Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-3157 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
LibreOffice Client/Desktop applications / Office applications |
Vendor | LibreOffice |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU5891
Risk: Low
CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-3157
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists within calc and write functionality of LibreOffice when processing embedded objects during preview of files. A remote attacker can create a specially crafted document, linked to an existing file on victims system, trick the victim into opening the document, saving it and sending back to the attacker.
Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary files on the system.
MitigationThe vulnerability is fixed in the following versions: 5.1.6, 5.2.2, and 5.3.0
Vulnerable software versionsLibreOffice: 5.1.0 - 5.2.1
CPE2.3https://www.libreoffice.org/about-us/security/advisories/cve-2017-3157/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website or open a file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.