Vulnerability identifier: #VU84850
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OpenOffice
Client/Desktop applications /
Office applications
Vendor: Apache Foundation
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input when executing internal macro with arbitrary arguments. A remote attacker can trick the victim to open a specially crafted file, bypass the user approval for opening the links from the document and execute arbitrary script on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
OpenOffice: 4.0.0 - 4.1.14
External links
http://seclists.org/oss-sec/2023/q4/343
http://cwiki.apache.org/confluence/display/OOOUSERS/AOO+4.1.15+Release+Notes
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.