Lucene search

K
nessusThis script is Copyright (C) 2018 Tenable Network Security, Inc.ALA_ALAS-2018-965.NASL
HistoryMar 09, 2018 - 12:00 a.m.

Amazon Linux AMI : tomcat-native (ALAS-2018-965)

2018-03-0900:00:00
This script is Copyright (C) 2018 Tenable Network Security, Inc.
www.tenable.com
113

Mishandling of client certificates can allow for OCSP check bypass :

When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability. (CVE-2017-15698)

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Amazon Linux AMI Security Advisory ALAS-2018-965.
#

include("compat.inc");

if (description)
{
  script_id(107236);
  script_version("1.2");
  script_cvs_date("Date: 2018/04/18 15:09:36");

  script_cve_id("CVE-2017-15698");
  script_xref(name:"ALAS", value:"2018-965");

  script_name(english:"Amazon Linux AMI : tomcat-native (ALAS-2018-965)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Amazon Linux AMI host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Mishandling of client certificates can allow for OCSP check bypass :

When parsing the AIA-Extension field of a client certificate, Apache
Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not
correctly handle fields longer than 127 bytes. The result of the
parsing error was to skip the OCSP check. It was therefore possible
for client certificates that should have been rejected (if the OCSP
check had been made) to be accepted. Users not using OCSP checks are
not affected by this vulnerability. (CVE-2017-15698)"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://alas.aws.amazon.com/ALAS-2018-965.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Run 'yum update tomcat-native' to update your system."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:tomcat-native");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:tomcat-native-debuginfo");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2018/03/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/03/09");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2018 Tenable Network Security, Inc.");
  script_family(english:"Amazon Linux Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/AmazonLinux/release");
if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
os_ver = os_ver[1];
if (os_ver != "A")
{
  if (os_ver == 'A') os_ver = 'AMI';
  audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
}

if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (rpm_check(release:"ALA", reference:"tomcat-native-1.2.16-1.20.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"tomcat-native-debuginfo-1.2.16-1.20.amzn1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tomcat-native / tomcat-native-debuginfo");
}
VendorProductVersionCPE
amazonlinuxtomcat-nativep-cpe:/a:amazon:linux:tomcat-native
amazonlinuxtomcat-native-debuginfop-cpe:/a:amazon:linux:tomcat-native-debuginfo
amazonlinuxcpe:/o:amazon:linux