ID CFOUNDRY:35BFCB7A171647D2DB69FB87A494A3FC Type cloudfoundry Reporter Cloud Foundry Modified 2019-11-14T00:00:00
Description
Severity
Medium
Vendor
Canonical Ubuntu
Versions Affected
Canonical Ubuntu 16.04
Canonical Ubuntu 18.04
Description
Aladdin Mubaied discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3189)
It was discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-12900)
CVEs contained in this USN include: CVE-2016-3189, CVE-2019-12900
Affected Cloud Foundry Products and Versions
Severity is medium unless otherwise noted.
Cloud Foundry BOSH xenial-stemcells are vulnerable, including:
315.x versions prior to 315.64
250.x versions prior to 250.79
170.x versions prior to 170.107
97.x versions prior to 97.132
All other stemcells not listed.
All versions of Cloud Foundry cflinuxfs3 prior to 0.107.0
Mitigation
Users of affected products are strongly encouraged to follow one of the mitigations below:
The Cloud Foundry project recommends upgrading the following BOSH xenial-stemcells:
Upgrade 315.x versions to 315.64
Upgrade 250.x versions to 250.79
Upgrade 170.x versions to 170.107
Upgrade 97.x versions to 97.132
All other stemcells should be upgraded to the latest version available on bosh.io.
The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs3 version 0.107.0 or later.
{"id": "CFOUNDRY:35BFCB7A171647D2DB69FB87A494A3FC", "bulletinFamily": "software", "title": "USN-4038-1: bzip2 vulnerabilities | Cloud Foundry", "description": "# \n\n## Severity\n\nMedium\n\n## Vendor\n\nCanonical Ubuntu\n\n## Versions Affected\n\n * Canonical Ubuntu 16.04\n * Canonical Ubuntu 18.04\n\n## Description\n\nAladdin Mubaied discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3189)\n\nIt was discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-12900)\n\nCVEs contained in this USN include: CVE-2016-3189, CVE-2019-12900\n\n## Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH xenial-stemcells are vulnerable, including: \n * 315.x versions prior to 315.64\n * 250.x versions prior to 250.79\n * 170.x versions prior to 170.107\n * 97.x versions prior to 97.132\n * All other stemcells not listed.\n * All versions of Cloud Foundry cflinuxfs3 prior to 0.107.0\n\n## Mitigation\n\nUsers of affected products are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH xenial-stemcells: \n * Upgrade 315.x versions to 315.64\n * Upgrade 250.x versions to 250.79\n * Upgrade 170.x versions to 170.107\n * Upgrade 97.x versions to 97.132\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io/stemcells/#ubuntu-xenial>).\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs3 version 0.107.0 or later.\n\n## References\n\n * [USN-4038-1](<https://usn.ubuntu.com/4038-1>)\n * [CVE-2016-3189](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189>)\n * [CVE-2019-12900](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12900>)\n", "published": "2019-11-14T00:00:00", "modified": "2019-11-14T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.cloudfoundry.org/blog/usn-4038-1/", "reporter": "Cloud Foundry", "references": [], "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "type": "cloudfoundry", "lastseen": "2019-11-15T07:30:49", "edition": 1, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-3189", "CVE-2019-12900"]}, {"type": "f5", "idList": ["SOL41233508", "SOL45816067", "F5:K45816067", "F5:K68713584"]}, {"type": "ubuntu", "idList": ["USN-4146-1", "USN-4038-2", "USN-4038-1", "USN-4146-2"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1833-2:ADF1A", "DEBIAN:DLA-1833-1:50B37", "DEBIAN:DLA-1953-2:E26E9", "DEBIAN:DLA-1953-1:02211"]}, {"type": "freebsd", "idList": ["DBD1F627-C43B-11E9-A923-9C5C8E75236A", "4B6CB45D-881E-447A-A4E0-C97A954EA758", "3C7EDC7A-F680-11E9-A87F-A4BADB2F4699"]}, {"type": "slackware", "idList": ["SSA-2019-195-01"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:EDF01D8490471510F59758370F85EB1F", "CFOUNDRY:8D2E715ABF4E942D38CD92E026D73DA9"]}, {"type": "nessus", "idList": ["EULEROS_SA-2019-2411.NASL", "GENTOO_GLSA-201708-08.NASL", "EULEROS_SA-2019-2560.NASL", "SUSE_SU-2019-1206-1.NASL", "UBUNTU_USN-4038-1.NASL", "SUSE_SU-2019-1206-2.NASL", "SUSE_SU-2019-1955-1.NASL", "SLACKWARE_SSA_2019-195-01.NASL", "FREEBSD_PKG_4B6CB45D881E447AA4E0C97A954EA758.NASL", "EULEROS_SA-2019-1171.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310852824", "OPENVAS:1361412562311220191020", "OPENVAS:1361412562310852500", "OPENVAS:1361412562310891833", "OPENVAS:1361412562311220192411", "OPENVAS:1361412562310872227", "OPENVAS:1361412562311220191171", "OPENVAS:1361412562310872225", "OPENVAS:1361412562311220192560", "OPENVAS:1361412562310844073"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1918-1", "OPENSUSE-SU-2019:1781-1", "OPENSUSE-SU-2019:2595-1", "OPENSUSE-SU-2019:2597-1", "OPENSUSE-SU-2019:1435-1", "OPENSUSE-SU-2019:1398-1"]}, {"type": "archlinux", "idList": ["ASA-201702-19"]}, {"type": "gentoo", "idList": ["GLSA-201708-08"]}, {"type": "fedora", "idList": ["FEDORA:74188606156B", "FEDORA:1622360151B7", "FEDORA:5193D601D83F", "FEDORA:4FD25605CB4A"]}], "modified": "2019-11-15T07:30:49", "rev": 2}, "score": {"value": 6.7, "vector": "NONE", "modified": "2019-11-15T07:30:49", "rev": 2}, "vulnersScore": 6.7}, "affectedSoftware": []}
{"cve": [{"lastseen": "2020-12-09T21:41:41", "description": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", "edition": 22, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-06-19T23:15:00", "title": "CVE-2019-12900", "type": "cve", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-12900"], "modified": "2020-10-20T22:15:00", "cpe": ["cpe:/a:bzip:bzip2:1.0.6"], "id": "CVE-2019-12900", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12900", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-21T12:11:09", "description": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 9, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2016-06-30T17:59:00", "title": "CVE-2016-3189", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-3189"], "modified": "2020-10-20T22:15:00", "cpe": ["cpe:/a:bzip:bzip2:1.0.6"], "id": "CVE-2016-3189", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3189", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2017-06-08T00:16:33", "bulletinFamily": "software", "cvelist": ["CVE-2016-3189"], "edition": 1, "description": "\nF5 Product Development has evaluated the currently supported releases for potential vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP AAM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP AFM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP Analytics| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP APM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP ASM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP DNS| None| 12.0.0 - 12.1.0| Not vulnerable| None \nBIG-IP Edge Gateway| None| 11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP GTM| None| 11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP Link Controller| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP PEM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP PSM| None| 11.4.0 - 11.4.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP WebAccelerator| None| 11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP WOM| None| 11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nARX| None| 6.2.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| None| 3.1.1| Not vulnerable| None \nFirePass| None| 7.0.0| Not vulnerable| None \nBIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None \nBIG-IQ ADC| None| 4.5.0| Not vulnerable| None \nBIG-IQ Centralized Management| None| 5.0.0 \n4.6.0| Not vulnerable| None \nBIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None \nF5 iWorkflow| None| 2.0.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 MobileSafe| None| 1.0.0| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 5.0.0 \n4.0.0 - 4.4.0| Not vulnerable| None\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n", "modified": "2016-07-29T01:28:00", "published": "2016-07-29T01:28:00", "id": "F5:K45816067", "href": "https://support.f5.com/csp/article/K45816067", "title": "bzip2 vulnerability CVE-2016-3189", "type": "f5", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2020-04-06T22:39:44", "bulletinFamily": "software", "cvelist": ["CVE-2019-12900"], "description": "\nF5 Product Development has assigned ID 819125 (BIG-IP), ID 819125-7 (BIG-IQ), ID 819125-8 (Enterprise Manager), ID 819125-9 (iWorkflow), and CPF-25132 and CPF-25133 (Traffix SDC) to this vulnerability.\n\nTo determine if your product and version have been evaluated for this vulnerability, refer to the **Applies to (see versions)** box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>).\n\nProduct | Branch | Versions known to be vulnerable | Fixes introduced in | Severity | CVSSv3 score1 | Vulnerable component or feature \n---|---|---|---|---|---|--- \nBIG-IP (LTM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, WebAccelerator) | 15.x | 15.0.0 - 15.0.1 | None | Medium | [4.0](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L>) | **bzip2** utility \n14.x | 14.1.0 - 14.1.2 | None \n13.x | 13.1.0 - 13.1.3 | None \n12.x | 12.1.0 - 12.1.5 | None \n11.x | 11.5.2 - 11.6.5 | None \nBIG-IP (AAM) | 15.x | 15.0.0 - 15.0.1 | None | Critical | [9.0](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H>) | iSession profile with bzip2 compression enabled, **bzip2** utility \n14.x | 14.1.0 - 14.1.2 | None \n13.x | 13.1.0 - 13.1.3 | None \n12.x | 12.1.0 - 12.1.5 | None \n11.x | 11.5.2 - 11.6.5 | None \nBIG-IP (PEM) | 15.x | None | Not applicable | Not vulnerable2 | None | None \n14.x | None | Not applicable \n13.x | None | Not applicable \n12.x | None | Not applicable \n11.x | None | Not applicable \nEnterprise Manager | 3.x | 3.1.1 | None | Medium | [4.0](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L>) | **bzip2** utility \nBIG-IQ Centralized Management | 7.x | 7.0.0 | None | Medium | [4.0](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L>) | **bzip2** utility \n6.x | 6.0.0 - 6.1.0 | None \n5.x | 5.2.0 - 5.4.0 | None \nF5 iWorkflow | 2.x | 2.3.0 | None | Medium | [4.0](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L>) | **bzip2** utility \nTraffix SDC | 5.x | 5.0.0 - 5.1.0 | None | Medium | [4.0](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L>) | **bzip2** utility \n \n1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.