==================================================================== CERT-Renater Note d'Information No. 2016/VULN353 _____________________________________________________________________ DATE : 17/10/2016 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Apache OpenOffice versions prior to 4.1.3. ===================================================================== http://www.openoffice.org/security/cves/CVE-2016-6804.html http://www.openoffice.org/security/cves/CVE-2016-6803.html ____________________________________________________________________ CVE-2016-6804 Apache OpenOffice Advisory Windows Installer Execution of Arbitrary Code with Elevated Privileges Version 1.0 Announced October 11, 2016 Description The Apache OpenOffice installer for Winodws contained a defective operation that allows execution of arbitrary code with elevated privileges. The location in which the installer is run may have been previously poisoned by a file that impersonates a dynamic-link library that the installer depends upon. The counterfeit is operated instead because of a search path defect in the installer. The counterfeit will be operated under the administrative privileges of the OpenOffice installer, compromising the users's PC. Severity: Medium There are no known exploits of this vulnerabilty. A proof-of-concept demonstration exists. Vendor: The Apache Software Foundation Versions Affected All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected. Mitigation Install Apache OpenOffice 4.1.3 for the latest maintenance and cumulative security fixes. Use the Apache OpenOffice download page. Defenses and Work-Arounds If you are unable to update to 4.1.3, there are other precautions that can be taken. These precausions are also recommended as protection against other software that may have the vulnerability. When executing .exe installers, ensure that the installer is in a file folder that has no other files but the installer .exe file. If an installer proposes a folder to extract the setup files into before the actual install, choose the name of a folder that is not in use. Delete such a folder of setup files after the installation completes successfully. To reinstall without downloading again, preserve the installer .exe on private removable storage. Further Information For additional information and assistance, consult the Apache OpenOffice Community Forums, or make requests to the users@openoffice.apache.org public mailing list. Defects not involving suspected security vulnerabilities can be reported with a normal issue via Bugzilla. The latest information on Apache OpenOffice security bulletins can be found at the Bulletin Archive page. Credits The Apache OpenOffice project acknowledges the reporting and analysis for CVE-2016-6804 by Stephen Kanthek and by Himanshu Mehta. ____________________________________________________________________ CVE-2016-6803 Apache OpenOffice Advisory Windows Installer Can Enable Privileged Trojan Execution Version 1.0 Announced October 11, 2016 Description The Apache OpenOffice installer for Winodws contained a defective operation that could trigger execution of unwanted software installed by a Trojan Horse application. The installer defect is known as an "unquoted Windows search path vulnerability." In the case of Apache OpenOffice installers for Windows, the PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit. The exploit may already have operated on the user's PC. Severity: Medium There are no known exploits of this vulnerabilty. A proof-of-concept demonstration exists. Vendor: The Apache Software Foundation Versions Affected All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected. Mitigation Install Apache OpenOffice 4.1.3 for the latest maintenance and cumulative security fixes. Use the Apache OpenOffice download page. If instead of a typical installation you use a custom-installation option to change the location where Apache OpenOffice is installed, use a location that has no spaces in its full-path name. Defenses and Work-Arounds If you are unable to update to 4.1.3, there are other precautions that can be taken. These precausions are also recommended as protection against other software that may have the vulnerability. Ensure that there are no programs installed at the top-level folder (usually C:\) where Windows is installed. All are dangerous, especially ones named "Program", whether "Program.exe" or some other variation. If such programs are found, install or update to current anti-virus/-malware software. Perform a complete system scan. The scan may provide for removal of programs where there should not be any. If that does not happen, it is necessary to remove any Program.exe and others manually using administrator privilege. Further Information For additional information and assistance, consult the Apache OpenOffice Community Forums, or make requests to the users@openoffice.apache.org public mailing list. Defects not involving suspected security vulnerabilities can be reported with a normal issue via Bugzilla. The latest information on Apache OpenOffice security bulletins can be found at the Bulletin Archive page. Credits The Apache OpenOffice project acknowledges the reporting and analysis for CVE-2016-6803 by Cyril Vallicari. ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================