Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 Mar 2023 01:21:07 GMT
From:      Don Lewis <truckman@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 4cc9e62c14ec - main - security/vuxml: openoffice 2022 vulnerabilities
Message-ID:  <202303080121.3281L7Yd056769@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by truckman:

URL: https://cgit.FreeBSD.org/ports/commit/?id=4cc9e62c14ec4daaebce7350a190a26c4c387f3f

commit 4cc9e62c14ec4daaebce7350a190a26c4c387f3f
Author:     Don Lewis <truckman@FreeBSD.org>
AuthorDate: 2023-03-08 01:17:01 +0000
Commit:     Don Lewis <truckman@FreeBSD.org>
CommitDate: 2023-03-08 01:17:01 +0000

    security/vuxml: openoffice 2022 vulnerabilities
    
    Belatedly document Apache OpenOffice vulnerabilities from 2022.  The
    port was broken at the time.
---
 security/vuxml/vuln/2023.xml | 34 ++++++++++++++++++++++++++++++++++
 1 file changed, 34 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 2b17919a9eac..62b2600e5c4f 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,37 @@
+  <vuln vid="6678211c-bd47-11ed-beb0-1c1b0d9ea7e6">
+    <topic>Apache OpenOffice -- master password vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>apache-openoffice</name>
+	<range><lt>4.1.13</lt></range>
+      </package>
+      <package>
+	<name>apache-openoffice-devel</name>
+	<range><lt>4.2.1678061694i,4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Apache Openoffice project reports:</p>
+	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37400">;
+	  <p>Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice</p>
+	</blockquote>
+	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37401">;
+	  <p>Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-37400</cvename>
+      <cvename>CVE-2022-37401</cvename>
+      <url>https://cwiki.apache.org/confluence/display/OOOUSERS/AOO+4.1.13+Release+Notes</url>;
+    </references>
+    <dates>
+      <discovery>2022-02-25</discovery>
+      <entry>2023-03-08</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f0798a6a-bbdb-11ed-ba99-080027f5fec9">
     <topic>rack -- possible DoS vulnerability in multipart MIME parsing</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202303080121.3281L7Yd056769>