Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DLA-3844.NASL
HistoryJun 26, 2024 - 12:00 a.m.

Debian dla-3844 : git - security update

2024-06-2600:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
1
debian 10
git
security update
multiple vulnerabilities
cve-2019-1387
cve-2023-25652
cve-2023-25815
cve-2023-29007
cve-2024-32002
cve-2024-32004
cve-2024-32021
cve-2024-32465
upgrade

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.087 Low

EPSS

Percentile

94.6%

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3844 advisory.

-------------------------------------------------------------------------     Debian LTS Advisory DLA-3844-1                [email protected]     https://www.debian.org/lts/security/                         Sean Whitton     June 26, 2024                                 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : git     Version        : 1:2.20.1-2+deb10u9     CVE ID         : CVE-2019-1387 CVE-2023-25652 CVE-2023-25815 CVE-2023-29007                      CVE-2024-32002 CVE-2024-32004 CVE-2024-32021 CVE-2024-32465     Debian Bug     : 1034835 1071160

Multiple vulnerabilities were found in git, a fast, scalable and     distributed revision control system.

CVE-2019-1387

    It was possible to bypass the previous check for this vulnerability         using parallel cloning, or the --recurse-submodules option to         git-checkout(1).

CVE-2023-25652

    Feeding specially-crafted input to 'git apply --reject' could         overwrite a path outside the working tree with partially controlled         contents, corresponding to the rejected hunk or hunks from the given         patch.

CVE-2023-25815

    Low-privileged users could inject malicious messages into Git's         output under MINGW.

CVE-2023-29007

    A specially-crafted .gitmodules file with submodule URLs longer than         1024 characters could be used to inject arbitrary configuration into         $GIT_DIR/config.

CVE-2024-32002

    Repositories with submodules could be specially-crafted to write         hooks into .git/ which would then be executed during an ongoing         clone operation.

CVE-2024-32004

    A specially-crafted local repository could cause the execution of         arbitrary code when cloned by another user.

CVE-2024-32021

    When cloning a local repository that contains symlinks via the         filesystem, Git could have created hardlinks to arbitrary         user-readable files on the same filesystem as the target repository         in the objects/ directory.

CVE-2024-32465

    When cloning a local repository obtained from a downloaded archive,         hooks in that repository could be used for arbitrary code execution.

For Debian 10 buster, these problems have been fixed in version     1:2.20.1-2+deb10u9.

We recommend that you upgrade your git packages.

For the detailed security status of git please refer to     its security tracker page at:
https://security-tracker.debian.org/tracker/git

Further information about Debian LTS security advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://wiki.debian.org/LTS     Attachment:
signature.asc     Description: PGP signature

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
#
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory dla-3844. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('compat.inc');

if (description)
{
  script_id(201038);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/26");

  script_cve_id(
    "CVE-2019-1387",
    "CVE-2023-25652",
    "CVE-2023-25815",
    "CVE-2023-29007",
    "CVE-2024-32002",
    "CVE-2024-32004",
    "CVE-2024-32021",
    "CVE-2024-32465"
  );

  script_name(english:"Debian dla-3844 : git - security update");

  script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing one or more security-related updates.");
  script_set_attribute(attribute:"description", value:
"The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the
dla-3844 advisory.

    -------------------------------------------------------------------------
    Debian LTS Advisory DLA-3844-1                [email protected]
    https://www.debian.org/lts/security/                         Sean Whitton
    June 26, 2024                                 https://wiki.debian.org/LTS
    -------------------------------------------------------------------------

    Package        : git
    Version        : 1:2.20.1-2+deb10u9
    CVE ID         : CVE-2019-1387 CVE-2023-25652 CVE-2023-25815 CVE-2023-29007
                     CVE-2024-32002 CVE-2024-32004 CVE-2024-32021 CVE-2024-32465
    Debian Bug     : 1034835 1071160

    Multiple vulnerabilities were found in git, a fast, scalable and
    distributed revision control system.

    CVE-2019-1387

        It was possible to bypass the previous check for this vulnerability
        using parallel cloning, or the --recurse-submodules option to
        git-checkout(1).

    CVE-2023-25652

        Feeding specially-crafted input to 'git apply --reject' could
        overwrite a path outside the working tree with partially controlled
        contents, corresponding to the rejected hunk or hunks from the given
        patch.