\n\n2The specified products contain the affected code. However, F5 identifies the vulnerability status as Not vulnerable because the attacker cannot exploit the code in default, standard, or recommended configurations.\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Fixes introduced in** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nBIG-IP AAM\n\nTo mitigate this vulnerability for BIG-IP AAM, you can disable bzip2 compression in any configured iSession profile. To do so, perform one of the following procedures:\n\n * [Using the Configuration utility to disable bzip2 compression](<https://support.f5.com/csp/article/K68713584#gui>)\n * [Using tmsh to disable bzip2 compression ](<https://support.f5.com/csp/article/K68713584#tmsh>)\n\nUsing the Configuration utility to disable bzip2 compression \n\n**Impact of action**: Disabling compression may result in higher latency between iSession endpoints. F5 recommends only disabling bzip2 compression. Additionally, you should perform testing within a maintenance window to ensure changes are compatible with your environment.\n\n 1. Log in to the Configuration utility.\n 2. Go to **Local Traffic** > **Profiles** > **Services** > **iSession**.\n 3. Select the name of your iSession profile.\n 4. Under **Compression Settings**, for **Bzip2**, select **Disabled**.\n 5. Select **Update**.\n 6. Repeat this procedure on the corresponding BIG-IP iSession tunnel endpoint.\n\nUsing tmsh to disable bzip2 compression \n\n**Impact of action**: Disabling compression may result in higher latency between iSession endpoints. F5 recommends only disabling bzip2 compression. Additionally, you should perform testing within a maintenance window to ensure changes are compatible with your environment.\n\n 1. Log in to the TMOS Shell (**tmsh**) by entering the following command: \n\ntmsh\n\n 2. To disable bzip2 compression for your iSession profile, use the following command syntax: \n\nmodify /wom profile isession <profile name> compression-codecs delete { bzip2 }\n\nFor example, to disable bzip2 compression in an iSession profile named **my-iSession**, enter the following command:\n\nmodify /wom profile isession my-iSession compression-codecs delete { bzip2 }\n\n 3. To view the configuration, use the following command syntax: \n\nlist /wom profile isession <profile name>\n\nOutput appears similar to the following example for a profile named **my-iSession**:\n\nwom profile isession my-iSession { \n app-service none \n compression-codecs { deflate lzo } \n defaults-from isession \n}\n\n 4. Save the configuration by entering the following command: \n\nsave /sys config\n\nBIG-IP, BIG-IQ, iWorkflow, Enterprise Manager, and Traffix SDC\n\nNone. F5 recommends that you restrict local access to trusted administrative users.\n\n * [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>)\n * [K41942608: Overview of Security Advisory articles](<https://support.f5.com/csp/article/K41942608>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K9502: BIG-IP hotfix and point release matrix](<https://support.f5.com/csp/article/K9502>)\n * [K13123: Managing BIG-IP product hotfixes (11.x - 15.x)](<https://support.f5.com/csp/article/K13123>)\n * [K15106: Managing BIG-IQ product hotfixes](<https://support.f5.com/csp/article/K15106>)\n * [K15113: BIG-IQ hotfix and point release matrix](<https://support.f5.com/csp/article/K15113>)\n * [K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM systems (11.4.x and later)](<https://support.f5.com/csp/article/K48955220>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>)\n", "edition": 1, "modified": "2019-11-14T00:37:00", "published": "2019-11-14T00:19:00", "id": "F5:K68713584", "href": "https://support.f5.com/csp/article/K68713584", "title": "bzip2 vulnerability CVE-2019-12900", "type": "f5", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2016-09-26T17:22:54", "bulletinFamily": "software", "cvelist": ["CVE-2016-3189"], "description": "Vulnerability Recommended Actions\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "edition": 1, "modified": "2016-08-10T00:00:00", "published": "2016-08-08T00:00:00", "id": "SOL41233508", "href": "http://support.f5.com/kb/en-us/solutions/public/k/41/sol41233508.html", "type": "f5", "title": "SOL41233508 - bzip2 vulnerability CVE-2016-3189", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2016-09-26T17:23:02", "bulletinFamily": "software", "cvelist": ["CVE-2016-3189"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "modified": "2016-07-28T00:00:00", "published": "2016-07-28T00:00:00", "id": "SOL45816067", "href": "http://support.f5.com/kb/en-us/solutions/public/k/45/sol45816067.html", "type": "f5", "title": "SOL45816067 - bzip2 vulnerability CVE-2016-3189", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "slackware": [{"lastseen": "2020-10-25T16:36:07", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189", "CVE-2019-12900"], "description": "New bzip2 packages are available for Slackware 14.0, 14.1, 14.2, and -current\nto fix security issues.\n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n\npatches/packages/bzip2-1.0.8-i586-1_slack14.2.txz: Upgraded.\n Fixes security issues:\n bzip2recover: Fix use after free issue with outFile.\n Make sure nSelectors is not out of range.\n For more information, see:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bzip2-1.0.8-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bzip2-1.0.8-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bzip2-1.0.8-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bzip2-1.0.8-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bzip2-1.0.8-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bzip2-1.0.8-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/bzip2-1.0.8-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/bzip2-1.0.8-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 14.0 package:\n8a94c11d7ef85966c8cf4eddb169b6b9 bzip2-1.0.8-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n86e7066ee23ccbc43912f8fdf242d7f4 bzip2-1.0.8-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n157e83b4270d4520fd1640f3e4a793e9 bzip2-1.0.8-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n2a0494c27ffa73deaf9cfe616edbbdbc bzip2-1.0.8-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\n49b34a9ebf71d346b1f99c2524d046bc bzip2-1.0.8-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n5c6ba8d29eb16000f072a8e364836921 bzip2-1.0.8-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n50e813124cd298552694171a9ca535ef a/bzip2-1.0.8-i586-1.txz\n\nSlackware x86_64 -current package:\nc6f4170f1b14065b4fb2594d8ad73e71 a/bzip2-1.0.8-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg bzip2-1.0.8-i586-1_slack14.2.txz", "modified": "2019-07-15T00:49:37", "published": "2019-07-15T00:49:37", "id": "SSA-2019-195-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2019&m=slackware-security.423144", "type": "slackware", "title": "[slackware-security] bzip2", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-07-02T10:41:48", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "\nbzip2 developers reports:\n\nCVE-2016-3189 - Fix use-after-free in bzip2recover (Jakub Martisko)\nCVE-2019-12900 - Detect out-of-range nSelectors in corrupted files (Albert Astals Cid). Found through fuzzing karchive.\n\n", "edition": 1, "modified": "2019-06-23T00:00:00", "published": "2019-06-23T00:00:00", "id": "4B6CB45D-881E-447A-A4E0-C97A954EA758", "href": "https://vuxml.freebsd.org/freebsd/4b6cb45d-881e-447a-a4e0-c97a954ea758.html", "title": "bzip2 -- multiple issues", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-10-24T20:29:32", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189", "CVE-2019-1290"], "description": "\nProblem Description:\nThe decompressor used in bzip2 contains a bug which can\n\tlead to an out-of-bounds write when processing a specially\n\tcrafted bzip2(1) file.\nbzip2recover contains a heap use-after-free bug which\n\tcan be triggered when processing a specially crafted bzip2(1)\n\tfile.\nImpact:\nAn attacker who can cause maliciously crafted input to\n\tbe processed may trigger either of these bugs. The bzip2recover\n\tbug may cause a crash, permitting a denial-of-service. The\n\tbzip2 decompressor bug could potentially be exploited to\n\texecute arbitrary code.\nNote that some utilities, including the tar(1) archiver\n\tand the bspatch(1) binary patching utility (used in portsnap(8)\n\tand freebsd-update(8)) decompress bzip2(1)-compressed data\n\tinternally; system administrators should assume that their\n\tsystems will at some point decompress bzip2(1)-compressed\n\tdata even if they never explicitly invoke the bunzip2(1)\n\tutility.\n", "edition": 1, "modified": "2019-08-06T00:00:00", "published": "2019-08-06T00:00:00", "id": "3C7EDC7A-F680-11E9-A87F-A4BADB2F4699", "href": "https://vuxml.freebsd.org/freebsd/3c7edc7a-f680-11e9-a87f-a4badb2f4699.html", "title": "FreeBSD -- Multiple vulnerabilities in bzip2", "type": "freebsd", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-23T09:39:36", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "\nMicah Snyder reports:\n\n\nAn out of bounds write was possible within ClamAV&s NSIS bzip2 library when attempting decompression in cases where the number of selectors exceeded the max limit set by the library (CVE-2019-12900). The issue has been resolved by respecting that limit.