lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 25 Oct 2016 09:06:46 -0700
From: "Dennis E. Hamilton" <orcmid@...che.org>
To: <security@...noffice.apache.org>
Subject: CVE-2016-6804 Apache OpenOffice Windows Installer Untrusted Search Path

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256



CVE-2016-6804
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6804>
Apache OpenOffice Advisory
<https://www.openoffice.org/security/cves/CVE-2016-6804.html>

Title: Windows Installer Execution of Arbitrary Code with Elevated Privileges

Version 1.0
Announced October 11, 2016

Description

The Apache OpenOffice installer for Windows contained a defective
operation that allows execution of arbitrary code with elevated 
privileges.

The location in which the installer is run may have been previously
poisoned by a file that impersonates a dynamic-link library that 
the installer depends upon.  The counterfeit is operated instead 
because of a search-path defect in the installer.  The counterfeit 
will be operated under the administrative privileges of the OpenOffice
installer, compromising the user's PC.

Severity: Medium

    There are no known exploits of this vulnerability.
    Proof-of-concept demonstrations exist.

Vendor: The Apache Software Foundation

Versions Affected:

    All Apache OpenOffice versions 4.1.2 and older 
    are affected.  OpenOffice.org versions are also
    affected.

    
Mitigation:

Install Apache OpenOffice 4.1.3 for the latest maintenance and 
cumulative security fixes.  Use <https://www.openoffice.org/download/>.


Defenses and Work-Arounds:

If you are unable to update to 4.1.3, there are other 
precautions that can be taken.  These precautions are also 
recommended as protection against other software that may 
have the vulnerability.

When executing .exe installers, ensure that the installer
is in a file folder that has no files but the installer 
.exe file.

If an installer proposes a folder to extract the setup
files into before the actual install, choose the name of 
a folder that is not in use.  Delete such a folder of setup 
files after the installation completes successfully.  To 
reinstall without downloading again, preserve the installer 
.exe on private removable storage.


Further Information:

For additional information and assistance, consult the Apache
OpenOffice Community Forums, <https://forum.openoffice.org/> or 
make requests to the <mailto:users@...noffice.apache.org> public
mailing list.  Defects not involving suspected security
vulnerabilities can be reported via
<http://www.openoffice.org/qa/issue_handling/pre_submission.html>.

      
The latest information on Apache OpenOffice security bulletins 
can be found at the Bulletin Archive page 
<http://www.openoffice.org/security/bulletin.html>.

Credits: 

The Apache OpenOffice project acknowledges the reporting and
analysis for CVE-2016-6804 by Stefan Kanthak and by Himanshu Mehta.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJYD4CxAAoJEPluif/UVmKKwJ0IAIp5Z5WGus5iaDcOYanVS+QN
ng1SCb+0jitCiqmVy9Xv5/diVEgogRxOu0tryV5flAaChepsRehpuJmRRftxYTS0
aNkQiKDSkd9d3XswAa0xfcQWaojANgYwV6aMGx1MstfRo3aIdRtHvNqjygU1ANyR
z3UipEyRYmrRgeeHq5cBNBQQv+gGfKXMHr2nvfaOD5FSqvwa/3jEWbpagYHwXfyV
18QqITRw5qG6sP/sQXw1I3CPez4+SbZebJZ2cuBSnnSmoojOQ3EJi69hESLOM2S5
I4xiraQSYygTeybU3u2OARtsXejb8qa7d9pYB+JwboPVKam03s32X+0ZnBnv3Y4=
=nKLP
-----END PGP SIGNATURE-----




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