ID DEBIAN_DLA-967.NASL Type nessus Reporter This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2017-05-31T00:00:00
Description
Gajim implements XEP-0146, an XMPP extension to run commands remotely
from another client. However it was found that malicious servers can
trigger commands, which could lead to leaking private conversations
from encrypted sessions. To solve this, XEP-0146 support has been
disabled by default.
For Debian 7 'Wheezy', these problems have been fixed in version
0.15.1-4.1+deb7u3.
We recommend that you upgrade your gajim packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-967-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(100516);
script_version("3.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2016-10376");
script_name(english:"Debian DLA-967-1 : gajim security update");
script_summary(english:"Checks dpkg output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Gajim implements XEP-0146, an XMPP extension to run commands remotely
from another client. However it was found that malicious servers can
trigger commands, which could lead to leaking private conversations
from encrypted sessions. To solve this, XEP-0146 support has been
disabled by default.
For Debian 7 'Wheezy', these problems have been fixed in version
0.15.1-4.1+deb7u3.
We recommend that you upgrade your gajim packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.debian.org/debian-lts-announce/2017/05/msg00036.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/wheezy/gajim"
);
script_set_attribute(
attribute:"solution",
value:"Upgrade the affected gajim package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:gajim");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
script_set_attribute(attribute:"patch_publication_date", value:"2017/05/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/05/31");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"7.0", prefix:"gajim", reference:"0.15.1-4.1+deb7u3")) flag++;
if (flag)
{
if (report_verbosity > 0) security_note(port:0, extra:deb_report_get());
else security_note(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "DEBIAN_DLA-967.NASL", "bulletinFamily": "scanner", "title": "Debian DLA-967-1 : gajim security update", "description": "Gajim implements XEP-0146, an XMPP extension to run commands remotely\nfrom another client. However it was found that malicious servers can\ntrigger commands, which could lead to leaking private conversations\nfrom encrypted sessions. To solve this, XEP-0146 support has been\ndisabled by default.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n0.15.1-4.1+deb7u3.\n\nWe recommend that you upgrade your gajim packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "published": "2017-05-31T00:00:00", "modified": "2017-05-31T00:00:00", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/100516", "reporter": "This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://lists.debian.org/debian-lts-announce/2017/05/msg00036.html", "https://packages.debian.org/source/wheezy/gajim"], "cvelist": ["CVE-2016-10376"], "type": "nessus", "lastseen": "2021-01-12T09:44:31", "edition": 20, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-10376"]}, {"type": "fedora", "idList": ["FEDORA:1835C60153C8", "FEDORA:C09B360200BD", "FEDORA:93CD160460F1"]}, {"type": "nessus", "idList": ["FEDORA_2017-3C561780C8.NASL", "OPENSUSE-2017-665.NASL", "DEBIAN_DSA-3943.NASL", "FEDORA_2017-62547837BA.NASL", "GENTOO_GLSA-201707-14.NASL", "FEDORA_2017-E6DEEC5BD0.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310872766", "OPENVAS:1361412562310872768", "OPENVAS:1361412562310703943"]}, {"type": "gentoo", "idList": ["GLSA-201707-14"]}, {"type": "debian", "idList": ["DEBIAN:DLA-967-1:1D524", "DEBIAN:DSA-3943-1:44EF4"]}], "modified": "2021-01-12T09:44:31", "rev": 2}, "score": {"value": 4.9, "vector": "NONE", "modified": "2021-01-12T09:44:31", "rev": 2}, "vulnersScore": 4.9}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-967-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100516);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-10376\");\n\n script_name(english:\"Debian DLA-967-1 : gajim security update\");\n script_summary(english:\"Checks dpkg output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gajim implements XEP-0146, an XMPP extension to run commands remotely\nfrom another client. However it was found that malicious servers can\ntrigger commands, which could lead to leaking private conversations\nfrom encrypted sessions. To solve this, XEP-0146 support has been\ndisabled by default.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n0.15.1-4.1+deb7u3.\n\nWe recommend that you upgrade your gajim packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/05/msg00036.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/gajim\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade the affected gajim package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"gajim\", reference:\"0.15.1-4.1+deb7u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:deb_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Debian Local Security Checks", "pluginID": "100516", "cpe": ["p-cpe:/a:debian:debian_linux:gajim", "cpe:/o:debian:debian_linux:7.0"], "scheme": null, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}}