\n The zip bomb vulnerability mitigated in 0.101.3 has been assigned the CVE identifier CVE-2019-12625. Unfortunately, a workaround for the zip-bomb mitigation was immediately identified. To remediate the zip-bomb scan time issue, a scan time limit has been introduced in 0.101.4. This limit now resolves ClamAV's vulnerability to CVE-2019-12625.\n\n\n", "edition": 1, "modified": "2019-08-21T00:00:00", "published": "2019-08-21T00:00:00", "id": "DBD1F627-C43B-11E9-A923-9C5C8E75236A", "href": "https://vuxml.freebsd.org/freebsd/dbd1f627-c43b-11e9-a923-9c5c8e75236a.html", "title": "clamav -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-08-12T01:02:33", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "Package : bzip2\nVersion : 1.0.6-7+deb8u1\nCVE ID : CVE-2016-3189 CVE-2019-12900\n\n\nTwo issues in bzip2, a high-quality block-sorting file compressor, have \nbeen fixed. One, CVE-2019-12900, is a out-of-bounds write when using a \ncrafted compressed file. The other, CVE-2016-3189, is a potential \nuser-after-free.\n\n\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n1.0.6-7+deb8u1.\n\nWe recommend that you upgrade your bzip2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n", "edition": 9, "modified": "2019-06-24T20:25:30", "published": "2019-06-24T20:25:30", "id": "DEBIAN:DLA-1833-1:50B37", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201906/msg00021.html", "title": "[SECURITY] [DLA 1833-1] bzip2 security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T00:47:18", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900"], "description": "Package : bzip2\nVersion : 1.0.6-4+deb7u2\nCVE ID : CVE-2019-12900\n\n\n\nThe original fix for CVE-2019-12900 in bzip2, a high-quality \nblock-sorting file compressor, introduces regressions when extracting \ncertain lbzip2 files which were created with a buggy libzip2.\n\nPlease see https://bugs.debian.org/931278 for more information.\n\n\nFor Debian 8 "Jessie", this problem has been fixed in version\n1.0.6-4+deb7u2.\n\nWe recommend that you upgrade your bzip2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n", "edition": 7, "modified": "2019-07-18T20:30:31", "published": "2019-07-18T20:30:31", "id": "DEBIAN:DLA-1833-2:ADF1A", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201907/msg00014.html", "title": "[SECURITY] [DLA 1833-2] bzip2 regression update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T01:03:38", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "Package : clamav\nVersion : 0.101.4+dfsg-0+deb8u1\nCVE ID : CVE-2019-12625 CVE-2019-12900\nDebian Bug : 34359\n\nIt was discovered that clamav, the open source antivirus engine, is affected by\nthe following security vulnerabilities:\n\nCVE-2019-12625\n\n Denial of Service (DoS) vulnerability, resulting from excessively long scan\n times caused by non-recursive zip bombs. Among others, this issue was\n mitigated by introducing a scan time limit.\n\nCVE-2019-12900\n\n Out-of-bounds write in ClamAV's NSIS bzip2 library when attempting\n decompression in cases where the number of selectors exceeded the max limit\n set by the library.\n\nThis update triggers a transition from libclamav7 to libclama9. As a result,\nseveral other packages will be recompiled against the fixed package after the\nrelease of this update: dansguardian, havp, python-pyclamav, c-icap-modules.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n0.101.4+dfsg-0+deb8u1.\n\nWe recommend that you upgrade your clamav packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 9, "modified": "2019-10-10T10:52:27", "published": "2019-10-10T10:52:27", "id": "DEBIAN:DLA-1953-1:02211", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201910/msg00012.html", "title": "[SECURITY] [DLA 1953-1] clamav security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T00:47:18", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "Package : clamav\nVersion : 0.101.4+dfsg-0+deb8u2\nCVE ID : CVE-2019-12625 CVE-2019-12900\nDebian Bug : 942172\n\nThe update of clamav released as DLA 1953-1 led to permission issues on\n/var/run/clamav. This caused several users to experience issues restarting the\nclamav daemon. This regression is caused by a mistakenly backported patch from\nthe stretch package, upon which this update was based.\n\nFor Debian 8 "Jessie", this problem has been fixed in version\n0.101.4+dfsg-0+deb8u2.\n\nWe recommend that you upgrade your clamav packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 9, "modified": "2019-10-14T11:28:53", "published": "2019-10-14T11:28:53", "id": "DEBIAN:DLA-1953-2:E26E9", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201910/msg00018.html", "title": "[SECURITY] [DLA 1953-2] clamav regression update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:40:18", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "Aladdin Mubaied discovered that bzip2 incorrectly handled certain files. \nAn attacker could possibly use this issue to cause a denial of service. \nThis issue only affected Ubuntu 16.04 LTS. (CVE-2016-3189)\n\nIt was discovered that bzip2 incorrectly handled certain files. \nAn attacker could possibly use this issue to execute arbitrary code. \n(CVE-2019-12900)", "edition": 2, "modified": "2019-06-26T00:00:00", "published": "2019-06-26T00:00:00", "id": "USN-4038-1", "href": "https://ubuntu.com/security/notices/USN-4038-1", "title": "bzip2 vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:37:47", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "USN-4038-1 fixed several vulnerabilities in bzip2. This update provides \nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.\n\nOriginal advisory details:\n\nAladdin Mubaied discovered that bzip2 incorrectly handled certain files. \nAn attacker could possibly use this issue to cause a denial of service. \n(CVE-2016-3189)\n\nIt was discovered that bzip2 incorrectly handled certain files. \nAn attacker could possibly use this issue to execute arbitrary code. \n(CVE-2019-12900)", "edition": 2, "modified": "2019-06-26T00:00:00", "published": "2019-06-26T00:00:00", "id": "USN-4038-2", "href": "https://ubuntu.com/security/notices/USN-4038-2", "title": "bzip2 vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:37:01", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "It was discovered that ClamAV incorrectly handled unpacking ZIP files. A \nremote attacker could possibly use this issue to cause ClamAV to crash, \nresulting in a denial of service. (CVE-2019-12625)\n\nIt was discovered that ClamAV incorrectly handled unpacking bzip2 files. A \nremote attacker could use this issue to cause ClamAV to crash, resulting in \na denial of service, or possibly execute arbitrary code. (CVE-2019-12900)", "edition": 2, "modified": "2019-10-02T00:00:00", "published": "2019-10-02T00:00:00", "id": "USN-4146-1", "href": "https://ubuntu.com/security/notices/USN-4146-1", "title": "ClamAV vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:43:54", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "USN-4146-1 fixed several vulnerabilities in ClamAV. This update provides \nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.\n\nOriginal advisory details:\n\nIt was discovered that ClamAV incorrectly handled unpacking ZIP files. A \nremote attacker could possibly use this issue to cause ClamAV to crash, \nresulting in a denial of service. (CVE-2019-12625)\n\nIt was discovered that ClamAV incorrectly handled unpacking bzip2 files. A \nremote attacker could use this issue to cause ClamAV to crash, resulting in \na denial of service, or possibly execute arbitrary code. (CVE-2019-12900)", "edition": 2, "modified": "2019-10-03T00:00:00", "published": "2019-10-03T00:00:00", "id": "USN-4146-2", "href": "https://ubuntu.com/security/notices/USN-4146-2", "title": "ClamAV vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2020-10-24T05:15:40", "description": "New bzip2 packages are available for Slackware 14.0, 14.1, 14.2, and\n-current to fix security issues.", "edition": 15, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-07-15T00:00:00", "title": "Slackware 14.0 / 14.1 / 14.2 / current : bzip2 (SSA:2019-195-01)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "modified": "2019-07-15T00:00:00", "cpe": ["cpe:/o:slackware:slackware_linux:14.2", "cpe:/o:slackware:slackware_linux:14.1", "cpe:/o:slackware:slackware_linux:14.0", "cpe:/o:slackware:slackware_linux", "p-cpe:/a:slackware:slackware_linux:bzip2"], "id": "SLACKWARE_SSA_2019-195-01.NASL", "href": "https://www.tenable.com/plugins/nessus/126685", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2019-195-01. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126685);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/10/23\");\n\n script_cve_id(\"CVE-2016-3189\", \"CVE-2019-12900\");\n script_xref(name:\"SSA\", value:\"2019-195-01\");\n script_xref(name:\"IAVA\", value:\"2020-A-0482\");\n\n script_name(english:\"Slackware 14.0 / 14.1 / 14.2 / current : bzip2 (SSA:2019-195-01)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New bzip2 packages are available for Slackware 14.0, 14.1, 14.2, and\n-current to fix security issues.