CVE-2019-9851
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
Published
2019-08-15T22:15:22.290
Last Modified
2024-11-21T04:52:26.297
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 9.8 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html
Mailing List, Third Party Advisory
([email protected])
-
http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html
Third Party Advisory, VDB Entry
([email protected])
-
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html
Mailing List, Third Party Advisory
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/
([email protected])
-
https://seclists.org/bugtraq/2019/Aug/28
Mailing List, Third Party Advisory
([email protected])
-
https://usn.ubuntu.com/4102-1/
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2019/dsa-4501
Third Party Advisory
([email protected])
-
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851
Vendor Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://seclists.org/bugtraq/2019/Aug/28
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4102-1/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2019/dsa-4501
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)