openoffice-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r1020043 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2017-12607.html content/security/cves/CVE-2017-12608.html content/security/cves/CVE-2017-3157.html content/security/cves/CVE-2017-9806.html
Date Wed, 25 Oct 2017 20:11:30 GMT
Author: buildbot
Date: Wed Oct 25 20:11:30 2017
New Revision: 1020043

Log:
Staging update by buildbot for ooo-site

Added:
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html
Modified:
    websites/staging/ooo-site/trunk/cgi-bin/   (props changed)
    websites/staging/ooo-site/trunk/content/   (props changed)

Propchange: websites/staging/ooo-site/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Oct 25 20:11:30 2017
@@ -1 +1 @@
-1813346
+1813348

Propchange: websites/staging/ooo-site/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Oct 25 20:11:30 2017
@@ -1 +1 @@
-1813346
+1813348

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12607.html Wed Oct 25 20:11:30
2017
@@ -0,0 +1,98 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-12607</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12607">CVE-2017-12607</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-12607.html">Apache
OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>(DRAFT) CVE-2017-12607:
+        Out-of-Bounds Write in Impress' PPT Filter</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache
OpenOffice 4.1.4</strong></p>
+
+        <p><strong>Description</strong></p>
+
+        <p>A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet,
allows attackers to craft malicious documents that cause denial of service (memory corruption
and application crash) potentially resulting in arbitrary code execution.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Marcin 'Icewall' Noga of Cisco Talos for discovering this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+             <p>
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-12607.html">CVE-2017-12607</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-12608.html Wed Oct 25 20:11:30
2017
@@ -0,0 +1,98 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-12608</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12608">CVE-2017-12608</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-12608.html">Apache
OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>CVE-2017-12608:
+        Out-of-Bounds Write in Writer's ImportOldFormatStyles</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache
OpenOffice 4.1.4</strong></p>
+
+        <p><strong>Description</strong></p>
+
+        <p>A vulnerability in OpenOffice Writer DOC file parser, and specifically in
ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of
service (memory corruption and application crash) potentially resulting in arbitrary code
execution.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Marcin 'Icewall' Noga of Cisco Talos for discovering this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+             <p>
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-12608.html">CVE-2017-12608</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-3157.html Wed Oct 25 20:11:30
2017
@@ -0,0 +1,111 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-3157</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+    <!-- These were previously defined as XHTML pages.  The current
+         wrapping for the site introduces HTML5 headers and formats.
+         This version is modified to match the wrapping that is done as part
+         of publishing this page and not rely on any particular styling
+         beyond <p>.
+         -->
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157">CVE-2017-3157</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-3157.html">Apache
OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>(DRAFT) CVE-2017-3157:
+        Arbitrary file disclosure in Calc and Writer</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache
OpenOffice 4.1.4</strong></p>
+
+        <p>
+          <strong>Description</strong>
+        </p>
+
+        <p>By exploiting the way OpenOffice renders embedded objects, an attacker could
craft a document
+           that allows reading in a file from the user's filesystem. Information could be
retrieved by the
+           attacker by, e.g., using hidden sections to store the information, tricking the
user into
+           saving the document and convincing the user to sent the document back to the attacker.</p>
+
+        <p>The vulnerability is mitigated by the need for the attacker to know the
precise file path
+           in the target system, and the need to trick the user into saving the document
and sending it
+           back.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Ben Hayak for reporting this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-3157.html">CVE-2017-3157</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>

Added: websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html (added)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2017-9806.html Wed Oct 25 20:11:30
2017
@@ -0,0 +1,103 @@
+<!--#include virtual="/doctype.html" -->
+<html>
+<head>
+<link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+        <title>CVE-2017-9806</title>
+        <style type="text/css"></style>
+    
+<!--#include virtual="/scripts/google-analytics.js" --> 
+<!--#include virtual="/scripts/entourage.js" -->
+</head>
+<body>
+<!--#include virtual="/brand.html" -->
+  <div id="topbara">
+    <!--#include virtual="/topnav.html" -->
+    <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a href="/security/cves/">cves</a></div>
+  </div>
+  <div id="clear"></div>
+  
+  
+  <div id="content">
+    
+    
+    
+    <!-- These were previously defined as XHTML pages.  The current
+         wrapping for the site introduces HTML5 headers and formats.
+         This version is modified to match the wrapping that is done as part
+         of publishing this page and not rely on any particular styling
+         beyond <p>.
+         -->
+        <p>
+            <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9806">CVE-2017-9806</a>
+        </p>
+        <p>
+            <a href="http://www.openoffice.org/security/cves/CVE-2017-9806.html">Apache
OpenOffice Advisory</a>
+        </p>
+
+        <p style="text-align:center; font-size:largest"><strong>(DRAFT) CVE-2017-9806:
+        Out-of-Bounds Write in Writer's WW8Fonts Constructor</strong></p>
+
+        <p style="text-align:center; font-size:larger"><strong>Fixed in Apache
OpenOffice 4.1.4</strong></p>
+
+        <p><strong>Description</strong></p>
+
+        <p>A vulnerability in the OpenOffice Writer DOC file parser, and specifically
in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial
of service (memory corruption and application crash) potentially resulting in arbitrary code
execution.</p>
+
+        <p><strong>Severity: Medium</strong></p>
+
+        <p>There are no known exploits of this vulnerability.<br />
+          A proof-of-concept demonstration exists.
+        </p>
+
+        <p>Thanks to Marcin 'Icewall' Noga of Cisco Talos for discovering this issue.</p>
+
+        <p>
+          <strong>Vendor: The Apache Software Foundation</strong>
+        </p>
+
+        <p>
+          <strong>Versions Affected</strong>
+        </p>
+
+        <p>
+          All Apache OpenOffice versions 4.1.3 and older are affected.<br />
+          OpenOffice.org versions are also affected.
+        </p>
+
+        <p>
+          <strong>Mitigation</strong>
+        </p>
+
+        <p>
+          Install Apache OpenOffice 4.1.4 for the latest maintenance and
+          cumulative security fixes.  Use the Apache OpenOffice 
+          <a href="https://www.openoffice.org/download/">download page</a>.
+        </p>
+
+          <p>
+            <strong>Further Information</strong>
+        </p>
+        <p>For additional information and assistance, consult the
+           <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+           or make requests to the
+           <a href="mailto:users@openofffice.apache.org">users@openofffice.apache.org</a>
+           public mailing list.
+        </p>
+        <p>The latest information on Apache OpenOffice security bulletins
+        can be found at the <a href="http://www.openoffice.org/security/bulletin.html">Bulletin
+        Archive page</a>.</p>
+
+
+        <hr />
+
+        <p>
+            <a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2017-9806.html">CVE-2017-9806</a>
+        </p>
+    
+  </div>
+<!--#include virtual="/footer.html" -->
+</body>
+</html>



Mime
View raw message