The remote AlmaLinux 8 host is affected by multiple vulnerabilities in libwebp, allowing an attacker to compromise data confidentiality, integrity, and service availability
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | RHEL 8 : libwebp (RHSA-2021:4231) | 11 Nov 202100:00 | – | nessus |
![]() | Rocky Linux 8 : libwebp (RLSA-2021:4231) | 7 Nov 202300:00 | – | nessus |
![]() | RHEL 7 : libwebp (Unpatched Vulnerability) | 11 May 202400:00 | – | nessus |
![]() | NewStart CGSL MAIN 6.02 : libwebp Multiple Vulnerabilities (NS-SA-2022-0091) | 15 Nov 202200:00 | – | nessus |
![]() | Oracle Linux 8 : libwebp (ELSA-2021-4231) | 17 Nov 202100:00 | – | nessus |
![]() | CentOS 8 : libwebp (CESA-2021:4231) | 11 Nov 202100:00 | – | nessus |
![]() | SUSE SLES12 Security Update : libwebp (SUSE-SU-2021:1830-1) | 3 Jun 202100:00 | – | nessus |
![]() | Photon OS 2.0: Libwebp PHSA-2021-2.0-0351 | 9 Jun 202100:00 | – | nessus |
![]() | Debian DLA-2672-1 : libwebp security update | 3 Jun 202100:00 | – | nessus |
![]() | Ubuntu 16.04 ESM : libwebp vulnerabilities (USN-4971-2) | 10 Jun 202100:00 | – | nessus |
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
#
# The package checks in this plugin were extracted from
# AlmaLinux Security Advisory ALSA-2021:4231.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(157577);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/02/14");
script_cve_id(
"CVE-2018-25009",
"CVE-2018-25010",
"CVE-2018-25012",
"CVE-2018-25013",
"CVE-2018-25014",
"CVE-2020-36330",
"CVE-2020-36331",
"CVE-2020-36332"
);
script_xref(name:"ALSA", value:"2021:4231");
script_name(english:"AlmaLinux 8 : libwebp (ALSA-2021:4231)");
script_set_attribute(attribute:"synopsis", value:
"The remote AlmaLinux host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote AlmaLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the
ALSA-2021:4231 advisory.
- A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function
WebPMuxCreateInternal. The highest threat from this vulnerability is to data confidentiality and to the
service availability. (CVE-2018-25009, CVE-2018-25012)
- A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function
ApplyFilter. The highest threat from this vulnerability is to data confidentiality and to the service
availability. (CVE-2018-25010)
- A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function
ShiftBytes. The highest threat from this vulnerability is to data confidentiality and to the service
availability. (CVE-2018-25013)
- A flaw was found in libwebp in versions before 1.0.1. An unitialized variable is used in function
ReadSymbol. The highest threat from this vulnerability is to data confidentiality and integrity as well as
system availability. (CVE-2018-25014)
- A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function
ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the
service availability. (CVE-2020-36330)
- A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function
ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service
availability. (CVE-2020-36331)
- A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive
amount of memory. The highest threat from this vulnerability is to the service availability.
(CVE-2020-36332)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://errata.almalinux.org/8/ALSA-2021-4231.html");
script_set_attribute(attribute:"solution", value:
"Update the affected libwebp and / or libwebp-devel packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-25014");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/05/21");
script_set_attribute(attribute:"patch_publication_date", value:"2021/11/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/02/09");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:alma:linux:libwebp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:alma:linux:libwebp-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:alma:linux:8");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Alma Linux Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/AlmaLinux/release", "Host/AlmaLinux/rpm-list", "Host/cpu");
exit(0);
}
include('audit.inc');
include('global_settings.inc');
include('misc_func.inc');
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var release = get_kb_item('Host/AlmaLinux/release');
if (isnull(release) || 'AlmaLinux' >!< release) audit(AUDIT_OS_NOT, 'AlmaLinux');
var os_ver = pregmatch(pattern: "AlmaLinux release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'AlmaLinux');
var os_ver = os_ver[1];
if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'AlmaLinux 8.x', 'AlmaLinux ' + os_ver);
if (!get_kb_item('Host/AlmaLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'AlmaLinux', cpu);
var pkgs = [
{'reference':'libwebp-1.0.0-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libwebp-1.0.0-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libwebp-devel-1.0.0-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'libwebp-devel-1.0.0-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}
];
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var release = NULL;
var sp = NULL;
var cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) release = 'Alma-' + package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];
if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (reference && release && (!exists_check || rpm_exists(release:release, rpm:exists_check))) {
if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libwebp / libwebp-devel');
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo