache Openofffice project reports:</p>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-3157.html">;
+	  <p>By exploiting the way OpenOffice renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to sent the document back to the attacker.</p>
+	  <p>The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.</p>
+	</blockquote>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-9806.html">;
+	  <p>A vulnerability in the OpenOffice Writer DOC file parser, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+	</blockquote>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-12607.html">;
+	  <p>A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+	</blockquote>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2017-12608.html">;
+	  <p>A vulnerability in OpenOffice Writer DOC file parser, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+	</blockquote>
       </body>
     </description>
     <references>
-      <url/>
+      <url>https://www.openoffice.org/security/cves/CVE-2017-3157.html</url>;
+      <url>https://www.openoffice.org/security/cves/CVE-2017-9806.html</url>;
+      <url>https://www.openoffice.org/security/cves/CVE-2017-12607.html</url>;
+      <url>https://www.openoffice.org/security/cves/CVE-2017-12608.html</url>;
+      <cvename>CVE-2017-3157</cvename>
+      <cvename>CVE-2017-9806</cvename>
+      <cvename>CVE-2017-12607</cvename>
+      <cvename>CVE-2017-12608</cvename>
     </references>
     <dates>
-      <discovery>2017-10-24</discovery>
+      <discovery>2016-09-11</discovery>
       <entry>2017-10-24</entry>
+      <modified>2017-10-26</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201710262246.v9QMkZ8N005497>