CVE-2017-3157
moderate-risk
Published 2017-11-20
By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.
Do I need to act?
-
0.78% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (18)
References (12)
Third Party Advisory
http://www.securityfocus.com/bid/96402
Issue Tracking
http://www.securitytracker.com/id/1037893
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0914
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0979
Issue Tracking
https://www.debian.org/security/2017/dsa-3792
Issue Tracking
https://www.openoffice.org/security/cves/CVE-2017-3157.html
Third Party Advisory
http://www.securityfocus.com/bid/96402
Issue Tracking
http://www.securitytracker.com/id/1037893
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0914
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0979
Issue Tracking
https://www.debian.org/security/2017/dsa-3792
Issue Tracking
https://www.openoffice.org/security/cves/CVE-2017-3157.html
40
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
19/34 · Moderate