{"id":14514,"date":"2019-02-06T16:10:03","date_gmt":"2019-02-07T00:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/02\/06\/news-8264\/"},"modified":"2019-02-06T16:10:03","modified_gmt":"2019-02-07T00:10:03","slug":"news-8264","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/06\/news-8264\/","title":{"rendered":"New critical vulnerability discovered in open-source office suites"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 06 Feb 2019 17:16:50 +0000<\/strong><\/p>\n<p>A great number of attack techniques these days are using Microsoft Office documents to distribute malware. In recent years, there has been serious development on <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/unraveling-ThreadKit-new-document-exploit-builder-distribute-The-Trick-Formbook-Loki-Bot-malware\" target=\"_blank\" rel=\"noopener\">document exploit kit builders<\/a>, not to mention the <a href=\"https:\/\/arno0x0x.wordpress.com\/2017\/11\/20\/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code\/\" target=\"_blank\" rel=\"noopener\">myriad of tricks<\/a> that red-teamers have come up with to bypass security solutions.<\/p>\n<p>In contrast to drive-by downloads that require no user interaction, document-based attacks usually incorporate some kind of social engineering component. From being lured into opening up an attachment to enabling the infamous macros, attackers are using all sorts of themes and spear phishing techniques to infect their victims.<\/p>\n<p>While Microsoft Office gets all of the attention, other productivity software suites have been exploited before. We recall the\u00a0<a href=\"https:\/\/blog.talosintelligence.com\/2017\/05\/vulnerability-spotlight-hangul-word.html\" target=\"_blank\" rel=\"noopener\">Hangul Office Suite<\/a>, which is popular in South Korea and was used by threat groups in <a href=\"https:\/\/blog.talosintelligence.com\/2018\/01\/korea-in-crosshairs.html\" target=\"_blank\" rel=\"noopener\">targeted attacks<\/a>.<\/p>\n<p>Today we look at a vulnerability in LibreOffice, the free and open-source office suite, and OpenOffice (now Apache OpenOffice) available for Windows, Mac, and Linux. The bug (<a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2018-16858\" target=\"_blank\" rel=\"noopener\">CVE-2018-16858<\/a>) was discovered by <a href=\"https:\/\/twitter.com\/insertScript\/status\/1091324665497337856\" target=\"_blank\" rel=\"noopener\">Alex Inf\u00fchr<\/a>, who responsibly disclosed it and then published the results with an accompanying proof of concept on his <a href=\"https:\/\/insert-script.blogspot.com\/2019\/02\/libreoffice-cve-2018-16858-remote-code.html\" target=\"_blank\" rel=\"noopener\">blog<\/a>.<\/p>\n<div id=\"attachment_27113\" style=\"width: 740px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27113\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/attachment\/libreoffice_\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_.png\" data-orig-size=\"730,774\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"libreoffice_\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_-283x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_-566x600.png\" class=\"wp-image-27113 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_.png\" alt=\"\" width=\"730\" height=\"774\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_.png 730w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_-283x300.png 283w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_-566x600.png 566w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Proof of concept code exploiting the vulnerability and launching the calculator<\/p>\n<\/div>\n<p>An attacker could take advantage of this bug to execute remote code, which could lead to compromising the system. The flaw uses a mouseover event, which means the user would have to be tricked into placing their mouse over a link within the document. This triggers execution of a Python file (installed with LibreOffice) and allows parameters to be passed and executed.<\/p>\n<p>We tested several proof of concepts shared by <a href=\"https:\/\/twitter.com\/JohnLaTwC\/status\/1092828811249410048\" target=\"_blank\" rel=\"noopener\">John Lambert<\/a>.\u00a0 The process flow typically goes like this: <em><strong>soffice.exe -&gt; soffice.bin -&gt; cmd.exe -&gt; calc.exe<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_MBAE.gif\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27115\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/attachment\/libreoffice_mbae\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_MBAE.gif\" data-orig-size=\"1024,768\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"libreoffice_MBAE\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_MBAE-300x225.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_MBAE-600x450.gif\" class=\"alignnone size-full wp-image-27115\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/libreoffice_MBAE.gif\" alt=\"\" width=\"1024\" height=\"768\" \/><\/a><\/p>\n<p>The vulnerability has been patched in LibreOffice but not in Apache OpenOffice\u2014yet. <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users were already protected against it without the need for a detection update.<\/p>\n<p>Time will tell if this vulnerability ends up being used in the wild. It&#8217;s worth noting that not everyone uses Microsoft Office, and threat actors could consider it for targeting specific victims they know may be using open-source productivity software.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/\">New critical vulnerability discovered in open-source office suites<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 06 Feb 2019 17:16:50 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/' title='New critical vulnerability discovered in open-source office suites'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/shutterstock_217859110.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild? <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2018-16858\/\" rel=\"tag\">CVE-2018-16858<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/libreoffice\/\" rel=\"tag\">libreoffice<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/openoffice\/\" rel=\"tag\">openoffice<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/python\/\" rel=\"tag\">python<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rce\/\" rel=\"tag\">rce<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/' title='New critical vulnerability discovered in open-source office suites'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/02\/new-critical-vulnerability-open-source-office-suites\/\">New critical vulnerability discovered in open-source office suites<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20857,11638,10987,20858,20859,18143,18364,10494],"class_list":["post-14514","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2018-16858","tag-exploit","tag-exploits","tag-libreoffice","tag-openoffice","tag-python","tag-rce","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14514"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14514\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14514"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}