{"cve": [{"lastseen": "2021-02-02T06:28:01", "description": "Gajim through 0.16.7 unconditionally implements the \"XEP-0146: Remote Controlling Clients\" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions.", "edition": 6, "cvss3": {"exploitabilityScore": 0.9, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.5, "privilegesRequired": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-05-28T00:29:00", "title": "CVE-2016-10376", "type": "cve", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10376"], "modified": "2017-11-06T02:29:00", "cpe": ["cpe:/a:gajim:gajim:0.16.7"], "id": "CVE-2016-10376", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10376", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:gajim:gajim:0.16.7:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2016-10376"], "description": "Gajim is a Jabber client written in PyGTK. The goal of Gajim's developers is to provide a full featured and easy to use xmpp client for the GTK+ users. Gajim does not require GNOME to run, even though it exists with it nicely. ", "modified": "2017-06-13T13:37:53", "published": "2017-06-13T13:37:53", "id": "FEDORA:C09B360200BD", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: gajim-0.16.8-1.fc26", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2016-10376"], "description": "Gajim is a Jabber client written in PyGTK. The goal of Gajim's developers is to provide a full featured and easy to use xmpp client for the GTK+ users. Gajim does not require GNOME to run, even though it exists with it nicely. ", "modified": "2017-06-15T08:23:16", "published": "2017-06-15T08:23:16", "id": "FEDORA:93CD160460F1", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: gajim-0.16.8-1.fc24", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2016-10376"], "description": "Gajim is a Jabber client written in PyGTK. The goal of Gajim's developers is to provide a full featured and easy to use xmpp client for the GTK+ users. Gajim does not require GNOME to run, even though it exists with it nicely. ", "modified": "2017-06-15T09:26:36", "published": "2017-06-15T09:26:36", "id": "FEDORA:1835C60153C8", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: gajim-0.16.8-1.fc25", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-07T10:11:23", "description": "Gajim 0.16.8\n\n - Fix rejoining MUCs after connection loss\n\n - Fix Groupchat invites\n\n - Fix encoding problems with newer GnuPG versions\n\n - Fix old messages randomly reappearing in the chat window\n\n - Fix some problems with IBB filetransfer\n\n - Make XEP-0146 Commands opt-in\n\n - Improve sending messages to your own resources\n\n - Improve reliability of delivery recipes\n\n - Many minor bugfixes\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}, "published": "2017-06-16T00:00:00", "title": "Fedora 24 : gajim (2017-62547837ba)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "modified": "2017-06-16T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:gajim", "cpe:/o:fedoraproject:fedora:24"], "id": "FEDORA_2017-62547837BA.NASL", "href": "https://www.tenable.com/plugins/nessus/100822", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-62547837ba.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100822);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2016-10376\");\n script_xref(name:\"FEDORA\", value:\"2017-62547837ba\");\n\n script_name(english:\"Fedora 24 : gajim (2017-62547837ba)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gajim 0.16.8\n\n - Fix rejoining MUCs after connection loss\n\n - Fix Groupchat invites\n\n - Fix encoding problems with newer GnuPG versions\n\n - Fix old messages randomly reappearing in the chat window\n\n - Fix some problems with IBB filetransfer\n\n - Make XEP-0146 Commands opt-in\n\n - Improve sending messages to your own resources\n\n - Improve reliability of delivery recipes\n\n - Many minor bugfixes\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-62547837ba\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gajim package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:24\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/05/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^24([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 24\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC24\", reference:\"gajim-0.16.8-1.fc24\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gajim\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T10:14:15", "description": "Gajim 0.16.8\n\n - Fix rejoining MUCs after connection loss\n\n - Fix Groupchat invites\n\n - Fix encoding problems with newer GnuPG versions\n\n - Fix old messages randomly reappearing in the chat window\n\n - Fix some problems with IBB filetransfer\n\n - Make XEP-0146 Commands opt-in\n\n - Improve sending messages to your own resources\n\n - Improve reliability of delivery recipes\n\n - Many minor bugfixes\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}, "published": "2017-07-17T00:00:00", "title": "Fedora 26 : gajim (2017-e6deec5bd0)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "modified": "2017-07-17T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:gajim", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2017-E6DEEC5BD0.NASL", "href": "https://www.tenable.com/plugins/nessus/101739", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-e6deec5bd0.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101739);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2016-10376\");\n script_xref(name:\"FEDORA\", value:\"2017-e6deec5bd0\");\n\n script_name(english:\"Fedora 26 : gajim (2017-e6deec5bd0)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gajim 0.16.8\n\n - Fix rejoining MUCs after connection loss\n\n - Fix Groupchat invites\n\n - Fix encoding problems with newer GnuPG versions\n\n - Fix old messages randomly reappearing in the chat window\n\n - Fix some problems with IBB filetransfer\n\n - Make XEP-0146 Commands opt-in\n\n - Improve sending messages to your own resources\n\n - Improve reliability of delivery recipes\n\n - Many minor bugfixes\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-e6deec5bd0\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gajim package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/05/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"gajim-0.16.8-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gajim\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2021-01-12T10:15:55", "description": "Gajim 0.16.8\n\n - Fix rejoining MUCs after connection loss\n\n - Fix Groupchat invites\n\n - Fix encoding problems with newer GnuPG versions\n\n - Fix old messages randomly reappearing in the chat window\n\n - Fix some problems with IBB filetransfer\n\n - Make XEP-0146 Commands opt-in\n\n - Improve sending messages to your own resources\n\n - Improve reliability of delivery recipes\n\n - Many minor bugfixes\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}, "published": "2017-06-16T00:00:00", "title": "Fedora 25 : gajim (2017-3c561780c8)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "modified": "2017-06-16T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:gajim", "cpe:/o:fedoraproject:fedora:25"], "id": "FEDORA_2017-3C561780C8.NASL", "href": "https://www.tenable.com/plugins/nessus/100821", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-3c561780c8.