You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by ma...@apache.org on 2022/08/07 15:10:17 UTC
[openoffice-org] 02/02: Security Bulletin for the Apache OpenOffice 4.1.13 Release
This is an automated email from the ASF dual-hosted git repository.
marcus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git
commit 9dff64235bca2511cc830bab2f8d434943775522
Author: Marcus <ma...@apache.org>
AuthorDate: Sun Aug 7 17:09:33 2022 +0200
Security Bulletin for the Apache OpenOffice 4.1.13 Release
---
content/security/cves/CVE-2022-37401.html | 89 +++++++++++++++++++++++++++++++
1 file changed, 89 insertions(+)
diff --git a/content/security/cves/CVE-2022-37401.html b/content/security/cves/CVE-2022-37401.html
new file mode 100644
index 000000000..07fc9055a
--- /dev/null
+++ b/content/security/cves/CVE-2022-37401.html
@@ -0,0 +1,89 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+ <head>
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+ <title>CVE-2022-37401</title>
+ </head>
+
+ <body>
+ <p>
+ <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37401">CVE-2022-37401</a>
+ </p>
+ <p>
+ <a href="https://www.openoffice.org/security/cves/CVE-2022-37401.html">Apache OpenOffice Advisory</a>
+ </p>
+ <p style="text-align:center; font-size:largest">
+ <strong>Weak Master Keys</strong>
+ </p>
+ <p style="text-align:center; font-size:larger">
+ <strong>Fixed in Apache OpenOffice 4.1.13</strong>
+ </p>
+ <p>
+ <strong>Description</strong>
+ </p>
+ <p>
+ Apache OpenOffice supports the storage of passwords for web connections in the user's configuration
+ database. The stored passwords are encrypted with a single master key provided by the user. A flaw in
+ OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to
+ 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the
+ users stored config.
+ </p>
+ <p>
+ <strong>Severity: Moderate</strong>
+ </p>
+ <p>
+ There are no known exploits of this vulnerability.
+ <br />
+ A proof-of-concept demonstration exists.
+ </p>
+ <p>
+ Thanks to the reporter for discovering this issue.
+ </p>
+ <p>
+ <strong>Vendor: The Apache Software Foundation</strong>
+ </p>
+ <p>
+ <strong>Versions Affected</strong>
+ </p>
+ <p>
+ All Apache OpenOffice versions 4.1.12 and older are affected.
+ <br />
+ OpenOffice.org versions may also be affected.
+ </p>
+ <p>
+ <strong>Mitigation</strong>
+ </p>
+ <p>
+ Install Apache OpenOffice 4.1.13 for the latest maintenance and cumulative security fixes.
+ Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>.
+ </p>
+ <p>
+ <strong>Acknowledgments</strong>
+ </p>
+ <p>
+ The Apache OpenOffice Security Team would like to thank Selma Jabour, OpenSource Security GmbH,
+ Germany on behalf of the German Federal Office for Information Security, for discovering and
+ reporting this attack vector
+ </p>
+ <p>
+ <strong>Further Information</strong>
+ </p>
+ <p>
+ For additional information and assistance, consult the
+ <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+ or make requests to the
+ <a href="mailto:users@openoffice.apache.org">users@openoffice.apache.org</a>
+ public mailing list.
+ </p>
+ <p>
+ The latest information on Apache OpenOffice security bulletins can be found at the
+ <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>.
+ </p>
+ <hr />
+ <p>
+ <a href="https://security.openoffice.org">Security Home</a>->
+ <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>->
+ <a href="https://www.openoffice.org/security/cves/CVE-2022-37401.html">CVE-2022-37401</a>
+ </p>
+ </body>
+</html>