SB2022102080 - Ubuntu update for libreoffice



SB2022102080 - Ubuntu update for libreoffice

Published: October 20, 2022 Updated: October 25, 2022

Security Bulletin ID SB2022102080
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 17% Medium 33% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2020-12801)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to an error when processing encrypted files in LibreOffice. If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted.

This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted.


2) Input validation error (CVE-ID: CVE-2020-12803)

The vulnerability allows a remote attacker to overwrite arbitrary files on the system.

The vulnerability exists due to insufficient validation of user-supplied input when processing submittable forms in ODF documents. LibreOffice allows to submit data to forms, available via the file:// URI. A remote attacker can create a specially crafted form, trick the victim into submitting it and overwrite arbitrary files on the system with privileges of the current user.


3) Improper Certificate Validation (CVE-ID: CVE-2022-26305)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper certificate validation when checking signed macro attached to the document. A remote attacker can trick the victim to open a specially crafted file, bypass implemented security restrictions and execute arbitrary code on the system.


4) Inadequate Encryption Strength (CVE-ID: CVE-2022-26306)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to LibreOffice uses a weak initialization vector for encrypting passwords for web connections in the user’s configuration database. A local user can decrypt victim's password.


5) Inadequate Encryption Strength (CVE-ID: CVE-2022-26307)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to LibreOffice uses a poor encoding of the master key for web connections in the user’s configuration database, resulting in weakening its entropy from 128 to 43 bits. A local user can decrypt victim's password.

6) Command Injection (CVE-ID: CVE-2022-3140)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when parsing arguments for the "vnd.libreoffice.command'" URI scheme. A remote attacker can create a specially crafted document, trick the victim into opening it and execute internal macros with arbitrary arguments.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.