MiracleLinux 4 : abrt-2.0.8-26.0.1.AXS4, libreport-2.0.9-21.0.1.AXS4 (AXBA:2014-792:01)

medium Nessus Plugin ID 291383

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXBA:2014-792:01 advisory.

- LibreOffice 4.2.4 executes unspecified VBA macros automatically, which has unspecified impact and attack vectors, possibly related to doc/docmacromode.cxx. (CVE-2014-0247)

- It was found that the implementation of the GTNSubjectCreatingInterceptor class in gatein-wsrp was not thread safe. For a specific WSRP endpoint, under high-concurrency scenarios or scenarios where SOAP messages take long to execute, it was possible for an unauthenticated remote attacker to gain privileged information if WS-Security is enabled for the WSRP Consumer, and the endpoint in question is being used by a privileged user. This affects JBoss Portal 6.2.0. (CVE-2014-0245)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/5255

Plugin Details

Severity: Medium

ID: 291383

File Name: miracle_linux_AXBA-2014-792.nasl

Version: 1.1

Type: local

Published: 1/19/2026

Updated: 1/19/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: N/a

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-0247

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2014-0245

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:libreport-python, p-cpe:/a:miracle:linux:abrt-cli, p-cpe:/a:miracle:linux:abrt-addon-python, cpe:/o:miracle:linux:4, p-cpe:/a:miracle:linux:libreport-plugin-kerneloops, p-cpe:/a:miracle:linux:abrt, p-cpe:/a:miracle:linux:libreport, p-cpe:/a:miracle:linux:libreport-newt, p-cpe:/a:miracle:linux:libreport-plugin-rhtsupport, p-cpe:/a:miracle:linux:abrt-addon-ccpp, p-cpe:/a:miracle:linux:abrt-tui, p-cpe:/a:miracle:linux:abrt-gui, p-cpe:/a:miracle:linux:libreport-plugin-logger, p-cpe:/a:miracle:linux:abrt-addon-kerneloops, p-cpe:/a:miracle:linux:abrt-libs, p-cpe:/a:miracle:linux:abrt-desktop, p-cpe:/a:miracle:linux:libreport-gtk, p-cpe:/a:miracle:linux:libreport-plugin-reportuploader, p-cpe:/a:miracle:linux:libreport-plugin-mailx, p-cpe:/a:miracle:linux:libreport-compat, p-cpe:/a:miracle:linux:libreport-cli

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/21/2014

Vulnerability Publication Date: 6/23/2014

Reference Information

CVE: CVE-2014-0245, CVE-2014-0247