exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apache OpenOffice 1.0 Windows Installer Trojan Execution

Apache OpenOffice 1.0 Windows Installer Trojan Execution
Posted Nov 26, 2016
Authored by Cyril Vallicari

The Apache OpenOffice installer for Windows contained a defective operation that could trigger execution of unwanted software installed by a Trojan Horse application. The installer defect is known as an unquoted Windows search path vulnerability. In the case of Apache OpenOffice installers for Windows, the PC must have previously been infected by a Trojan Horse application (or user) running with administrator privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit. The exploit may already have operated on the user's PC.

tags | advisory, trojan
systems | windows
advisories | CVE-2016-6803
SHA-256 | b11761ee166cb00e6ba0bf9385312c23f0c2bac21fc64c14b18cf0d87d0cdead

Apache OpenOffice 1.0 Windows Installer Trojan Execution

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


CVE-2016-6803
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-6803>
Apache OpenOffice Advisory
<https://www.openoffice.org/security/cves/CVE-2016-6803.html>

Title: Windows Installer Can Enable Privileged Trojan Execution

Version 1.0
Announced October 11, 2016

Description

The Apache OpenOffice installer for Windows contained a defective
operation that could trigger execution of unwanted software
installed by a Trojan Horse application. The installer defect
is known as an "unquoted Windows search path vulnerability."

In the case of Apache OpenOffice installers for Windows, the PC must
have previously been infected by a Trojan Horse application (or user)
running with administrator privilege. Any installer with the unquoted
search path vulnerability becomes a delayed trigger for the exploit.
The exploit may already have operated on the user's PC.

Severity: Medium

There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.

Vendor: The Apache Software Foundation

Versions Affected:

All Apache OpenOffice versions 4.1.2 and older
are affected. Old OpenOffice.org versions are also
affected.


Mitigation:

Install Apache OpenOffice 4.1.3 for the latest maintenance and
cumulative security fixes. Use <https://www.openoffice.org/download/>.

If instead of a typical installation you use a custom-installation
option to change the location where Apache OpenOffice is installed,
use a location that has no spaces in its full-path name.


Defenses and Work-Arounds:

If you are unable to update to 4.1.3, there are other
precautions that can be taken. These precautions are also
recommended as protection against other software that may
have the unquoted search path vulnerability.

Ensure that there are no programs installed at the
top-level folder (usually C:\) where Windows is installed.
All are dangerous, especially ones named "Program", whether
"Program.exe" or some other variation.

If such programs are found, install or update to current
anti-virus/-malware software. Perform a complete system scan.
The scan may provide for removal of programs where there should
not be any. If that does not happen, it is necessary to remove
any Program.exe and others manually using administrator privilege.


Further Information:

For additional information and assistance, consult the Apache
OpenOffice Community Forums, <https://forum.openoffice.org/> or
make requests to the <mailto:users@openoffice.apache.org> public
mailing list. Defects not involving suspected security
vulnerabilities can be reported via
<http://www.openoffice.org/qa/issue_handling/pre_submission.html>.


The latest information on Apache OpenOffice security bulletins
can be found at the Bulletin Archive page
<http://www.openoffice.org/security/bulletin.html>.

Credits:

The Apache OpenOffice project acknowledges the reporting and
analysis for CVE-2016-6803 by Cyril Vallicari.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJX/C+GAAoJEPluif/UVmKK0VkH/0+K2SNXK1e9ccRjo71/Ns3/
KRK8w/7MqpnSoFIRXD7tn8eB/GY/RwuqlMCkf0zAvif6uzhe/OPgf9JYt22k4eIS
trR61K4SBicyZFpe9HmUrIH9Ucvdgy9Vu6VgOBFger7C39fcyUfnI/1S9wAXjb6y
Yab0/woIVuJxVX7u33kYOS+G52NVzxV4+qm2dhjwISYwxkNCEGh10zpTIIk1VnB3
p3JCGQ4k/tG2Fu30/qap1OmfvgHVP6qBl7b47ZCekc6JErSlGoJ8ZE6PJnNXq92A
0/YjlAUCGguaAg5ec18Qnkm2Ef6anmViBxoPgtxt38cCHV63tuWn7uZnCVKn1qk=
=aKVN
-----END PGP SIGNATURE-----




Login or Register to add favorites

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close