You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by bu...@apache.org on 2017/10/25 20:11:30 UTC

svn commit: r1020043 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2017-12607.html content/security/cves/CVE-2017-12608.html content/security/cves/CVE-2017-3157.html content/security/cves/CVE-2017-9806.html

Author: buildbot
Date: Wed Oct 25 20:11:30 2017
New Revision: 1020043

Log:
Staging update by buildbot for ooo-site

Added:
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html
Modified:
    websites/staging/ooo-site/trunk/cgi-bin/   (props changed)
    websites/staging/ooo-site/trunk/content/   (props changed)

Propchange: websites/staging/ooo-site/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Oct 25 20:11:30 2017
@@ -1 +1 @@
-1813346
+1813348

Propchange: websites/staging/ooo-site/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Oct 25 20:11:30 2017
@@ -1 +1 @@
-1813346
+1813348

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html Wed Oct 25 20:11:30 2017
@@ -0,0 +1,98 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-12607</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12607">CVE-2017-12607</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-12607.html">Apache OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>(DRAFT) CVE-2017-12607:
+        Out-of-Bounds Write in Impress' PPT Filter</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache OpenOffice 4.1.4</strong></p>
+
+        <p><strong>Description</strong></p>
+
+        <p>A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Marcin 'Icewall' Noga of Cisco Talos for discovering this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+             <p>
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-12607.html">CVE-2017-12607</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html Wed Oct 25 20:11:30 2017
@@ -0,0 +1,98 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-12608</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12608">CVE-2017-12608</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-12608.html">Apache OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>CVE-2017-12608:
+        Out-of-Bounds Write in Writer's ImportOldFormatStyles</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache OpenOffice 4.1.4</strong></p>
+
+        <p><strong>Description</strong></p>
+
+        <p>A vulnerability in OpenOffice Writer DOC file parser, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Marcin 'Icewall' Noga of Cisco Talos for discovering this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+             <p>
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-12608.html">CVE-2017-12608</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html Wed Oct 25 20:11:30 2017
@@ -0,0 +1,111 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-3157</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+    <!-- These were previously defined as XHTML pages.  The current
+         wrapping for the site introduces HTML5 headers and formats.
+         This version is modified to match the wrapping that is done as part
+         of publishing this page and not rely on any particular styling
+         beyond <p>.
+         -->
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157">CVE-2017-3157</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-3157.html">Apache OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>(DRAFT) CVE-2017-3157:
+        Arbitrary file disclosure in Calc and Writer</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache OpenOffice 4.1.4</strong></p>
+
+        <p>
+          <strong>Description</strong>
+        </p>
+
+        <p>By exploiting the way OpenOffice renders embedded objects, an attacker could craft a document
+           that allows reading in a file from the user's filesystem. Information could be retrieved by the
+           attacker by, e.g., using hidden sections to store the information, tricking the user into
+           saving the document and convincing the user to sent the document back to the attacker.</p>
+
+        <p>The vulnerability is mitigated by the need for the attacker to know the precise file path
+           in the target system, and the need to trick the user into saving the document and sending it
+           back.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Ben Hayak for reporting this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-3157.html">CVE-2017-3157</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html Wed Oct 25 20:11:30 2017
@@ -0,0 +1,103 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-9806</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+    <!-- These were previously defined as XHTML pages.  The current
+         wrapping for the site introduces HTML5 headers and formats.
+         This version is modified to match the wrapping that is done as part
+         of publishing this page and not rely on any particular styling
+         beyond <p>.
+         -->
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9806">CVE-2017-9806</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-9806.html">Apache OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>(DRAFT) CVE-2017-9806:
+        Out-of-Bounds Write in Writer's WW8Fonts Constructor</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache OpenOffice 4.1.4</strong></p>
+
+        <p><strong>Description</strong></p>
+
+        <p>A vulnerability in the OpenOffice Writer DOC file parser, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Marcin 'Icewall' Noga of Cisco Talos for discovering this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+          <p>
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-9806.html">CVE-2017-9806</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>