You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by bu...@apache.org on 2015/11/04 22:31:55 UTC
svn commit: r971368 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/
content/security/cves/CVE-2015-4551.html
Author: buildbot
Date: Wed Nov 4 21:31:55 2015
New Revision: 971368
Log:
Staging update by buildbot for ooo-site
Added:
websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-4551.html
Modified:
websites/staging/ooo-site/trunk/cgi-bin/ (props changed)
websites/staging/ooo-site/trunk/content/ (props changed)
Propchange: websites/staging/ooo-site/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Nov 4 21:31:55 2015
@@ -1 +1 @@
-1712587
+1712657
Propchange: websites/staging/ooo-site/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Nov 4 21:31:55 2015
@@ -1 +1 @@
-1712587
+1712657
Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-4551.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-4551.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-4551.html Wed Nov 4 21:31:55 2015
@@ -0,0 +1,142 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+ <title>CVE-2015-4551</title>
+ <style type="text/css"></style>
+
+<!--#include virtual="/google-analytics.js" -->
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a href="/security/">security</a> » <a href="/security/cves/">cves</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+
+ <!-- These were previously defined as XHTML pages. The current
+ wrapping for the site introduces HTML5 headers and formats.
+ This version is modified to match the wrapping that is done as part
+ of publishing this page and not rely on any particular styling
+ beyond <p>.
+ -->
+ <p>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-4551">CVE-2015-4551</a>
+ </p>
+ <p>
+ <a href="http://www.openoffice.org/security/cves/CVE-2015-4551.html">Apache OpenOffice Advisory</a>
+ </p>
+
+ <p style="text-align:center; font-size:largest"><strong>CVE-2015-4551:
+ TARGETED DATA DISCLOSURE</strong></p>
+
+ <p style="text-align:center; font-size:larger"><strong>Fixed in Apache OpenOffice 4.1.2</strong></p>
+
+
+ <p>
+ <strong>Version 1.0</strong>
+ <br />
+ Announced November 4, 2015</p>
+
+ <p>
+ A vulnerability in OpenOffice settings of OpenDocument Format
+ files and templates allows silent access to files that are
+ readable from an user account, over-riding the user's default
+ configuration settings. Once these files are imported into a
+ maliciously-crafted document, the data can be silently hidden
+ in the document and possibly exported to an external party
+ without being observed.
+</p>
+
+ <p>
+ <strong>Severity: Important</strong>
+ </p>
+ <p>There are no known exploits of this vulnerabilty.<br />
+ A proof-of-concept demonstration exists.</p>
+ <p>
+ <strong>Vendor: The Apache Software Foundation</strong>
+ </p>
+
+ <p>
+ <strong>Versions Affected</strong></p>
+
+ <p>All Apache OpenOffice versions 4.1.1 and older are affected.<br />
+ OpenOffice.org versions are also affected.</p>
+
+ <p><strong>Related</strong>:
+ <a href="https://www.openoffice.org/security/cves/CVE-2014-3575.html">CVE-2014-3575</a>
+ and <a href="https://www.openoffice.org/security/cves/CVE-2012-0037.html">CVE-2012-0037</a></p>
+
+ <p>
+ <strong>Mitigation</strong>
+ </p>
+ <p>Apache OpenOffice users are urged to download and install
+ Apache OpenOffice version 4.1.2 or later.</p>
+ <p>
+ Apache OpenOffice 4.1.2 mitigates this vulnerability by ignoring
+ in-document settings that over-ride default behavior when accessing
+ data beyond the document itself. The automatic default behavior
+ is changed to make such access evident to the user, who must then
+ approve the access.
+ </p>
+ <p>
+ <strong>Nature of Attack</strong>
+ </p>
+ <p>
+ This vulnerability requires an exquisitely crafted attack to
+ locate targeted files, silently retrieve them, and then deliver
+ their data in a manner that escapes notice. Knowledge of the
+ user's system and specific configuration is generally required.
+ </p>
+ <p><strong>Precautions</strong></p>
+ <p>
+
+ <p>
+ In addition to keeping Apache OpenOffice updated, users can reduce
+ the threat of this kind of data access from ODF
+ documents. Keep documents and sensitive materials separate from
+ common, predictable locations, including on networks. Require
+ additional access permissions for access to sensitive materials
+ even when operating under the user's normal account.</p>
+
+
+ <p>
+ <strong>Further Information</strong>
+ </p>
+ <p>For additional information and assistance, consult the
+ <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+ or make requests to the
+ <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+ public mailing list.
+ </p>
+ <p>The latest information on Apache OpenOffice security bulletins
+ can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+ Archive page</a>.</p>
+
+ <p><strong>Credits</strong></p>
+ <p>
+ The Apache OpenOffice security team thanks Federico "fox" Scrinzi
+ for reporting the defect and Stephan Bergmann of Red Hat for
+ analysis and a repair solution.
+ </p>
+
+ <hr />
+
+ <p>
+ <a href="http://security.openoffice.org">Security Home</a>
+ -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+ -> <a href="http://www.openoffice.org/security/cves/CVE-2015-4551.html">CVE-2015-4551</a>
+ </p>
+
+ </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>