Lucene search

K
nessusThis script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.AIX_SUID_ADVISORY_BOS_ACCT.NASL
HistoryAug 17, 2018 - 12:00 a.m.

AIX bos.acct Advisory : suid_advisory.asc (IV97810) (IV97811) (IV97896) (IV97897) (IV97898) (IV97899) (IV97900) (IV97901)

2018-08-1700:00:00
This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
28

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

12.6%

The version of bos_acct installed on the remote AIX host is affected by a privilege escalation vulnerability. A local attacker can exploit this to gain root privileges.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(111970);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/04/21");

  script_cve_id("CVE-2017-1692");

  script_name(english:"AIX bos.acct Advisory : suid_advisory.asc (IV97810) (IV97811) (IV97896) (IV97897) (IV97898) (IV97899) (IV97900) (IV97901)");
  script_summary(english:"Checks the version of the bos.acct packages.");

  script_set_attribute(attribute:"synopsis", value:
"The remote AIX host has a version of bos.acct installed that is
affected by a privilege escalation vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of bos_acct installed on the remote AIX host is affected
by a privilege escalation vulnerability. A local attacker can exploit
this to gain root privileges.");
  script_set_attribute(attribute:"see_also", value:"https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc");
  script_set_attribute(attribute:"solution", value:
"A fix is available and can be downloaded from the IBM AIX website.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-1692");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/02/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/02/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/17");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:bos_acct:bos_acct");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"AIX Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");

  exit(0);
}

include("aix.inc");
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
oslevel = get_kb_item("Host/AIX/version");
if (isnull(oslevel)) audit(AUDIT_UNKNOWN_APP_VER, "AIX");
oslevel = oslevel - "AIX-";

oslevelcomplete = chomp(get_kb_item("Host/AIX/oslevelsp"));
if (isnull(oslevelcomplete)) audit(AUDIT_UNKNOWN_APP_VER, "AIX");
oslevelparts = split(oslevelcomplete, sep:'-', keep:0);
if ( max_index(oslevelparts) != 4 ) audit(AUDIT_UNKNOWN_APP_VER, "AIX");
ml = oslevelparts[1];
sp = oslevelparts[2];

if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);

if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This AIX package check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );

flag = 0;

aix_bos_acct_vulns = {
  "7.1": {
    "04": {
      "03": {
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.1.4.0",
            "maxfilesetver":"7.1.4.30",
            "patch":"(IV97896s4a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.1.4.0",
            "maxfilesetver":"7.1.4.30",
            "patch":"(IV97899s4a)"
          }
        }
      },
      "04": {
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.1.4.0",
            "maxfilesetver":"7.1.4.30",
            "patch":"(IV97896s4a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.1.4.0",
            "maxfilesetver":"7.1.4.30",
            "patch":"(IV97899s4a)"
          }
        }
      },
      "05": {
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.1.4.0",
            "maxfilesetver":"7.1.4.30",
            "patch":"(IV97896s4a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.1.4.0",
            "maxfilesetver":"7.1.4.30",
            "patch":"(IV97899s4a)"
          }
        }
      }
    }
  },
  "7.2": {
   "00": {
      "03": {
        "caccelstat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.2",
            "patch":"(IV97811s2a)"
          }
        },
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.3",
            "patch":"(IV97898s2a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.3",
            "patch":"(IV97901s2a)"
          }
        }
      },
      "04": {
        "caccelstat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.2",
            "patch":"(IV97811s2a)"
          }
        },
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.3",
            "patch":"(IV97898s2a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.3",
            "patch":"(IV97901s2a)"
          }
        }
      },
      "05": {
        "caccelstat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.2",
            "patch":"(IV97811s2a)"
          }
        },
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.3",
            "patch":"(IV97898s2a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.2.0.0",
            "maxfilesetver":"7.2.0.3",
            "patch":"(IV97901s2a)"
          }
        }
      }
   },
   "01": {
      "01": {
        "caccelstat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.0",
            "patch":"(IV97811s2a)"
          }
        },
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.1",
            "patch":"(IV97898s2a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.1",
            "patch":"(IV97901s2a)"
          }
        }
      },
      "02": {
        "caccelstat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.0",
            "patch":"(IV97811s2a)"
          }
        },
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.1",
            "patch":"(IV97898s2a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.1",
            "patch":"(IV97901s2a)"
          }
        }
      },
      "03": {
        "caccelstat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.0",
            "patch":"(IV97811s2a)"
          }
        },
        "iostat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.1",
            "patch":"(IV97898s2a)"
          }
        },
        "vmstat": {
          "bos.acct": {
            "minfilesetver":"7.2.1.0",
            "maxfilesetver":"7.2.1.1",
            "patch":"(IV97901s2a)"
          }
        }
      }
    }
  }
};

version_report = "AIX " + oslevel;
if ( empty_or_null(aix_bos_acct_vulns[oslevel]) ) {
  os_options = join( sort( keys(aix_bos_acct_vulns) ), sep:' / ' );
  audit(AUDIT_OS_NOT, os_options, version_report);
}

version_report = version_report + " ML " + ml;
if ( empty_or_null(aix_bos_acct_vulns[oslevel][ml]) ) {
  ml_options = join( sort( keys(aix_bos_acct_vulns[oslevel]) ), sep:' / ' );
  audit(AUDIT_OS_NOT, "ML " + ml_options, version_report);
}

version_report = version_report + " SP " + sp;
if ( empty_or_null(aix_bos_acct_vulns[oslevel][ml][sp]) ) {
  sp_options = join( sort( keys(aix_bos_acct_vulns[oslevel][ml]) ), sep:' / ' );
  audit(AUDIT_OS_NOT, "SP " + sp_options, version_report);
}

foreach check ( keys(aix_bos_acct_vulns[oslevel][ml][sp]) ) {
  foreach package (keys(aix_bos_acct_vulns[oslevel][ml][sp][check]))
  {
    package_info = aix_bos_acct_vulns[oslevel][ml][sp][check][package];
    minfilesetver = package_info["minfilesetver"];
    maxfilesetver = package_info["maxfilesetver"];
    patch =         package_info["patch"];
    if (aix_check_ifix(release:oslevel, ml:ml, sp:sp, patch:patch, package:package, minfilesetver:minfilesetver, maxfilesetver:maxfilesetver) < 0) flag++;
  }
}

if (flag)
{
  aix_report_extra = ereg_replace(string:aix_report_get(), pattern:"[()]", replace:"");
  aix_report_extra = ereg_replace(string:aix_report_extra, pattern:"[|]", replace:" or ");
  security_report_v4(
    port       : 0,
    severity   : SECURITY_HOLE,
    extra      : aix_report_extra
  );
}
else
{
  tested = aix_pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bos.acct");
}

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

12.6%

Related for AIX_SUID_ADVISORY_BOS_ACCT.NASL