Scientific Linux Security Update : libreoffice on SL7.x x86_64

Critical Nessus Plugin ID 82256


The remote Scientific Linux host is missing one or more security updates.


It was found that LibreOffice documents executed macros unconditionally, without user approval, when these documents were opened using LibreOffice. An attacker could use this flaw to execute arbitrary code as the user running LibreOffice by embedding malicious VBA scripts in the document as macros. (CVE-2014-0247)

A flaw was found in the OLE (Object Linking and Embedding) generation in LibreOffice. An attacker could use this flaw to embed malicious OLE code in a LibreOffice document, allowing for arbitrary code execution.

A use-after-free flaw was found in the 'Remote Control' capabilities of the LibreOffice Impress application. An attacker could use this flaw to remotely execute code with the permissions of the user running LibreOffice Impress. (CVE-2014-3693)

The libreoffice packages have been upgraded to upstream version, which provides a number of bug fixes and enhancements over the previous version. Among others :

- Improved OpenXML interoperability.

- Additional statistic functions in Calc (for interoperability with Excel and Excel's Add-in 'Analysis ToolPak').

- Various performance improvements in Calc.

- Apple Keynote and Abiword import.

- Improved MathML export.

- New Start screen with thumbnails of recently opened documents.

- Visual clue in Slide Sorter when a slide has a transition or an animation.

- Improvements for trend lines in charts.

- Support for BCP-47 language tags.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 82256

File Name: sl_20150305_libreoffice_on_SL7_x.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2015/03/26

Modified: 2015/11/17

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2015/03/05

Reference Information

CVE: CVE-2014-0247, CVE-2014-3575, CVE-2014-3693