Jump to content
Compatible Support Forums
Sign in to follow this  
news

[gentoo-announce] [ GLSA 201603-05 ] LibreOffice, OpenOffice: Multiple vulnerabilities

Recommended Posts

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Gentoo Linux Security Advisory GLSA 201603-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

https://security.gentoo.org/

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 

Severity: Normal

Title: LibreOffice, OpenOffice: Multiple vulnerabilities

Date: March 09, 2016

Bugs: #521136, #522060, #528438, #534684, #547880, #547900, #565028

ID: 201603-05

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 

Synopsis

========

 

Multiple vulnerabilities have been found in both LibreOffice and

OpenOffice allowing remote attackers to execute arbitrary code or cause

Denial of Service.

 

Background

==========

 

Apache OpenOffice is the leading open-source office software suite for

word processing, spreadsheets, presentations, graphics, databases and

more.

 

LibreOffice is a powerful office suite; its clean interface and

powerful tools let you unleash your creativity and grow your

productivity.

 

Affected packages

=================

 

-------------------------------------------------------------------

Package / Vulnerable / Unaffected

-------------------------------------------------------------------

1 app-office/libreoffice < 4.4.2 >= 4.4.2

2 app-office/libreoffice-bin

< 4.4.2 >= 4.4.2

3 app-office/libreoffice-bin-debug

< 4.4.2 >= 4.4.2

4 app-office/openoffice-bin

< 4.1.2 >= 4.1.2

-------------------------------------------------------------------

4 affected packages

 

Description

===========

 

Multiple vulnerabilities were found in both LibreOffice and OpenOffice

that allow the remote execution of arbitrary code and potential Denial

of Service. These vulnerabilities may be exploited through multiple

vectors including crafted documents, link handling, printer setup in

ODF document types, DOC file formats, and Calc spreadsheets. Please

review the referenced CVE's for specific information regarding each.

 

Impact

======

 

A remote attacker could entice a user to open a specially crafted file

using the LibreOffice or OpenOffice suite of software. Execution of

these attacks could possibly result in the execution of arbitrary code

with the privileges of the process or a Denial of Service condition.

 

Workaround

==========

 

There is no known work around at this time.

 

Resolution

==========

 

All LibreOffice users should upgrade their respective packages to the

latest version:

 

# emerge --sync

# emerge --ask --oneshot --verbose ">=app-office/libreoffice-4.4.2"

# emerge --ask --oneshot -v ">=app-office/libreoffice-bin-4.4.2"

# emerge -a --oneshot -v ">=app-office/libreoffice-bin-debug-4.4.2"

 

All OpenOffice users should upgrade to the latest version:

 

# emerge --sync

# emerge --ask --oneshot -v ">=app-office/openoffice-bin-4.1.2"

 

References

==========

 

[ 1 ] CVE-2014-3524

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3524

[ 2 ] CVE-2014-3575

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3575

[ 3 ] CVE-2014-3693

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3693

[ 4 ] CVE-2014-9093

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9093

[ 5 ] CVE-2015-1774

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1774

[ 6 ] CVE-2015-4551

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4551

[ 7 ] CVE-2015-5212

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5212

[ 8 ] CVE-2015-5213

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5213

[ 9 ] CVE-2015-5214

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5214

 

Availability

============

 

This GLSA and any updates to it are available for viewing at

the Gentoo Security Website:

 

https://security.gentoo.org/glsa/201603-05

 

Concerns?

=========

 

Security is a primary focus of Gentoo Linux and ensuring the

confidentiality and security of our users' machines is of utmost

importance to us. Any security concerns should be addressed to

security ( -at -) gentoo.org or alternatively, you may file a bug at

https://bugs.gentoo.org.

 

License

=======

 

Copyright 2016 Gentoo Foundation, Inc; referenced text

belongs to its owner(s).

 

The contents of this document are licensed under the

Creative Commons - Attribution / Share Alike license.

 

http://creativecommons.org/licenses/by-sa/2.5

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×