• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Digital Signature Spoofing Flaws Uncovered in OpenOffice and LibreOffice

You are here: Home / Cyber Security News / Digital Signature Spoofing Flaws Uncovered in OpenOffice and LibreOffice

The maintainers of LibreOffice and OpenOffice have transported security updates to their efficiency program to remediate a number of vulnerabilities that could be weaponized by destructive actors to alter documents to make them look as if they are digitally signed by a trusted supply.

The checklist of the 3 flaws is as follows —

  • CVE-2021-41830 / CVE-2021-25633 – Written content and Macro Manipulation with Double Certification Attack
  • CVE-2021-41831 / CVE-2021-25634 – Timestamp Manipulation with Signature Wrapping
  • CVE-2021-41832 / CVE-2021-25635 – Content material Manipulation with Certification Validation Attack

Prosperous exploitation of the vulnerabilities could allow an attacker to manipulate the timestamp of signed ODF files, and worse, alter the contents of a document or self-sign a document with an untrusted signature, which is then tweaked to adjust the signature algorithm to an invalid or not known algorithm.

In both of those the latter two attack situations — stemming as a outcome of poor certificate validation — LibreOffice improperly shows a validly signed indicator suggesting that the document has not been tampered with considering the fact that signing and presents a signature with an unidentified algorithm as a genuine signature issued by a trustworthy social gathering.

The weaknesses have been mounted in OpenOffice version 4.1.11 and LibreOffice versions 7..5, 7..6, 7.1.1 as nicely as 7.1.2. The Chair for Network and Details Security (NDS) at the Ruhr-University Bochum has been credited with discovering and reporting all 3 issues.

The conclusions are the most current in a collection of flaws uncovered by the Ruhr-College Bochum researchers and comply with identical attack approaches disclosed previously this calendar year that could most likely empower an adversary to modify a certified PDF document’s obvious articles by displaying destructive content in excess of the certified content without the need of invalidating its signature.

People of LibreOffice and OpenOffice are recommended to update to the most up-to-date model to mitigate the risk connected with the flaws.

Found this post appealing? Follow THN on Fb, Twitter  and LinkedIn to read through much more special written content we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « GitHub Revoked Insecure SSH Keys Generated by a Popular git Client
Next Post: Tile's first ultra-wideband tracker will use AR to help you find lost items »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
  • CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

Copyright © 2025 · AllTech.News, All Rights Reserved.