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2019&m=slackware-security.423144\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?22d21365\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bzip2 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/15\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"14.0\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"i486\", pkgnum:\"1_slack14.0\")) flag++;\nif (slackware_check(osver:\"14.0\", arch:\"x86_64\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.0\")) flag++;\n\nif (slackware_check(osver:\"14.1\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"i486\", pkgnum:\"1_slack14.1\")) flag++;\nif (slackware_check(osver:\"14.1\", arch:\"x86_64\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.1\")) flag++;\n\nif (slackware_check(osver:\"14.2\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"i586\", pkgnum:\"1_slack14.2\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.2\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"i586\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"bzip2\", pkgver:\"1.0.8\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-24T06:32:30", "description": "bzip2 developers reports :\n\nCVE-2016-3189 - Fix use-after-free in bzip2recover (Jakub Martisko)\n\nCVE-2019-12900 - Detect out-of-range nSelectors in corrupted files\n(Albert Astals Cid). Found through fuzzing karchive.", "edition": 15, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-07-01T00:00:00", "title": "FreeBSD : bzip2 -- multiple issues (4b6cb45d-881e-447a-a4e0-c97a954ea758)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "modified": "2019-07-01T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:bzip2"], "id": "FREEBSD_PKG_4B6CB45D881E447AA4E0C97A954EA758.NASL", "href": "https://www.tenable.com/plugins/nessus/126364", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2020 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126364);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/10/23\");\n\n script_cve_id(\"CVE-2016-3189\", \"CVE-2019-12900\");\n script_xref(name:\"IAVA\", value:\"2020-A-0482\");\n\n script_name(english:\"FreeBSD : bzip2 -- multiple issues (4b6cb45d-881e-447a-a4e0-c97a954ea758)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"bzip2 developers reports :\n\nCVE-2016-3189 - Fix use-after-free in bzip2recover (Jakub Martisko)\n\nCVE-2019-12900 - Detect out-of-range nSelectors in corrupted files\n(Albert Astals Cid). Found through fuzzing karchive.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://gitlab.com/federicomenaquintero/bzip2/blob/master/NEWS\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1319648\");\n # https://vuxml.freebsd.org/freebsd/4b6cb45d-881e-447a-a4e0-c97a954ea758.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b5d3122a\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/01\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"bzip2<1.0.7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-14T06:19:56", "description": "This update for bzip2 fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many\nselectors (bsc#1139083).\n\nCVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 16, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-07-24T00:00:00", "title": "SUSE SLED12 / SLES12 Security Update : bzip2 (SUSE-SU-2019:1955-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "modified": "2019-07-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libbz2", "cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:bzip2-debugsource", "p-cpe:/a:novell:suse_linux:libbz2-1-debuginfo", "p-cpe:/a:novell:suse_linux:bzip2-debuginfo", "p-cpe:/a:novell:suse_linux:libbz2-1", "p-cpe:/a:novell:suse_linux:bzip2"], "id": "SUSE_SU-2019-1955-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126985", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1955-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126985);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2016-3189\", \"CVE-2019-12900\");\n script_xref(name:\"IAVA\", value:\"2020-A-0482\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : bzip2 (SUSE-SU-2019:1955-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for bzip2 fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many\nselectors (bsc#1139083).\n\nCVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139083\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=985657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3189/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-12900/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191955-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f0e630cc\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 8:zypper in -t patch\nSUSE-OpenStack-Cloud-8-2019-1955=1\n\nSUSE OpenStack Cloud 7:zypper in -t patch\nSUSE-OpenStack-Cloud-7-2019-1955=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP5:zypper in -t\npatch SUSE-SLE-SDK-12-SP5-2019-1955=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP4:zypper in -t\npatch SUSE-SLE-SDK-12-SP4-2019-1955=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3:zypper in -t patch\nSUSE-SLE-SAP-12-SP3-2019-1955=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch\nSUSE-SLE-SAP-12-SP2-2019-1955=1\n\nSUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch\nSUSE-SLE-SAP-12-SP1-2019-1955=1\n\nSUSE Linux Enterprise Server 12-SP5:zypper in -t patch\nSUSE-SLE-SERVER-12-SP5-2019-1955=1\n\nSUSE Linux Enterprise Server 12-SP4:zypper in -t patch\nSUSE-SLE-SERVER-12-SP4-2019-1955=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2019-1955=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2019-1955=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-BCL-2019-1955=1\n\nSUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2019-1955=1\n\nSUSE Linux Enterprise Desktop 12-SP5:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP5-2019-1955=1\n\nSUSE Linux Enterprise Desktop 12-SP4:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP4-2019-1955=1\n\nSUSE Enterprise Storage 5:zypper in -t patch\nSUSE-Storage-5-2019-1955=1\n\nSUSE Enterprise Storage 4:zypper in -t patch\nSUSE-Storage-4-2019-1955=1\n\nSUSE CaaS Platform 3.0 :\n\nTo install this update, use the SUSE CaaS Platform Velum dashboard. It\nwill inform you if it detects new updates and let you then trigger\nupdating of the complete cluster in a controlled way.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:bzip2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:bzip2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2-1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2-1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(1|2|3|4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1/2/3/4/5\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP4/5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"bzip2-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"bzip2-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"bzip2-debugsource-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"libbz2-1-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"libbz2-1-debuginfo-1.0.6-30.5.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"5\", cpu:\"x86_64\", reference:\"libbz2-1-debuginfo-32bit-1.0.6-30.5.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-24T10:25:39", "description": "Aladdin Mubaied discovered that bzip2 incorrectly handled certain\nfiles. An attacker could possibly use this issue to cause a denial of\nservice. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3189)\n\nIt was discovered that bzip2 incorrectly handled certain files. An\nattacker could possibly use this issue to execute arbitrary code.\n(CVE-2019-12900).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 15, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-06-27T00:00:00", "title": "Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : bzip2 vulnerabilities (USN-4038-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "modified": "2019-06-27T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:bzip2", "cpe:/o:canonical:ubuntu_linux:18.10", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:19.04", "p-cpe:/a:canonical:ubuntu_linux:libbz2-1.0"], "id": "UBUNTU_USN-4038-1.NASL", "href": "https://www.tenable.com/plugins/nessus/126305", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4038-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126305);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/10/23\");\n\n script_cve_id(\"CVE-2016-3189\", \"CVE-2019-12900\");\n script_xref(name:\"USN\", value:\"4038-1\");\n script_xref(name:\"IAVA\", value:\"2020-A-0482\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : bzip2 vulnerabilities (USN-4038-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Aladdin Mubaied discovered that bzip2 incorrectly handled certain\nfiles. An attacker could possibly use this issue to cause a denial of\nservice. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3189)\n\nIt was discovered that bzip2 incorrectly handled certain files. An\nattacker could possibly use this issue to execute arbitrary code.\n(CVE-2019-12900).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://usn.ubuntu.com/4038-1/\");\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected bzip2 and / or libbz2-1.0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libbz2-1.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:19.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/27\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(16\\.04|18\\.04|18\\.10|19\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 16.04 / 18.04 / 18.10 / 19.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"bzip2\", pkgver:\"1.0.6-8ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"libbz2-1.0\", pkgver:\"1.0.6-8ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"bzip2\", pkgver:\"1.0.6-8.1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"libbz2-1.0\", pkgver:\"1.0.6-8.1ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"18.10\", pkgname:\"bzip2\", pkgver:\"1.0.6-9ubuntu0.18.10\")) flag++;\nif (ubuntu_check(osver:\"18.10\", pkgname:\"libbz2-1.0\", pkgver:\"1.0.6-9ubuntu0.18.10\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"bzip2\", pkgver:\"1.0.6-9ubuntu0.19.04\")) flag++;\nif (ubuntu_check(osver:\"19.04\", pkgname:\"libbz2-1.0\", pkgver:\"1.0.6-9ubuntu0.19.04\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2 / libbz2-1.0\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:14:58", "description": "CVE-2016-3189 bzip2: heap use after free in bzip2recover\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2017-01-03T00:00:00", "title": "Fedora 25 : bzip2 (2016-e7b46c92ae)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "modified": "2017-01-03T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:bzip2", "cpe:/o:fedoraproject:fedora:25"], "id": "FEDORA_2016-E7B46C92AE.NASL", "href": "https://www.tenable.com/plugins/nessus/96219", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-e7b46c92ae.