![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-25636 |
Description: | LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.819787 1.3.6.1.4.1.25623.1.1.1.2.2023.3368 1.3.6.1.4.1.25623.1.1.4.2022.0886.1 1.3.6.1.4.1.25623.1.0.845280 1.3.6.1.4.1.25623.1.0.854571 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-25636 FEDORA-2022-3bbe89c20f https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NE6UIBCPZWRBWPSEGJOPNWPPT3CCMVH2/ [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html https://www.libreoffice.org/about-us/security/advisories/CVE-2021-25636/ https://www.libreoffice.org/about-us/security/advisories/CVE-2021-25636/ |