Lucene search

K
nessusThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.ALA_ALAS-2013-212.NASL
HistorySep 04, 2013 - 12:00 a.m.

Amazon Linux AMI : php54 (ALAS-2013-212)

2013-09-0400:00:00
This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
www.tenable.com
9

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.614 Medium

EPSS

Percentile

97.8%

A buffer overflow flaw was found in the way PHP parsed deeply nested XML documents. If a PHP application used the xml_parse_into_struct() function to parse untrusted XML content, an attacker able to supply specially crafted XML could use this flaw to crash the application or, possibly, execute arbitrary code with the privileges of the user running the PHP interpreter. (CVE-2013-4113)

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Amazon Linux AMI Security Advisory ALAS-2013-212.
#

include("compat.inc");

if (description)
{
  script_id(69770);
  script_version("1.8");
  script_cvs_date("Date: 2018/04/18 15:09:35");

  script_cve_id("CVE-2013-4113");
  script_xref(name:"ALAS", value:"2013-212");
  script_xref(name:"RHSA", value:"2013:1049");

  script_name(english:"Amazon Linux AMI : php54 (ALAS-2013-212)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Amazon Linux AMI host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"A buffer overflow flaw was found in the way PHP parsed deeply nested
XML documents. If a PHP application used the xml_parse_into_struct()
function to parse untrusted XML content, an attacker able to supply
specially crafted XML could use this flaw to crash the application or,
possibly, execute arbitrary code with the privileges of the user
running the PHP interpreter. (CVE-2013-4113)"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://alas.aws.amazon.com/ALAS-2013-212.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Run 'yum update php54' to update your system."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-bcmath");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-cli");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-dba");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-embedded");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-enchant");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-fpm");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-gd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-imap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-intl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-ldap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-mbstring");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-mcrypt");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-mssql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-mysql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-mysqlnd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-odbc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-pdo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-pgsql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-process");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-pspell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-recode");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-snmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-soap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-tidy");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-xml");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php54-xmlrpc");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2013/07/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/04");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
  script_family(english:"Amazon Linux Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/AmazonLinux/release");
if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
os_ver = os_ver[1];
if (os_ver != "A")
{
  if (os_ver == 'A') os_ver = 'AMI';
  audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
}

if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (rpm_check(release:"ALA", reference:"php54-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-bcmath-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-cli-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-common-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-dba-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-debuginfo-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-devel-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-embedded-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-enchant-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-fpm-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-gd-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-imap-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-intl-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-ldap-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-mbstring-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-mcrypt-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-mssql-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-mysql-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-mysqlnd-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-odbc-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-pdo-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-pgsql-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-process-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-pspell-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-recode-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-snmp-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-soap-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-tidy-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-xml-5.4.17-2.40.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php54-xmlrpc-5.4.17-2.40.amzn1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php54 / php54-bcmath / php54-cli / php54-common / php54-dba / etc");
}
VendorProductVersionCPE
amazonlinuxphp54p-cpe:/a:amazon:linux:php54
amazonlinuxphp54-bcmathp-cpe:/a:amazon:linux:php54-bcmath
amazonlinuxphp54-clip-cpe:/a:amazon:linux:php54-cli
amazonlinuxphp54-commonp-cpe:/a:amazon:linux:php54-common
amazonlinuxphp54-dbap-cpe:/a:amazon:linux:php54-dba
amazonlinuxphp54-debuginfop-cpe:/a:amazon:linux:php54-debuginfo
amazonlinuxphp54-develp-cpe:/a:amazon:linux:php54-devel
amazonlinuxphp54-embeddedp-cpe:/a:amazon:linux:php54-embedded
amazonlinuxphp54-enchantp-cpe:/a:amazon:linux:php54-enchant
amazonlinuxphp54-fpmp-cpe:/a:amazon:linux:php54-fpm
Rows per page:
1-10 of 311

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.614 Medium

EPSS

Percentile

97.8%