SB2017102706 - Multiple vulnerabilities in Apache OpenOffice
Published: October 27, 2017 Updated: October 30, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2017-12607)
The vulnerability allows a remote attacker can execute arbitrary code on the target system.The weakness exists due to boundary error in the PPTStyleSheet::PPTStyleSheet functionality. A remote attacker can send a specially crafted .ppt file, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Out-of-bounds write (CVE-ID: CVE-2017-12608)
The vulnerability allows a remote attacker can execute arbitrary code on the target system.The weakness exists due to boundary error in the WW8RStyle::ImportOldFormatStyles functionality. A remote attacker can send a specially crafted .doc file, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
3) Out-of-bounds write (CVE-ID: CVE-2017-9806)
The vulnerability allows a remote attacker can execute arbitrary code on the target system.The weakness exists due to boundary error in the WW8Fonts::WW8Fonts function. A remote attacker can send a specially crafted .doc file, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Arbitrary file disclosure (CVE-ID: CVE-2017-3157)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists within calc and write functionality of LibreOffice when processing embedded objects during preview of files. A remote attacker can create a specially crafted document, linked to an existing file on victims system, trick the victim into opening the document, saving it and sending back to the attacker.
Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary files on the system.
Remediation
Install update from vendor's website.