Rapid7 Vulnerability & Exploit Database

Huawei EulerOS: CVE-2019-9850: libreoffice security update

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Huawei EulerOS: CVE-2019-9850: libreoffice security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
08/15/2019
Created
10/01/2019
Added
09/30/2019
Modified
09/30/2019

Description

LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.

Solution(s)

  • huawei-euleros-2_0_sp8-upgrade-autocorr-en
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-core
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-data
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-gtk2
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-gtk3
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-langpack-en
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-opensymbol-fonts
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-ure
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-ure-common
  • huawei-euleros-2_0_sp8-upgrade-libreoffice-x11
  • huawei-euleros-2_0_sp8-upgrade-libreofficekit

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;