CVE-2019-9855

NameCVE-2019-9855
DescriptionLibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libreoffice (PTS)jessie1:4.3.3-2+deb8u11fixed
jessie (security)1:4.3.3-2+deb8u12fixed
stretch1:5.2.7-1+deb9u10fixed
stretch (security)1:5.2.7-1+deb9u11fixed
buster1:6.1.5-3+deb10u3fixed
buster (security)1:6.1.5-3+deb10u4fixed
bullseye, sid1:6.3.2~rc1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libreofficesource(unstable)(not affected)

Notes

- libreoffice <not-affected> (Windows-specific)
https://www.libreoffice.org/about-us/security/advisories/cve-2019-9855/

Search for package or bug name: Reporting problems