Lucene search

K
nessusThis script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.CENTOS_RHSA-2011-0486.NASL
HistoryMay 06, 2011 - 12:00 a.m.

CentOS 4 / 5 : xmlsec1 (CESA-2011:0486)

2011-05-0600:00:00
This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
26

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.012

Percentile

85.5%

Updated xmlsec1 packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The XML Security Library is a C library based on libxml2 and OpenSSL that implements the XML Digital Signature and XML Encryption standards.

A flaw was found in the way xmlsec1 handled XML files that contain an XSLT transformation specification. A specially crafted XML file could cause xmlsec1 to create or overwrite an arbitrary file while performing the verification of a file’s digital signature.
(CVE-2011-1425)

Red Hat would like to thank Nicolas Gregoire and Aleksey Sanin for reporting this issue.

This update also fixes the following bug :

  • xmlsec1 previously used an incorrect search path when searching for crypto plug-in libraries, possibly trying to access such libraries using a relative path. (BZ#558480, BZ#700467)

Users of xmlsec1 should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, all running applications that use the xmlsec1 library must be restarted for the update to take effect.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Red Hat Security Advisory RHSA-2011:0486 and 
# CentOS Errata and Security Advisory 2011:0486 respectively.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(53813);
  script_version("1.15");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");

  script_cve_id("CVE-2011-1425");
  script_bugtraq_id(47135);
  script_xref(name:"RHSA", value:"2011:0486");

  script_name(english:"CentOS 4 / 5 : xmlsec1 (CESA-2011:0486)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote CentOS host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Updated xmlsec1 packages that fix one security issue and one bug are
now available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.

The XML Security Library is a C library based on libxml2 and OpenSSL
that implements the XML Digital Signature and XML Encryption
standards.

A flaw was found in the way xmlsec1 handled XML files that contain an
XSLT transformation specification. A specially crafted XML file could
cause xmlsec1 to create or overwrite an arbitrary file while
performing the verification of a file's digital signature.
(CVE-2011-1425)

Red Hat would like to thank Nicolas Gregoire and Aleksey Sanin for
reporting this issue.

This update also fixes the following bug :

* xmlsec1 previously used an incorrect search path when searching for
crypto plug-in libraries, possibly trying to access such libraries
using a relative path. (BZ#558480, BZ#700467)

Users of xmlsec1 should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing
the update, all running applications that use the xmlsec1 library must
be restarted for the update to take effect."
  );
  # https://lists.centos.org/pipermail/centos-announce/2011-May/017508.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?52c12f65"
  );
  # https://lists.centos.org/pipermail/centos-announce/2011-May/017509.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?4253b3e1"
  );
  # https://lists.centos.org/pipermail/centos-announce/2011-May/017512.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?dc2efbe9"
  );
  # https://lists.centos.org/pipermail/centos-announce/2011-May/017513.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?d23f5cfb"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected xmlsec1 packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-gnutls");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-gnutls-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-nss");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-nss-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-openssl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:xmlsec1-openssl-devel");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5");

  script_set_attribute(attribute:"vuln_publication_date", value:"2011/04/04");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/05/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/05/06");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CentOS Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/CentOS/release");
if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
os_ver = os_ver[1];
if (! preg(pattern:"^(4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x / 5.x", "CentOS " + os_ver);

if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);


flag = 0;
if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"xmlsec1-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"xmlsec1-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"xmlsec1-devel-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"xmlsec1-devel-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"xmlsec1-openssl-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"xmlsec1-openssl-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"xmlsec1-openssl-devel-1.2.6-3.2")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"xmlsec1-openssl-devel-1.2.6-3.2")) flag++;

if (rpm_check(release:"CentOS-5", reference:"xmlsec1-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-devel-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-gnutls-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-gnutls-devel-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-nss-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-nss-devel-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-openssl-1.2.9-8.1.2")) flag++;
if (rpm_check(release:"CentOS-5", reference:"xmlsec1-openssl-devel-1.2.9-8.1.2")) flag++;


if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xmlsec1 / xmlsec1-devel / xmlsec1-gnutls / xmlsec1-gnutls-devel / etc");
}

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.012

Percentile

85.5%