Rocky Linux 8 : libreoffice (RLSA-2020:4628)

medium Nessus Plugin ID 184770

Synopsis

The remote Rocky Linux host is missing one or more security updates.

Description

The remote Rocky Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2020:4628 advisory.

- LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4. (CVE-2020-12802)

- ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
(CVE-2020-12803)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libcmis, libcmis-debuginfo and / or libcmis-debugsource packages.

See Also

https://errata.rockylinux.org/RLSA-2020:4628

https://bugzilla.redhat.com/show_bug.cgi?id=1796893

https://bugzilla.redhat.com/show_bug.cgi?id=1819798

https://bugzilla.redhat.com/show_bug.cgi?id=1824876

https://bugzilla.redhat.com/show_bug.cgi?id=1841907

https://bugzilla.redhat.com/show_bug.cgi?id=1848346

https://bugzilla.redhat.com/show_bug.cgi?id=1850226

Plugin Details

Severity: Medium

ID: 184770

File Name: rocky_linux_RLSA-2020-4628.nasl

Version: 1.0

Type: local

Published: 11/6/2023

Updated: 11/6/2023

Supported Sensors: Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2020-12803

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:rocky:linux:libcmis, p-cpe:/a:rocky:linux:libcmis-debuginfo, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:libcmis-debugsource

Required KB Items: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/3/2020

Vulnerability Publication Date: 6/8/2020

Reference Information

CVE: CVE-2020-12802, CVE-2020-12803