Lucene search

K
debianDebianDEBIAN:DLA-1947-1:BAC22
HistoryOct 06, 2019 - 11:31 a.m.

[SECURITY] [DLA 1947-1] libreoffice security update

2019-10-0611:31:38
lists.debian.org
94

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

Low

EPSS

0.971

Percentile

99.8%

Package : libreoffice
Version : 1:4.3.3-2+deb8u13
CVE ID : CVE-2019-9848 CVE-2019-9849 CVE-2019-9850 CVE-2019-9851
CVE-2019-9852 CVE-2019-9853 CVE-2019-9854

Several vulnerabilities were discovered in LibreOffice, the office
productivity suite.

CVE-2019-9848

Nils Emmerich discovered that malicious documents could execute
arbitrary Python code via LibreLogo.

CVE-2019-9849

Matei Badanoiu discovered that the stealth mode did not apply to
bullet graphics.

CVE-2019-9850

It was discovered that the protections implemented in CVE-2019-9848
could be bypassed because of insufficient URL validation.

CVE-2019-9851

Gabriel Masei discovered that malicious documents could execute
arbitrary pre-installed scripts.

CVE-2019-9852

Nils Emmerich discovered that the protection implemented to address
CVE-2018-16858 could be bypassed by a URL encoding attack.

CVE-2019-9853

Nils Emmerich discovered that malicious documents could bypass
document security settings to execute macros contained within the
document.

CVE-2019-9854

It was discovered that the protection implemented to address
CVE-2019-9852 could be bypassed because of insufficient input
sanitization.

For Debian 8 "Jessie", these problems have been fixed in version
1:4.3.3-2+deb8u13.

We recommend that you upgrade your libreoffice packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

Low

EPSS

0.971

Percentile

99.8%