Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Nov 2020 23:56:31 +0000 (UTC)
From:      Don Lewis <truckman@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r554861 - head/security/vuxml
Message-ID:  <202011102356.0AANuVat032641@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: truckman
Date: Tue Nov 10 23:56:30 2020
New Revision: 554861
URL: https://svnweb.freebsd.org/changeset/ports/554861

Log:
  Document vulnerability in editors/openoffice-4 < 4.1.8 and openoffice-devel
  
  CVE-2020-13958 Unrestricted actions leads to arbitrary code execution
  in crafted documents
  
  A vulnerability in Apache OpenOffice scripting events allows an
  attacker to construct documents containing hyperlinks pointing to
  an executable on the target users file system. These hyperlinks can
  be triggered unconditionally. In fixed versions no internal protocol
  may be called from the document event handler and other hyperlinks
  require a control-click.
  
  <https://www.openoffice.org/security/cves/CVE-2020-13958.html>;

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Nov 10 23:56:00 2020	(r554860)
+++ head/security/vuxml/vuln.xml	Tue Nov 10 23:56:30 2020	(r554861)
@@ -58,6 +58,43 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6">
+    <topic>Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents</topic>
+    <affects>
+      <package>
+	<name>apache-openoffice</name>
+	<range><lt>4.1.8</lt></range>
+      </package>
+      <package>
+	<name>apache-openoffice-devel</name>
+	<range><lt>4.2.1602022694,4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The Apache Openofffice project reports:</p>
+	<blockquote cite="https://www.openoffice.org/security/cves/CVE-2020-13958.html">;
+	  <h1>CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in crafted documents</h1>
+	  <h2>Description</h2>
+	  <p>A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.</p>
+	  <h2>Severity: Low</h2>
+	  <p>There are no known exploits of this vulnerability.<br/>A proof-of-concept demonstration exists.</p>
+	  <p>Thanks to the reporter for discovering this issue.</p>
+	  <h2>Acknowledgments</h2>
+	  <p>The Apache OpenOffice Security Team would like to thank Imre Rad for discovering and reporting this attack vector.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.openoffice.org/security/cves/CVE-2020-13958.html</url>;
+      <cvename>CVE-2020-13958</cvename>
+    </references>
+    <dates>
+      <discovery>2020-04-28</discovery>
+      <entry>2020-11-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="07c7ae7a-224b-11eb-aa6e-e0d55e2a8bf9">
     <topic>raptor2 -- buffer overflow</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202011102356.0AANuVat032641>