- Apache openoffice 4.1.2 is it safe install#
- Apache openoffice 4.1.2 is it safe update#
- Apache openoffice 4.1.2 is it safe code#
This both caused issues with desktop integration and could allow a crafted attack on files owned by that user or group if they exist.
Apache openoffice 4.1.2 is it safe install#
While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to open the hyperlink. It is always best practice to be careful opening documents from unknown and unverified sources.
Apache openoffice 4.1.2 is it safe code#
If the link is specifically crafted this could lead to untrusted code execution. The problem has existed since about 2006 and the issue is also in 4.1.9. The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. This issue affects Apache OpenOffice up to and including version 4.1.10
A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. DBF are database files with data organized in fields. expat in version 4.1.11 is patched.Īpache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. Versions prior to 2.1.0 were subject to CVE-2013-0340 a "Billion Laughs" entity expansion denial of service attack and exploit via crafted XML files. See CVE-2021-25633 for the LibreOffice advisory.Īpache OpenOffice has a dependency on expat software.
Apache openoffice 4.1.2 is it safe update#
Users are advised to update to version 4.1.11. All versions of Apache OpenOffice up to 4.1.10 are affected. It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. See CVE-2021-25634 for the LibreOffice advisory. It is possible for an attacker to manipulate the timestamp of signed documents. See CVE-2021-25635 for the LibreOffice advisory. It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7 7.3 versions prior to 7.3.1. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. The stored passwords are encrypted with a single master key provided by the user. LibreOffice supports the storage of passwords for web connections in the user’s configuration database. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7 7.3 versions prior to 7.3.3.
A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config.
This issue affects: Apache OpenOffice versions prior to 4.1.13. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. Reference: CVE-2022-26307 - LibreOfficeĪpache OpenOffice supports the storage of passwords for web connections in the user's configuration database. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database.