{"id":8631,"date":"2019-02-16T00:44:00","date_gmt":"2019-02-15T23:44:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=8631"},"modified":"2019-02-15T10:02:47","modified_gmt":"2019-02-15T09:02:47","slug":"openoffice-and-libreoffice-vulnerability-cve-2018-16858","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/02\/16\/openoffice-and-libreoffice-vulnerability-cve-2018-16858\/","title":{"rendered":"OpenOffice- and LibreOffice Vulnerability CVE-2018-16858"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=214847\" target=\"_blank\">German<\/a>]There is a micro patch for the 0-day vulnerability CVE-2018-16858 in OpenOffice. And for the vulnerability (patched in LibreOffice by an update) there is a Proof of Concept (PoC).<\/p>\n<p><!--more--><\/p>\n<h2>LibreOffice RCE vulnerability CVE-2018-16858<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg06.met.vgwort.de\/na\/3958c3968ad44725b584c3025afa0203\" width=\"1\" height=\"1\">In LibreOffice (and OpenOffice) there is a remote code execution vulnerability CVE-2018-16858, which I had briefly addressed in the blog post <a href=\"https:\/\/borncity.com\/win\/2019\/02\/03\/remote-code-execution-vulnerability-in-libreoffice\/\" target=\"_blank\">Remote Code Execution vulnerability in LibreOffice<\/a>. This vulnerability has been fixed in LibreOffice 6.0.7\/6.1.3 as you can read in <a href=\"https:\/\/www.libreoffice.org\/about-us\/security\/advisories\/cve-2018-16858\/\" target=\"_blank\">this LibreOffice document<\/a>. Now John Lambert from Microsoft Threat Intelligence Center points out a Proof of Concept (PcC) to exploit the vulnerability (in LibreOffice and OpenOffice)<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">Use LibreOffice? You might be interested in this PoC for CVE-2018-16858 (discovered by <a href=\"https:\/\/twitter.com\/insertScript?ref_src=twsrc%5Etfw\">@insertScript<\/a>) uploaded to VT as LibreOfficeExploit.fodt.<\/p>\n<p><a href=\"https:\/\/t.co\/4RoJGRgyWa\">https:\/\/t.co\/4RoJGRgyWa<\/a><br \/><a href=\"https:\/\/t.co\/PFaaoC4AnC\">https:\/\/t.co\/PFaaoC4AnC<\/a><br \/><a href=\"https:\/\/t.co\/FiikekzOOZ\">https:\/\/t.co\/FiikekzOOZ<\/a> <a href=\"https:\/\/t.co\/RNHP9NKV2s\">pic.twitter.com\/RNHP9NKV2s<\/a><\/p>\n<p>\u2014 John Lambert (@JohnLaTwC) <a href=\"https:\/\/twitter.com\/JohnLaTwC\/status\/1092802988933070848?ref_src=twsrc%5Etfw\">5. Februar 2019<\/a><\/p><\/blockquote>\n<p><span id=\"preserve15fce2aa515b4eebbe1aea376ebd97d3\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>The PoC was developed by Alex Inf\u00fchr, a blogger from Austria. He also discovered the vulnerability and now published the approach for a PoC in the article <a href=\"https:\/\/insert-script.blogspot.com\/2019\/02\/libreoffice-cve-2018-16858-remote-code.html\" target=\"_blank\">Libreoffice (CVE-2018-16858) &#8211; Remote Code Execution via Macro\/Event execution<\/a>. If you use LibreOffice, you should update to version 6.0.7\/6.1.3 as soon as possible. <\/p>\n<h2>A OpenOffice Micro-Patch for CVE-2018-16858 <\/h2>\n<p>All versions of OpenOffice\/LibreOffice have the CVE-2018-16858 vulnerability up to version 6.0.6\/6.1.2.1. The vulnerability has received a CVSS3 base score of 7.8 (moderate) from <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2018-16858\" target=\"_blank\">Red Hat<\/a>. While the developers in LibreOffice have closed it in versions 6.0.7\/6.1.3, the OpenOffice developers do not lag behind with updates.&nbsp; <\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">Note: the micropatch only applies to the latest version of OpenOffice for Windows (version 4.1.6). In addition to this micropatch, we also released two micropatches (32-bit and 64-bit) for the same issue in the latest vulnerable version of LibreOffice (version 6.1.2.1).<\/p>\n<p>\u2014 0patch (@0patch) <a href=\"https:\/\/twitter.com\/0patch\/status\/1095696938341675010?ref_src=twsrc%5Etfw\">13. Februar 2019<\/a><\/p><\/blockquote>\n<p><span id=\"preserve4c8d19d38af6451a873dfbc4eee83d1d\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>For the Windows version of OpenOffice, 0patch has released a mico patch to close the vulnerability (see tweet above). Bleeping Computer has published <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/openoffice-zero-day-code-execution-flaw-gets-free-micropatch\/\" target=\"_blank\">some information here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is a micro patch for the 0-day vulnerability CVE-2018-16858 in OpenOffice. And for the vulnerability (patched in LibreOffice by an update) there is a Proof of Concept (PoC).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580],"tags":[1004,1820,69],"class_list":["post-8631","post","type-post","status-publish","format-standard","hentry","category-office","category-security","tag-libreoffice","tag-openoffice","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=8631"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8631\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=8631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=8631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=8631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}