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(96219);\n script_version(\"3.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3189\");\n script_xref(name:\"FEDORA\", value:\"2016-e7b46c92ae\");\n\n script_name(english:\"Fedora 25 : bzip2 (2016-e7b46c92ae)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2016-3189 bzip2: heap use after free in bzip2recover\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-e7b46c92ae\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bzip2 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"bzip2-1.0.6-21.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T09:01:24", "description": "According to the version of the bzip2 packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - Use-after-free vulnerability in bzip2recover in bzip2\n 1.0.6 allows remote attackers to cause a denial of\n service (crash) via a crafted bzip2 file, related to\n block ends set to before the start of the\n block.(CVE-2016-3189)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 10, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2019-12-19T00:00:00", "title": "EulerOS 2.0 SP3 : bzip2 (EulerOS-SA-2019-2560)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "modified": "2019-12-19T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:bzip2-devel", "p-cpe:/a:huawei:euleros:bzip2-libs", "p-cpe:/a:huawei:euleros:bzip2", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2560.NASL", "href": "https://www.tenable.com/plugins/nessus/132277", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132277);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2016-3189\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : bzip2 (EulerOS-SA-2019-2560)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the bzip2 packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - Use-after-free vulnerability in bzip2recover in bzip2\n 1.0.6 allows remote attackers to cause a denial of\n service (crash) via a crafted bzip2 file, related to\n block ends set to before the start of the\n block.(CVE-2016-3189)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2560\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?812857a0\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected bzip2 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bzip2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bzip2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"bzip2-1.0.6-13.h4\",\n \"bzip2-devel-1.0.6-13.h4\",\n \"bzip2-libs-1.0.6-13.h4\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-09-23T16:32:37", "description": "This update for bzip2 fixes the following issues :\n\nSecurity issue fixed :\n\n - CVE-2016-3189: Fixed a use-after-free in bzip2recover\n (bsc#985657).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "edition": 14, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2019-05-16T00:00:00", "title": "openSUSE Security Update : bzip2 (openSUSE-2019-1398)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "modified": "2019-05-16T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:bzip2", "p-cpe:/a:novell:opensuse:libbz2-1-32bit-debuginfo", "cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:bzip2-debuginfo", "p-cpe:/a:novell:opensuse:bzip2-debugsource", "p-cpe:/a:novell:opensuse:libbz2-1-debuginfo", "p-cpe:/a:novell:opensuse:libbz2-devel", "p-cpe:/a:novell:opensuse:libbz2-1", "p-cpe:/a:novell:opensuse:libbz2-devel-32bit", "p-cpe:/a:novell:opensuse:libbz2-1-32bit"], "id": "OPENSUSE-2019-1398.NASL", "href": "https://www.tenable.com/plugins/nessus/125211", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1398.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125211);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/22\");\n\n script_cve_id(\"CVE-2016-3189\");\n\n script_name(english:\"openSUSE Security Update : bzip2 (openSUSE-2019-1398)\");\n script_summary(english:\"Check for the openSUSE-2019-1398 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for bzip2 fixes the following issues :\n\nSecurity issue fixed :\n\n - CVE-2016-3189: Fixed a use-after-free in bzip2recover\n (bsc#985657).\n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=985657\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected bzip2 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bzip2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bzip2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libbz2-1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libbz2-1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libbz2-1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libbz2-1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libbz2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libbz2-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"bzip2-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"bzip2-debuginfo-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"bzip2-debugsource-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libbz2-1-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libbz2-1-debuginfo-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libbz2-devel-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-debuginfo-1.0.6-lp150.4.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libbz2-devel-32bit-1.0.6-lp150.4.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2 / bzip2-debuginfo / bzip2-debugsource / libbz2-1 / etc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T09:00:52", "description": "According to the version of the bzip2 packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - Use-after-free vulnerability in bzip2recover in bzip2\n 1.0.6 allows remote attackers to cause a denial of\n service (crash) via a crafted bzip2 file, related to\n block ends set to before the start of the\n block.(CVE-2016-3189)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 10, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2019-12-10T00:00:00", "title": "EulerOS 2.0 SP2 : bzip2 (EulerOS-SA-2019-2411)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "modified": "2019-12-10T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:bzip2-devel", "p-cpe:/a:huawei:euleros:bzip2-libs", "p-cpe:/a:huawei:euleros:bzip2", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2411.NASL", "href": "https://www.tenable.com/plugins/nessus/131903", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131903);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2016-3189\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : bzip2 (EulerOS-SA-2019-2411)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the bzip2 packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - Use-after-free vulnerability in bzip2recover in bzip2\n 1.0.6 allows remote attackers to cause a denial of\n service (crash) via a crafted bzip2 file, related to\n block ends set to before the start of the\n block.(CVE-2016-3189)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2411\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1702f73f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected bzip2 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bzip2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:bzip2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"bzip2-1.0.6-13.h4\",\n \"bzip2-devel-1.0.6-13.h4\",\n \"bzip2-libs-1.0.6-13.h4\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T11:06:19", "description": "The remote host is affected by the vulnerability described in GLSA-201708-08\n(bzip2: Denial of Service)\n\n A use-after-free flaw was found in bzip2recover, leading to a null\n pointer dereference, or a write to a closed file descriptor. Please\n review the CVE identifier referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to process a specially crafted\n bzip2 archive using bzip2recover, possibly resulting in a Denial of\n Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 23, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2017-08-21T00:00:00", "title": "GLSA-201708-08 : bzip2: Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "modified": "2017-08-21T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:bzip2"], "id": "GENTOO_GLSA-201708-08.NASL", "href": "https://www.tenable.com/plugins/nessus/102620", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201708-08.\n#\n# The advisory text is Copyright (C) 2001-2017 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(102620);\n script_version(\"3.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3189\");\n script_xref(name:\"GLSA\", value:\"201708-08\");\n\n script_name(english:\"GLSA-201708-08 : bzip2: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201708-08\n(bzip2: Denial of Service)\n\n A use-after-free flaw was found in bzip2recover, leading to a null\n pointer dereference, or a write to a closed file descriptor. Please\n review the CVE identifier referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to process a specially crafted\n bzip2 archive using bzip2recover, possibly resulting in a Denial of\n Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201708-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All bzip2 users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-arch/bzip2-1.0.6-r8'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/08/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"app-arch/bzip2\", unaffected:make_list(\"ge 1.0.6-r8\"), vulnerable:make_list(\"lt 1.0.6-r8\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-14T06:18:04", "description": "This update for bzip2 fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 18, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "published": "2019-07-05T00:00:00", "title": "SUSE SLED15 / SLES15 Security Update : bzip2 (SUSE-SU-2019:1206-2)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "modified": "2019-07-05T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libbz2", "p-cpe:/a:novell:suse_linux:bzip2-debugsource", "p-cpe:/a:novell:suse_linux:libbz2-1-32bit-debuginfo", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:libbz2-1-debuginfo", "p-cpe:/a:novell:suse_linux:bzip2-debuginfo", "p-cpe:/a:novell:suse_linux:libbz2-1", "p-cpe:/a:novell:suse_linux:libbz2-devel", "p-cpe:/a:novell:suse_linux:bzip2"], "id": "SUSE_SU-2019-1206-2.NASL", "href": "https://www.tenable.com/plugins/nessus/126493", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1206-2.