FreeBSD : Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents (4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6)

high Nessus Plugin ID 142855

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Apache Openofffice project reports : CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in crafted documentsDescription A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click. Severity: Low There are no known exploits of this vulnerability.A proof-of-concept demonstration exists.

Thanks to the reporter for discovering this issue. Acknowledgments The Apache OpenOffice Security Team would like to thank Imre Rad for discovering and reporting this attack vector.

Solution

Update the affected packages.

See Also

https://www.openoffice.org/security/cves/CVE-2020-13958.html

http://www.nessus.org/u?5ab73e9f

Plugin Details

Severity: High

ID: 142855

File Name: freebsd_pkg_4f15ca7b23ae11eb9f591c1b0d9ea7e6.nasl

Version: 1.7

Type: local

Published: 11/12/2020

Updated: 2/8/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-13958

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:apache-openoffice, p-cpe:/a:freebsd:freebsd:apache-openoffice-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 11/10/2020

Vulnerability Publication Date: 4/28/2020

Reference Information

CVE: CVE-2020-13958

IAVA: 2020-A-0525-S