Executive Summary
Summary | |
---|---|
Title | libreoffice security update |
Informations | |||
---|---|---|---|
Name | DSA-3394 | First vendor Publication | 2015-11-05 |
Vendor | Debian | Last vendor Modification | 2015-11-05 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities have been discovered in LibreOffice, a full-featured office productivity: CVE-2015-4551 Federico Scrinzi discovered an information leak in the handling of ODF documents. Quoting from https://www.libreoffice.org/about-us/security/advisories/cve-2015-4551/: The LinkUpdateMode feature controls whether documents inserted into Writer or Calc via links will either not get updated, or prompt to update, or automatically update, when the parent document is loaded. The configuration of this option was stored in the document. That flawed approach enabled documents to be crafted with links to plausible targets on the victims host computer. The contents of those automatically inserted after load links can be concealed in hidden sections and retrieved by the attacker if the document is saved and returned to sender, or via http requests if the user has selected lower security settings for that document. CVE-2015-5212 A buffer overflow in parsing the printer setup information in ODF documents may result in the execution of arbitrary code. CVE-2015-5213 / CVE-2015-5214 A buffer overflow and an integer oect memory management in parsing Microsoft Word documents may result in the execution of arbitrary code. For the oldstable distribution (wheezy), these problems have been fixed in version 1:3.5.4+dfsg2-0+deb7u5. For the stable distribution (jessie), these problems have been fixed in version 1:4.3.3-2+deb8u2. For the testing distribution (stretch), these problems have been fixed in version 1:5.0.2-1. For the unstable distribution (sid), these problems have been fixed in version 1:5.0.2-1. We recommend that you upgrade your libreoffice packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3394 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
25 % | CWE-200 | Information Exposure |
25 % | CWE-191 | Integer Underflow (Wrap or Wraparound) |
25 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
25 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-11-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201611-03.nasl - Type : ACT_GATHER_INFO |
2016-07-22 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_72f71e264f6911e6ac37ac9e174be3af.nasl - Type : ACT_GATHER_INFO |
2016-03-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201603-05.nasl - Type : ACT_GATHER_INFO |
2016-02-29 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-273.nasl - Type : ACT_GATHER_INFO |
2016-02-04 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-0324-1.nasl - Type : ACT_GATHER_INFO |
2015-12-16 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20151214_libreoffice_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-12-15 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-2619.nasl - Type : ACT_GATHER_INFO |
2015-12-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-2619.nasl - Type : ACT_GATHER_INFO |
2015-12-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-2619.nasl - Type : ACT_GATHER_INFO |
2015-11-17 | Name : The remote Windows host has an application installed that is affected by mult... File : openoffice_412.nasl - Type : ACT_GATHER_INFO |
2015-11-17 | Name : The remote host has an application installed that is affected by an arbitrary... File : macosx_libreoffice_501.nasl - Type : ACT_GATHER_INFO |
2015-11-17 | Name : The remote host has an application installed that is affected by multiple vul... File : macosx_libreoffice_445.nasl - Type : ACT_GATHER_INFO |
2015-11-17 | Name : The remote host has an application installed that is affected by an arbitrary... File : libreoffice_501.nasl - Type : ACT_GATHER_INFO |
2015-11-17 | Name : The remote host has an application installed that is affected by multiple vul... File : libreoffice_445.nasl - Type : ACT_GATHER_INFO |
2015-11-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2793-1.nasl - Type : ACT_GATHER_INFO |
2015-11-06 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_18b3c61b83de11e5905bac9e174be3af.nasl - Type : ACT_GATHER_INFO |
2015-11-06 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3394.nasl - Type : ACT_GATHER_INFO |
2015-11-05 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1915-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-11-13 00:27:31 |
|
2015-11-10 21:27:53 |
|
2015-11-07 13:24:57 |
|
2015-11-05 21:21:33 |
|