    CVE-2023-25815

        Low-privileged users could inject malicious messages into Git's
        output under MINGW.

    CVE-2023-29007

        A specially-crafted .gitmodules file with submodule URLs longer than
        1024 characters could be used to inject arbitrary configuration into
        $GIT_DIR/config.

    CVE-2024-32002

        Repositories with submodules could be specially-crafted to write
        hooks into .git/ which would then be executed during an ongoing
        clone operation.

    CVE-2024-32004

        A specially-crafted local repository could cause the execution of
        arbitrary code when cloned by another user.

    CVE-2024-32021

        When cloning a local repository that contains symlinks via the
        filesystem, Git could have created hardlinks to arbitrary
        user-readable files on the same filesystem as the target repository
        in the objects/ directory.

    CVE-2024-32465

        When cloning a local repository obtained from a downloaded archive,
        hooks in that repository could be used for arbitrary code execution.

    For Debian 10 buster, these problems have been fixed in version
    1:2.20.1-2+deb10u9.

    We recommend that you upgrade your git packages.

    For the detailed security status of git please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/git

    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    Attachment:
    signature.asc
    Description: PGP signature

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/git");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-1387");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-25652");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-25815");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2023-29007");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2024-32002");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2024-32004");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2024-32021");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2024-32465");
  script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/buster/git");
  script_set_attribute(attribute:"solution", value:
"Upgrade the git packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1387");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2024-32002");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/12/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/06/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/26");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-cvs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-daemon-run");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-daemon-sysvinit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-doc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-el");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-email");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-gui");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-man");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-mediawiki");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:git-svn");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:gitk");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:gitweb");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Debian Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}

include('debian_package.inc');

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);

var debian_release = get_kb_item('Host/Debian/release');
if ( isnull(debian_release) ) audit(AUDIT_OS_NOT, 'Debian');
debian_release = chomp(debian_release);
if (! preg(pattern:"^(10)\.[0-9]+", string:debian_release)) audit(AUDIT_OS_NOT, 'Debian 10.0', 'Debian ' + debian_release);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Debian', cpu);

var pkgs = [
    {'release': '10.0', 'prefix': 'git', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-all', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-cvs', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-daemon-run', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-daemon-sysvinit', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-doc', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-el', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-email', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-gui', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-man', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-mediawiki', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'git-svn', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'gitk', 'reference': '1:2.20.1-2+deb10u9'},
    {'release': '10.0', 'prefix': 'gitweb', 'reference': '1:2.20.1-2+deb10u9'}
];

var flag = 0;
foreach package_array ( pkgs ) {
  var _release = NULL;
  var prefix = NULL;
  var reference = NULL;
  if (!empty_or_null(package_array['release'])) _release = package_array['release'];
  if (!empty_or_null(package_array['prefix'])) prefix = package_array['prefix'];
  if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
  if (_release && prefix && reference) {
    if (deb_check(release:_release, prefix:prefix, reference:reference)) flag++;
  }
}

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : deb_report_get()
  );
  exit(0);
}
else
{
  var tested = deb_pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'git / git-all / git-cvs / git-daemon-run / git-daemon-sysvinit / etc');
}
VendorProductVersionCPE
debiandebian_linux10.0cpe:/o:debian:debian_linux:10.0
debiandebian_linuxgitp-cpe:/a:debian:debian_linux:git
debiandebian_linuxgit-allp-cpe:/a:debian:debian_linux:git-all
debiandebian_linuxgit-cvsp-cpe:/a:debian:debian_linux:git-cvs
debiandebian_linuxgit-daemon-runp-cpe:/a:debian:debian_linux:git-daemon-run
debiandebian_linuxgit-daemon-sysvinitp-cpe:/a:debian:debian_linux:git-daemon-sysvinit
debiandebian_linuxgit-docp-cpe:/a:debian:debian_linux:git-doc
debiandebian_linuxgit-elp-cpe:/a:debian:debian_linux:git-el
debiandebian_linuxgit-emailp-cpe:/a:debian:debian_linux:git-email
debiandebian_linuxgit-guip-cpe:/a:debian:debian_linux:git-gui
Rows per page:
1-10 of 151

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.087 Low

EPSS

Percentile

94.6%