First published: Mon Dec 11 2023(Updated: )
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
Credit: security@documentfoundation.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/LibreOffice | <7.5.9 | 7.5.9 |
redhat/LibreOffice | <7.6.4 | 7.6.4 |
debian/libreoffice | 1:7.0.4-4+deb11u10 4:7.4.7-1+deb12u4 4:24.2.5-4 4:24.2.6-1 | |
LibreOffice Draw | >=7.5.0<7.5.9 | |
LibreOffice Draw | >=7.6.0<7.6.3 | |
Fedora | =38 | |
Debian | =11.0 | |
Debian | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6185 has been rated as having a high severity due to the potential for arbitrary code execution.
To fix CVE-2023-6185, users should upgrade to LibreOffice version 7.5.10 or later, or version 7.6.5 or later.
CVE-2023-6185 affects LibreOffice versions prior to 7.5.10 and 7.6.5.
CVE-2023-6185 is an improper input validation vulnerability that allows attackers to execute arbitrary GStreamer plugins.
There are no known effective mitigations for CVE-2023-6185 other than upgrading to a patched version.