aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDon Lewis <truckman@FreeBSD.org>2023-03-08 01:17:01 +0000
committerDon Lewis <truckman@FreeBSD.org>2023-03-08 01:17:01 +0000
commit4cc9e62c14ec4daaebce7350a190a26c4c387f3f (patch)
treef1e0409947cfcbe51467885da44cbc3f856c071e
parent25f58157d3cda8b11330759a95290ab28ffa6604 (diff)
downloadports-4cc9e62c14ec4daaebce7350a190a26c4c387f3f.tar.gz
ports-4cc9e62c14ec4daaebce7350a190a26c4c387f3f.zip
security/vuxml: openoffice 2022 vulnerabilities
Belatedly document Apache OpenOffice vulnerabilities from 2022. The port was broken at the time.
-rw-r--r--security/vuxml/vuln/2023.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 2b17919a9eac..62b2600e5c4f 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,37 @@
+ <vuln vid="6678211c-bd47-11ed-beb0-1c1b0d9ea7e6">
+ <topic>Apache OpenOffice -- master password vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache-openoffice</name>
+ <range><lt>4.1.13</lt></range>
+ </package>
+ <package>
+ <name>apache-openoffice-devel</name>
+ <range><lt>4.2.1678061694i,4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache Openoffice project reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37400">
+ <p>Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice</p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37401">
+ <p>Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2022-37400</cvename>
+ <cvename>CVE-2022-37401</cvename>
+ <url>https://cwiki.apache.org/confluence/display/OOOUSERS/AOO+4.1.13+Release+Notes</url>
+ </references>
+ <dates>
+ <discovery>2022-02-25</discovery>
+ <entry>2023-03-08</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f0798a6a-bbdb-11ed-ba99-080027f5fec9">
<topic>rack -- possible DoS vulnerability in multipart MIME parsing</topic>
<affects>