Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DLA-3805.NASL
HistoryMay 01, 2024 - 12:00 a.m.

Debian dla-3805 : libqt5concurrent5 - security update

2024-05-0100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
debian
dla-3805
security update
libqt5concurrent5
vulnerabilities
qt
sql odbc
denial of service
cve-2023-24607
network
hsts
parsing
cve-2023-32762
svg
qtextlayout
buffer overflow
cve-2023-32763
qdnslookup
buffer over-read
cve-2023-33285
qxmlstreamreader
application crash
xml string
cve-2023-37369
recursive entity expansion
http2
hpack integer overflow
cve-2023-38197
cve-2023-51714

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3805 advisory.

  • Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3. (CVE-2023-24607)

  • An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match. (CVE-2023-32762)

  • An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
    (CVE-2023-32763)

  • An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1.
    QDnsLookup has a buffer over-read via a crafted reply from a DNS server. (CVE-2023-33285)

  • In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length. (CVE-2023-37369)

  • An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3.
    There are infinite loops in recursive entity expansion. (CVE-2023-38197)

  • An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check. (CVE-2023-51714)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
#
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory dla-3805. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('compat.inc');

if (description)
{
  script_id(194883);
  script_version("1.0");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/01");

  script_cve_id(
    "CVE-2023-24607",
    "CVE-2023-32762",
    "CVE-2023-32763",
    "CVE-2023-33285",
    "CVE-2023-37369",
    "CVE-2023-38197",
    "CVE-2023-51714"
  );

  script_name(english:"Debian dla-3805 : libqt5concurrent5 - security update");

  script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing one or more security-related updates.");
  script_set_attribute(attribute:"description", value:
"The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the
dla-3805 advisory.

  - Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used
    and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x
    before 6.4.3. (CVE-2023-24607)

  - An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt
    Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections
    to be established, even when explicitly prohibited by the server. This happens if the case used for this
    header does not exactly match. (CVE-2023-32762)

  - An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When
    a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
    (CVE-2023-32763)

  - An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1.
    QDnsLookup has a buffer over-read via a crafted reply from a DNS server. (CVE-2023-33285)

  - In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application
    crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater
    than a length. (CVE-2023-37369)

  - An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3.
    There are infinite loops in recursive entity expansion. (CVE-2023-38197)

  - An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through
    6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack
    integer overflow check. (CVE-2023-51714)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  # https://security-tracker.debian.org/tracker/source-package/qtbase-opensource-src
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?daec893f");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-24607");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-32762");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-32763");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-33285");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-37369");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-38197");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-51714");
  script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/buster/qtbase-opensource-src");
  script_set_attribute(attribute:"solution", value:
"Upgrade the libqt5concurrent5 packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-51714");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/04/15");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/05/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/01");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5concurrent5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5core5a");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5dbus5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5gui5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5network5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5opengl5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5opengl5-dev");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5printsupport5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5-ibase");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5-mysql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5-odbc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5-psql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5-sqlite");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5sql5-tds");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5test5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5widgets5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libqt5xml5");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qt5-default");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qt5-flatpak-platformtheme");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qt5-gtk-platformtheme");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qt5-qmake");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qt5-qmake-bin");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qtbase5-dev");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qtbase5-dev-tools");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qtbase5-doc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qtbase5-doc-html");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qtbase5-examples");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:qtbase5-private-dev");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Debian Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}

include('debian_package.inc');

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);

var debian_release = get_kb_item('Host/Debian/release');
if ( isnull(debian_release) ) audit(AUDIT_OS_NOT, 'Debian');
debian_release = chomp(debian_release);
if (! preg(pattern:"^(10)\.[0-9]+", string:debian_release)) audit(AUDIT_OS_NOT, 'Debian 10.0', 'Debian ' + debian_release);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);

var pkgs = [
    {'release': '10.0', 'prefix': 'libqt5concurrent5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5core5a', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5dbus5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5gui5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5network5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5opengl5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5opengl5-dev', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5printsupport5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5-ibase', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5-mysql', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5-odbc', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5-psql', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5-sqlite', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5sql5-tds', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5test5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5widgets5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'libqt5xml5', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qt5-default', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qt5-flatpak-platformtheme', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qt5-gtk-platformtheme', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qt5-qmake', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qt5-qmake-bin', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qtbase5-dev', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qtbase5-dev-tools', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qtbase5-doc', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qtbase5-doc-html', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qtbase5-examples', 'reference': '5.11.3+dfsg1-1+deb10u6'},
    {'release': '10.0', 'prefix': 'qtbase5-private-dev', 'reference': '5.11.3+dfsg1-1+deb10u6'}
];

var flag = 0;
foreach package_array ( pkgs ) {
  var _release = NULL;
  var prefix = NULL;
  var reference = NULL;
  if (!empty_or_null(package_array['release'])) _release = package_array['release'];
  if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];
  if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
  if (_release && prefix && reference) {
    if (deb_check(release:_release, prefix:prefix, reference:reference)) flag++;
  }
}

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_HOLE,
    extra      : deb_report_get()
  );
  exit(0);
}
else
{
  var tested = deb_pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libqt5concurrent5 / libqt5core5a / libqt5dbus5 / libqt5gui5 / etc');
}
VendorProductVersionCPE
debiandebian_linuxlibqt5concurrent5p-cpe:/a:debian:debian_linux:libqt5concurrent5
debiandebian_linuxlibqt5core5ap-cpe:/a:debian:debian_linux:libqt5core5a
debiandebian_linuxlibqt5dbus5p-cpe:/a:debian:debian_linux:libqt5dbus5
debiandebian_linuxlibqt5gui5p-cpe:/a:debian:debian_linux:libqt5gui5
debiandebian_linuxlibqt5network5p-cpe:/a:debian:debian_linux:libqt5network5
debiandebian_linuxlibqt5opengl5p-cpe:/a:debian:debian_linux:libqt5opengl5
debiandebian_linuxlibqt5opengl5-devp-cpe:/a:debian:debian_linux:libqt5opengl5-dev
debiandebian_linuxlibqt5printsupport5p-cpe:/a:debian:debian_linux:libqt5printsupport5
debiandebian_linuxlibqt5sql5p-cpe:/a:debian:debian_linux:libqt5sql5
debiandebian_linuxlibqt5sql5-ibasep-cpe:/a:debian:debian_linux:libqt5sql5-ibase
Rows per page:
1-10 of 301

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%