ID CVE-2017-2026 Type cve Reporter cve@mitre.org Modified 2018-01-05T14:29:00
Description
REJECT DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.
{"id": "CVE-2017-2026", "bulletinFamily": "NVD", "title": "CVE-2017-2026", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.", "published": "2018-01-05T14:29:00", "modified": "2018-01-05T14:29:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-2026", "reporter": "cve@mitre.org", "references": [], "cvelist": ["CVE-2017-2026"], "type": "cve", "lastseen": "2020-10-03T13:07:41", "edition": 2, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "freebsd", "idList": ["4B9CA994-E3D9-11E6-813D-E8E0B747A45A"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_4B9CA994E3D911E6813DE8E0B747A45A.NASL"]}], "modified": "2020-10-03T13:07:41", "rev": 2}, "score": {"value": 0.5, "vector": "NONE", "modified": "2020-10-03T13:07:41", "rev": 2}, "vulnersScore": 0.5}, "cpe": [], "affectedSoftware": [], "cvss2": {}, "cvss3": {}, "cpe23": [], "cwe": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": []}, "scheme": null, "immutableFields": []}
{"freebsd": [{"lastseen": "2019-05-29T18:32:22", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5012", "CVE-2017-5009", "CVE-2017-2020", "CVE-2017-2025", "CVE-2017-2023", "CVE-2017-5019", "CVE-2017-5014", "CVE-2017-2024", "CVE-2017-5017", "CVE-2017-5007", "CVE-2017-2026", "CVE-2017-5011", "CVE-2017-5016", "CVE-2017-2021", "CVE-2017-5015", "CVE-2017-5010", "CVE-2017-5013", "CVE-2017-5008", "CVE-2017-2022", "CVE-2017-5018", "CVE-2017-5006"], "description": "\nGoogle Chrome Releases reports:\n\n51 security fixes in this release\nPlease reference CVE/URL list for details\n\n", "edition": 6, "modified": "2017-01-25T00:00:00", "published": "2017-01-25T00:00:00", "id": "4B9CA994-E3D9-11E6-813D-E8E0B747A45A", "href": "https://vuxml.freebsd.org/freebsd/4b9ca994-e3d9-11e6-813d-e8e0b747a45a.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-06T10:50:47", "description": "Google Chrome Releases reports :\n\n51 security fixes in this release\n\nPlease reference CVE/URL list for details", "edition": 29, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2017-01-27T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (4b9ca994-e3d9-11e6-813d-e8e0b747a45a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5012", "CVE-2017-5009", "CVE-2017-2020", "CVE-2017-2025", "CVE-2017-2023", "CVE-2017-5019", "CVE-2017-5014", "CVE-2017-2024", "CVE-2017-5017", "CVE-2017-5007", "CVE-2017-2026", "CVE-2017-5011", "CVE-2017-5016", "CVE-2017-2021", "CVE-2017-5015", "CVE-2017-5010", "CVE-2017-5013", "CVE-2017-5008", "CVE-2017-2022", "CVE-2017-5018", "CVE-2017-5006"], "modified": "2017-01-27T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium-npapi", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_4B9CA994E3D911E6813DE8E0B747A45A.NASL", "href": "https://www.tenable.com/plugins/nessus/96820", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(96820);\n script_version(\"3.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-2020\", \"CVE-2017-2021\", \"CVE-2017-2022\", \"CVE-2017-2023\", \"CVE-2017-2024\", \"CVE-2017-2025\", \"CVE-2017-2026\", \"CVE-2017-5006\", \"CVE-2017-5007\", \"CVE-2017-5008\", \"CVE-2017-5009\", \"CVE-2017-5010\", \"CVE-2017-5011\", \"CVE-2017-5012\", \"CVE-2017-5013\", \"CVE-2017-5014\", \"CVE-2017-5015\", \"CVE-2017-5016\", \"CVE-2017-5017\", \"CVE-2017-5018\", \"CVE-2017-5019\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (4b9ca994-e3d9-11e6-813d-e8e0b747a45a)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n51 security fixes in this release\n\nPlease reference CVE/URL list for details\"\n );\n # https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fcdefa5b\"\n );\n # https://vuxml.freebsd.org/freebsd/4b9ca994-e3d9-11e6-813d-e8e0b747a45a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c521e858\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<56.0.2924.76\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<56.0.2924.76\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<56.0.2924.76\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}