LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html | Mailing List Third Party Advisory |
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2019-09-06 19:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-9855
Mitre link : CVE-2019-9855
CVE.ORG link : CVE-2019-9855
JSON object : View
Products Affected
libreoffice
- libreoffice
opensuse
- leap
microsoft
- windows
CWE
CWE-417
Communication Channel Errors