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126493);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2016-3189\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : bzip2 (SUSE-SU-2019:1206-2)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for bzip2 fixes the following issues :\n\nSecurity issue fixed :\n\nCVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=985657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-3189/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191206-2/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0363ac3c\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1206=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-SP1-2019-1206=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:bzip2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:bzip2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:bzip2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2-1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2-1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2-1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libbz2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-debuginfo-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libbz2-devel-32bit-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"bzip2-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"bzip2-debuginfo-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"bzip2-debugsource-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libbz2-1-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libbz2-1-debuginfo-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libbz2-devel-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libbz2-1-32bit-debuginfo-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libbz2-devel-32bit-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"bzip2-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"bzip2-debuginfo-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"bzip2-debugsource-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libbz2-1-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libbz2-1-debuginfo-1.0.6-5.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libbz2-devel-1.0.6-5.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bzip2\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "cloudfoundry": [{"lastseen": "2019-08-30T04:36:48", "bulletinFamily": "software", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "# \n\n## Severity\n\nMedium\n\n## Vendor\n\nCanonical Ubuntu\n\n## Versions Affected\n\n * Canonical Ubuntu 16.04\n * Canonical Ubuntu 18.04\n\n## Description\n\nUSN-4038-1 fixed a vulnerability in bzip2. The update introduced a regression causing bzip2 to incorrect raises CRC errors for some files.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.\n\nCVEs contained in this USN include: CVE-2016-3189, CVE-2019-12900\n\n## Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH xenial-stemcells are vulnerable, including: \n * 315.x versions prior to 315.70\n * 250.x versions prior to 250.82\n * 170.x versions prior to 170.109\n * 97.x versions prior to 97.134\n * All other stemcells not listed.\n * All versions of Cloud Foundry cflinuxfs3 prior to 0.111.0\n\n## Mitigation\n\nUsers of affected products are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH xenial-stemcells: \n * Upgrade 315.x versions to 315.70\n * Upgrade 250.x versions to 250.82\n * Upgrade 170.x versions to 170.109\n * Upgrade 97.x versions to 97.134\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io/stemcells/#ubuntu-xenial>).\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs3 version 0.111.0 or later.\n\n## References\n\n * [USN-4038-3](<https://usn.ubuntu.com/4038-3>)\n * [CVE-2016-3189](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189>)\n * [CVE-2019-12900](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12900>)\n", "edition": 1, "modified": "2019-08-29T00:00:00", "published": "2019-08-29T00:00:00", "id": "CFOUNDRY:EDF01D8490471510F59758370F85EB1F", "href": "https://www.cloudfoundry.org/blog/usn-4038-3/", "title": "USN-4038-3: bzip2 regression | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-30T04:36:53", "bulletinFamily": "software", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "# \n\n## Severity\n\nMedium\n\n## Vendor\n\nCanonical Ubuntu\n\n## Versions Affected\n\n * Canonical Ubuntu 14.04\n\n## Description\n\nUSN-4038-1 fixed a vulnerability in bzip2. The update introduced a regression causing bzip2 to incorrect raises CRC errors for some files. This update provides the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nIt was discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.\n\nCVEs contained in this USN include: CVE-2016-3189, CVE-2019-12900\n\n## Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH trusty-stemcells are vulnerable, including: \n * 3586.x versions prior to 3586.144\n * 3541.x versions prior to 3541.138\n * 3468.x versions prior to 3468.145\n * All other stemcells not listed.\n\n## Mitigation\n\nUsers of affected products are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH trusty-stemcells: \n * Upgrade 3586.x versions to 3586.144\n * Upgrade 3541.x versions to 3541.138\n * Upgrade 3468.x versions to 3468.145\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io/stemcells/#ubuntu-trusty>).\n\n## References\n\n * [USN-4038-4](<https://usn.ubuntu.com/4038-4>)\n * [CVE-2016-3189](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189>)\n * [CVE-2019-12900](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-12900>)\n", "edition": 1, "modified": "2019-08-29T00:00:00", "published": "2019-08-29T00:00:00", "id": "CFOUNDRY:8D2E715ABF4E942D38CD92E026D73DA9", "href": "https://www.cloudfoundry.org/blog/usn-4038-4/", "title": "USN-4038-4: bzip2 regression | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2020-01-29T19:29:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "The remote host is missing an update for the ", "modified": "2020-01-29T00:00:00", "published": "2019-06-25T00:00:00", "id": "OPENVAS:1361412562310891833", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891833", "type": "openvas", "title": "Debian LTS: Security Advisory for bzip2 (DLA-1833-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891833\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2016-3189\", \"CVE-2019-12900\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-06-25 02:00:11 +0000 (Tue, 25 Jun 2019)\");\n script_name(\"Debian LTS: Security Advisory for bzip2 (DLA-1833-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-1833-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bzip2'\n package(s) announced via the DLA-1833-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Two issues in bzip2, a high-quality block-sorting file compressor, have\nbeen fixed. One, CVE-2019-12900, is a out-of-bounds write when using a\ncrafted compressed file. The other, CVE-2016-3189, is a potential\nuser-after-free.\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n1.0.6-7+deb8u1.\n\nWe recommend that you upgrade your bzip2 packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"bzip2\", ver:\"1.0.6-7+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"bzip2-doc\", ver:\"1.0.6-7+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbz2-1.0\", ver:\"1.0.6-7+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbz2-dev\", ver:\"1.0.6-7+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-06-27T14:43:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-12900", "CVE-2016-3189"], "description": "The remote host is missing an update for the ", "modified": "2019-06-27T00:00:00", "published": "2019-06-27T00:00:00", "id": "OPENVAS:1361412562310844073", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844073", "type": "openvas", "title": "Ubuntu Update for bzip2 USN-4038-1", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844073\");\n script_version(\"2019-06-27T06:30:18+0000\");\n script_cve_id(\"CVE-2016-3189\", \"CVE-2019-12900\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-06-27 06:30:18 +0000 (Thu, 27 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-06-27 02:00:40 +0000 (Thu, 27 Jun 2019)\");\n script_name(\"Ubuntu Update for bzip2 USN-4038-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU18\\.10|UBUNTU19\\.04|UBUNTU18\\.04 LTS|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4038-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2019-June/004983.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bzip2'\n package(s) announced via the USN-4038-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Aladdin Mubaied discovered that bzip2 incorrectly handled certain files.\nAn attacker could possibly use this issue to cause a denial of service.\nThis issue only affected Ubuntu 16.04 LTS. (CVE-2016-3189)\n\nIt was discovered that bzip2 incorrectly handled certain files.\nAn attacker could possibly use this issue to execute arbitrary code.\n(CVE-2019-12900)\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on Ubuntu 19.04, Ubuntu 18.10, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"bzip2\", ver:\"1.0.6-9ubuntu0.18.10\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"libbz2-1.0\", ver:\"1.0.6-9ubuntu0.18.10\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU19.04\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"bzip2\", ver:\"1.0.6-9ubuntu0.19.04\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"libbz2-1.0\", ver:\"1.0.6-9ubuntu0.19.04\", rls:\"UBUNTU19.04\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"bzip2\", ver:\"1.0.6-8.1ubuntu0.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"libbz2-1.0\", ver:\"1.0.6-8.1ubuntu0.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"bzip2\", ver:\"1.0.6-8ubuntu0.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"libbz2-1.0\", ver:\"1.0.6-8ubuntu0.1\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:30:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2020-01-09T00:00:00", "id": "OPENVAS:1361412562310852824", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852824", "type": "openvas", "title": "openSUSE: Security Advisory for bzip2 (openSUSE-SU-2019:1435-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852824\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-09 09:33:35 +0000 (Thu, 09 Jan 2020)\");\n script_name(\"openSUSE: Security Advisory for bzip2 (openSUSE-SU-2019:1435-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:1435-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00056.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bzip2'\n package(s) announced via the openSUSE-SU-2019:1435-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for bzip2 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2019-1435=1\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-debuginfo\", rpm:\"bzip2-debuginfo~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-debugsource\", rpm:\"bzip2-debugsource~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1\", rpm:\"libbz2-1~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1-debuginfo\", rpm:\"libbz2-1-debuginfo~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-devel\", rpm:\"libbz2-devel~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1-32bit\", rpm:\"libbz2-1-32bit~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1-32bit-debuginfo\", rpm:\"libbz2-1-32bit-debuginfo~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-devel-32bit\", rpm:\"libbz2-devel-32bit~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"zip2-doc\", rpm:\"zip2-doc~1.0.6~lp151.5.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:34:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-01-05T00:00:00", "id": "OPENVAS:1361412562310872227", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872227", "type": "openvas", "title": "Fedora Update for bzip2 FEDORA-2016-fd44637912", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for bzip2 FEDORA-2016-fd44637912\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872227\");\n script_version(\"$Revision: 14225 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 15:32:03 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-01-05 05:43:37 +0100 (Thu, 05 Jan 2017)\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for bzip2 FEDORA-2016-fd44637912\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bzip2'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"bzip2 on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-fd44637912\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LPAFGSN4GP2TOBFVQ5Y2BCQXQBULNUJT\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~21.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-01-31T16:47:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-05-16T00:00:00", "id": "OPENVAS:1361412562310852500", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852500", "type": "openvas", "title": "openSUSE: Security Advisory for bzip2 (openSUSE-SU-2019:1398-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852500\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-05-16 02:01:33 +0000 (Thu, 16 May 2019)\");\n script_name(\"openSUSE: Security Advisory for bzip2 (openSUSE-SU-2019:1398-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:1398-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00035.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bzip2'\n package(s) announced via the openSUSE-SU-2019:1398-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for bzip2 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-1398=1\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-debuginfo\", rpm:\"bzip2-debuginfo~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-debugsource\", rpm:\"bzip2-debugsource~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1\", rpm:\"libbz2-1~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1-debuginfo\", rpm:\"libbz2-1-debuginfo~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-devel\", rpm:\"libbz2-devel~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-doc\", rpm:\"bzip2-doc~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1-32bit\", rpm:\"libbz2-1-32bit~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-1-32bit-debuginfo\", rpm:\"libbz2-1-32bit-debuginfo~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libbz2-devel-32bit\", rpm:\"libbz2-devel-32bit~1.0.6~lp150.4.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-01-27T18:39:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192411", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192411", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-2411)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2411\");\n script_version(\"2020-01-23T12:53:58+0000\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:53:58 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:53:58 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-2411)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2411\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2411\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'bzip2' package(s) announced via the EulerOS-SA-2019-2411 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.(CVE-2016-3189)\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~13.h4\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-devel\", rpm:\"bzip2-devel~1.0.6~13.h4\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-libs\", rpm:\"bzip2-libs~1.0.6~13.h4\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-01-27T18:34:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191171", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191171", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-1171)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1171\");\n script_version(\"2020-01-23T11:33:33+0000\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:33:33 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:33:33 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-1171)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1171\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1171\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'bzip2' package(s) announced via the EulerOS-SA-2019-1171 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A use-after-free flaw was found in bzip2recover, leading to a null pointer dereference, or a write to a closed file descriptor. An attacker could use this flaw by sending a specially crafted bzip2 file to recover and force the program to crash.CVE-2016-3189\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on Huawei EulerOS Virtualization 2.5.3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~14\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-devel\", rpm:\"bzip2-devel~1.0.6~14\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-libs\", rpm:\"bzip2-libs~1.0.6~14\", rls:\"EULEROSVIRT-2.5.3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:33:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-01-04T00:00:00", "id": "OPENVAS:1361412562310872225", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872225", "type": "openvas", "title": "Fedora Update for bzip2 FEDORA-2016-e7b46c92ae", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for bzip2 FEDORA-2016-e7b46c92ae\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872225\");\n script_version(\"$Revision: 14225 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 15:32:03 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-01-04 09:02:24 +0100 (Wed, 04 Jan 2017)\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for bzip2 FEDORA-2016-e7b46c92ae\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bzip2'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"bzip2 on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-e7b46c92ae\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7XQQQRY3FVJNFKTLVBR5TCFPQB3YYFUI\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~21.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-01-27T18:39:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192560", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192560", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-2560)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2560\");\n script_version(\"2020-01-23T13:06:30+0000\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 13:06:30 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 13:06:30 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-2560)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2560\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2560\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'bzip2' package(s) announced via the EulerOS-SA-2019-2560 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.