[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3394-1 libreoffice -- libreoffice

ID: oval:org.secpod.oval:def:602270Date: (C)2015-11-17   (M)2023-07-28
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in LibreOffice, a full-featured office productivity: CVE-2015-4551 Federico Scrinzi discovered an information leak in the handling of ODF documents. Quoting from https://www.libreoffice.org/about-us/security/advisories/cve-2015-4551/: The LinkUpdateMode feature controls whether documents inserted into Writer or Calc via links will either not get updated, or prompt to update, or automatically update, when the parent document is loaded. The configuration of this option was stored in the document. That flawed approach enabled documents to be crafted with links to plausible targets on the victims host computer. The contents of those automatically inserted after load links can be concealed in hidden sections and retrieved by the attacker if the document is saved and returned to sender, or via http requests if the user has selected lower security settings for that document. CVE-2015-5212 A buffer overflow in parsing the printer setup information in ODF documents may result in the execution of arbitrary code. CVE-2015-5213 / CVE-2015-5214 A buffer overflow and an integer oect memory management in parsing Microsoft Word documents may result in the execution of arbitrary code.

Platform:
Debian 8.x
Debian 7.x
Product:
libreoffice
Reference:
DSA-3394-1
CVE-2015-4551
CVE-2015-5212
CVE-2015-5213
CVE-2015-5214
CVE    4
CVE-2015-4551
CVE-2015-5214
CVE-2015-5212
CVE-2015-5213
...
CPE    3
cpe:/a:libreoffice:libreoffice
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies