Author: orcmid
Date: Thu Jul 21 01:35:35 2016
New Revision: 1753625
URL: http://svn.apache.org/viewvc?rev=1753625&view=rev
Log:
Review cleanups with alignment between the web page and the text advisory
Modified:
openoffice/ooo-site/trunk/content/security/cves/CVE-2016-1513.html
Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2016-1513.html
URL:
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2016-1513.html?rev=1753625&r1=1753624&r2=1753625&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2016-1513.html
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2016-1513.html Thu Jul
21 01:35:35 2016
@@ -36,7 +36,7 @@
</p>
<p>
- <strong>Summary</strong>
+ <strong>Description</strong>
</p>
<p>
@@ -73,17 +73,7 @@
<br /><br />
A source-code patch that blocks the vulnerability has been developed
and is available for developers at <a
href="https://bz.apache.org/ooo/show_bug.cgi?id=127045">issue 127045</a>.
<br /><br />
- Antivirus can detect documents attempting to exploit this
vulnerability by employing Snort Signature IDs 35828-35829.
- </p>
-
- <p>
- <strong>Description</strong>
- </p>
-
- <p>
- An OpenDocument Presentation .ODP or Presentation Template .OTP file
can contain invalid presentation elements that lead to memory corruption when
the document is loaded in Apache OpenOffice Impress. The defect may cause the
document to appear as corrupted. OpenOffice may simply close or crash, possibly
in a recovery-stuck mode requiring manual intervention, including removal of
any document lock.
- <br /><br />
- A crafted exploitation of the vulnerability can allow an attacker to
cause denial of service (memory corruption and application crash) and possible
execution of arbitrary code.
+ Antivirus products can detect documents attempting to exploit this
vulnerability by employing Snort Signature IDs 35828-35829.
</p>
<p>
@@ -102,27 +92,14 @@
For .ODP and .OTP files from unknown or suspicious sources, any
automatic closing on opening or failing of OpenOffice Impress can be checked by
opening the file in an OpenDocument Presentation application that is not
vulnerable to the defective document formatting involved in CVE-2016-1513.
Current releases of LibreOffice and Microsoft Office PowerPoint (for .ODP
files), including PowerPoint Online, are known to avoid the defect. Other
ODF-supporting software may be successful. The resulting presentation may
appear corrupted or incomplete and need not reflect an actual exploit attempt.
Saving the document as a new presentation file will be exploit-free either way.
<br /><br />
To report a suspicious document from an external source and for
which OpenOffice Impress crashes, preserve the file exactly and report to <a
href="mailto:[email protected]">[email protected]</a>.
Await further instructions for submission of the file itself. Do not post
files having suspected exploits to mailing lists, the issue-reporting system,
or any other public location.
- <br /><br />
- For additional information and assistance, consult the <a
href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>, or
make requests to the <a
href="mailto:[email protected]">[email protected]</a>
public mailing list. Defects not involving suspected security vulnerabilities
can be reported with a normal issue via <a
href="http://www.openoffice.org/qa/issue_handling/pre_submission.html">Bugzilla</a>.
</p>
-
- <p>
- <strong>Precautions</strong>
- </p>
-
+
<p>
- Users who do not upgrade to Apache OpenOffice 4.1.2 should be
careful of .DOC files from unknown or unreliable sources. A Microsoft Word
97-2003 .DOC format file can be checked by opening with software, such as
Microsoft Office Word or Word Online. The documents may be rejected as
corrupted or extraordinary employment of bookmarks may be observable.
- </p>
-
- <p>
<strong>Further Information</strong>
</p>
-
- <p>For additional information and assistance, consult the
- <a href="https://forum.openoffice.org/">Apache OpenOffice Community
Forums</a>
- or make requests to the
- <a
href="mailto:[email protected]">[email protected]</a>
- public mailing list.
+
+ <p>
+ For additional information and assistance, consult the <a
href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>, or
make requests to the <a
href="mailto:[email protected]">[email protected]</a>
public mailing list. Defects not involving suspected security vulnerabilities
can be reported with a normal issue via <a
href="http://www.openoffice.org/qa/issue_handling/pre_submission.html">Bugzilla</a>.
</p>
<p>