(CVE-2016-3189)\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~13.h4\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-devel\", rpm:\"bzip2-devel~1.0.6~13.h4\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-libs\", rpm:\"bzip2-libs~1.0.6~13.h4\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-01-27T18:37:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3189"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191020", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191020", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-1020)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1020\");\n script_version(\"2020-01-23T11:27:48+0000\");\n script_cve_id(\"CVE-2016-3189\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:27:48 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:27:48 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for bzip2 (EulerOS-SA-2019-1020)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1020\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1020\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'bzip2' package(s) announced via the EulerOS-SA-2019-1020 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A use-after-free flaw was found in bzip2recover, leading to a null pointer dereference, or a write to a closed file descriptor. An attacker could use this flaw by sending a specially crafted bzip2 file to recover and force the program to crash.(CVE-2016-3189)\");\n\n script_tag(name:\"affected\", value:\"'bzip2' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2\", rpm:\"bzip2~1.0.6~14.h1.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-devel\", rpm:\"bzip2-devel~1.0.6~14.h1.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bzip2-libs\", rpm:\"bzip2-libs~1.0.6~14.h1.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "suse": [{"lastseen": "2019-05-23T02:31:26", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189"], "description": "This update for bzip2 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-05-23T00:10:23", "published": "2019-05-23T00:10:23", "id": "OPENSUSE-SU-2019:1435-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00056.html", "title": "Security update for bzip2 (low)", "type": "suse", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-15T22:20:31", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189"], "description": "This update for bzip2 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-05-15T21:10:36", "published": "2019-05-15T21:10:36", "id": "OPENSUSE-SU-2019:1398-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00035.html", "title": "Security update for bzip2 (low)", "type": "suse", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-08-15T16:32:17", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900"], "description": "This update for bzip2 fixes the following issues:\n\n - Fixed a regression with the fix for CVE-2019-12900, which caused\n incompatibilities with files that used many selectors (bsc#1139083).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-08-15T15:27:53", "published": "2019-08-15T15:27:53", "id": "OPENSUSE-SU-2019:1918-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html", "title": "Security update for bzip2 (important)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-21T13:42:45", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900"], "description": "This update for bzip2 fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many\n selectors (bsc#1139083).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-07-21T12:26:52", "published": "2019-07-21T12:26:52", "id": "OPENSUSE-SU-2019:1781-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html", "title": "Security update for bzip2 (important)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-01T03:24:52", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "This update for clamav fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and\n heuristics for zips with overlapping files (bsc#1144504).\n - CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many\n selectors (bsc#1149458).\n\n Non-security issues fixed:\n\n - Added the --max-scantime clamscan option and MaxScanTime clamd\n configuration option (bsc#1144504).\n - Increased the startup timeout of clamd to 5 minutes to cater for the\n grown virus database as a workaround until clamd has learned to talk to\n systemd to extend the timeout as long as needed (bsc#1151839).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-12-01T00:13:17", "published": "2019-12-01T00:13:17", "id": "OPENSUSE-SU-2019:2595-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html", "title": "Security update for clamav (moderate)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-01T09:26:06", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12900", "CVE-2019-12625"], "description": "This update for clamav fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2019-12625: Fixed a ZIP bomb issue by adding detection and\n heuristics for zips with overlapping files (bsc#1144504).\n - CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many\n selectors (bsc#1149458).\n\n Non-security issues fixed:\n\n - Added the --max-scantime clamscan option and MaxScanTime clamd\n configuration option (bsc#1144504).\n - Increased the startup timeout of clamd to 5 minutes to cater for the\n grown virus database as a workaround until clamd has learned to talk to\n systemd to extend the timeout as long as needed (bsc#1151839).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-12-01T06:10:56", "published": "2019-12-01T06:10:56", "id": "OPENSUSE-SU-2019:2597-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html", "title": "Security update for clamav (moderate)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:43", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189"], "description": "Arch Linux Security Advisory ASA-201702-19\n==========================================\n\nSeverity: Low\nDate : 2017-02-22\nCVE-ID : CVE-2016-3189\nPackage : bzip2\nType : denial of service\nRemote : No\nLink : https://security.archlinux.org/AVG-4\n\nSummary\n=======\n\nThe package bzip2 before version 1.0.6-6 is vulnerable to denial of\nservice.\n\nResolution\n==========\n\nUpgrade to 1.0.6-6.\n\n# pacman -Syu \"bzip2>=1.0.6-6\"\n\nThe problem has been fixed upstream but no release is available yet.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\nA use-after-free flaw was found in bzip2recover, leading to a null\npointer dereference, or a write to a closed file descriptor. An\nattacker could use this flaw by sending a specially crafted bzip2 file\nto recover and force the program to crash.\n\nImpact\n======\n\nAn attacker is able to create a specially crafted bzip2 archive that,\nwhen processed by bzip2recover, crashes the process resulting in denial\nof service.\n\nReferences\n==========\n\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1319648\nhttps://security.archlinux.org/CVE-2016-3189", "modified": "2017-02-22T00:00:00", "published": "2017-02-22T00:00:00", "id": "ASA-201702-19", "href": "https://security.archlinux.org/ASA-201702-19", "type": "archlinux", "title": "[ASA-201702-19] bzip2: denial of service", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "gentoo": [{"lastseen": "2017-08-21T05:11:11", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189"], "description": "### Background\n\nbzip2 is a high-quality data compressor used extensively by Gentoo Linux. \n\n### Description\n\nA use-after-free flaw was found in bzip2recover, leading to a null pointer dereference, or a write to a closed file descriptor. Please review the CVE identifier referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to process a specially crafted bzip2 archive using bzip2recover, possibly resulting in a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll bzip2 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-arch/bzip2-1.0.6-r8\"", "edition": 1, "modified": "2017-08-21T00:00:00", "published": "2017-08-21T00:00:00", "href": "https://security.gentoo.org/glsa/201708-08", "id": "GLSA-201708-08", "title": "bzip2: Denial of Service", "type": "gentoo", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189"], "description": "Bzip2 is a freely available, patent-free, high quality data compressor. Bzip2 compresses files to within 10 to 15 percent of the capabilities of the best techniques available. However, bzip2 has the added benefit of being approximately two times faster at compression and six times faster at decompression than those techniques. Bzip2 is not the fastest compression utility, but it does strike a balance between speed and compression capability. Install bzip2 if you need a compression utility. ", "modified": "2017-01-04T21:22:39", "published": "2017-01-04T21:22:39", "id": "FEDORA:5193D601D83F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: bzip2-1.0.6-21.fc24", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3189"], "description": "Bzip2 is a freely available, patent-free, high quality data compressor. Bzip2 compresses files to within 10 to 15 percent of the capabilities of the best techniques available. However, bzip2 has the added benefit of being approximately two times faster at compression and six times faster at decompression than those techniques. Bzip2 is not the fastest compression utility, but it does strike a balance between speed and compression capability. Install bzip2 if you need a compression utility. ", "modified": "2017-01-02T19:53:02", "published": "2017-01-02T19:53:02", "id": "FEDORA:74188606156B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: bzip2-1.0.6-21.fc25", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12625", "CVE-2019-12900"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2019-08-26T00:53:33", "published": "2019-08-26T00:53:33", "id": "FEDORA:4FD25605CB4A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 30 Update: clamav-0.101.4-1.fc30", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12625", "CVE-2019-12900"], "description": "Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. The virus database is based on the virus database from OpenAntiVirus, but contains additional signatures (including signatures for popular polymorphic viruses, too) and is KEPT UP TO DATE. ", "modified": "2019-09-01T07:04:35", "published": "2019-09-01T07:04:35", "id": "FEDORA:1622360151B7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: clamav-0.101.4-1.fc29", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}