Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 655150 (CVE-2018-10583) - app-office/libreoffice: Information disclosure via SMB connection embedded in malicious file
Summary: app-office/libreoffice: Information disclosure via SMB connection embedded in...
Status: IN_PROGRESS
Alias: CVE-2018-10583
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://security-tracker.debian.org/t...
Whiteboard: A4 [upstream cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-05-07 10:08 UTC by Agostino Sarubbo
Modified: 2020-05-20 00:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2018-05-07 10:08:20 UTC
From ${URL} :

An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as 
demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content element in a .odt XML document.

References:

http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Andreas Sturmlechner gentoo-dev 2018-05-27 07:32:40 UTC
Fedora tracker is completely useless...
Comment 2 Sam James (sec padawan) 2020-05-20 00:34:33 UTC
https://www.libreoffice.org/about-us/security/advisories/cve-2018-10583/

I guess this will not be fixed, but a mitigation now exists:
"Since LibreOffice 5.4.7, and 6.0.4 in the 6.X series, end users or administrators can disable this functionality to automatically fetch such linked images via "tools->options->security->options->block any links from documents not among the trusted locations"