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100821);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-10376\");\n script_xref(name:\"FEDORA\", value:\"2017-3c561780c8\");\n\n script_name(english:\"Fedora 25 : gajim (2017-3c561780c8)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gajim 0.16.8\n\n - Fix rejoining MUCs after connection loss\n\n - Fix Groupchat invites\n\n - Fix encoding problems with newer GnuPG versions\n\n - Fix old messages randomly reappearing in the chat window\n\n - Fix some problems with IBB filetransfer\n\n - Make XEP-0146 Commands opt-in\n\n - Improve sending messages to your own resources\n\n - Improve reliability of delivery recipes\n\n - Many minor bugfixes\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-3c561780c8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gajim package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/05/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"gajim-0.16.8-1.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gajim\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2021-01-12T11:06:17", "description": "The remote host is affected by the vulnerability described in GLSA-201707-14\n(Gajim: Information disclosure)\n\n Gajim unconditionally implements the “XEP-0146: Remote Controlling\n Clients” extension.\n \nImpact :\n\n Remote attackers, by enticing a user to connect to a malicious XMPP\n server, could extract plaintext from Off The Record (OTR) encrypted\n sessions.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}, "published": "2017-07-10T00:00:00", "title": "GLSA-201707-14 : Gajim: Information disclosure", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "modified": "2017-07-10T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:gajim"], "id": "GENTOO_GLSA-201707-14.NASL", "href": "https://www.tenable.com/plugins/nessus/101345", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201707-14.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101345);\n script_version(\"3.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-10376\");\n script_xref(name:\"GLSA\", value:\"201707-14\");\n\n script_name(english:\"GLSA-201707-14 : Gajim: Information disclosure\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201707-14\n(Gajim: Information disclosure)\n\n Gajim unconditionally implements the “XEP-0146: Remote Controlling\n Clients” extension.\n \nImpact :\n\n Remote attackers, by enticing a user to connect to a malicious XMPP\n server, could extract plaintext from Off The Record (OTR) encrypted\n sessions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201707-14\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Gajim users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-im/gajim-0.16.6-r1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-im/gajim\", unaffected:make_list(\"ge 0.16.6-r1\"), vulnerable:make_list(\"lt 0.16.6-r1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:qpkg_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Gajim\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2021-01-20T12:32:58", "description": "This update for gajim fixes the following issues :\n\n - CVE-2016-10376: XEP-0146 extension can be abused by\n malicious XMPP servers (boo#1041163).\n\n - Update to version 0.16.7 :\n\n - Better compatibility with XEP-0191: Blocking Command.\n\n - Gajim now depends on python-gnupg for PGP encryption.\n\n - Remove usage of demandimport.\n\n - Many minor bugfixes.\n\n - Move python-farstream-0_1 to Suggests.\n\n - Correct the licence to GPL-3.0.", "edition": 18, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}, "published": "2017-06-09T00:00:00", "title": "openSUSE Security Update : gajim (openSUSE-2017-665)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "modified": "2017-06-09T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:gajim-lang", "p-cpe:/a:novell:opensuse:gajim", "cpe:/o:novell:opensuse:42.2"], "id": "OPENSUSE-2017-665.NASL", "href": "https://www.tenable.com/plugins/nessus/100710", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2017-665.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(100710);\n script_version(\"3.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2016-10376\");\n\n script_name(english:\"openSUSE Security Update : gajim (openSUSE-2017-665)\");\n script_summary(english:\"Check for the openSUSE-2017-665 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for gajim fixes the following issues :\n\n - CVE-2016-10376: XEP-0146 extension can be abused by\n malicious XMPP servers (boo#1041163).\n\n - Update to version 0.16.7 :\n\n - Better compatibility with XEP-0191: Blocking Command.\n\n - Gajim now depends on python-gnupg for PGP encryption.\n\n - Remove usage of demandimport.\n\n - Many minor bugfixes.\n\n - Move python-farstream-0_1 to Suggests.\n\n - Correct the licence to GPL-3.0.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1041163\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gajim packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gajim-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/06/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.2\", reference:\"gajim-0.16.7-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.2\", reference:\"gajim-lang-0.16.7-2.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gajim / gajim-lang\");\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2021-01-06T09:50:33", "description": "Gajim, a GTK+-based XMPP/Jabber client, unconditionally implements the\n'XEP-0146: Remote Controlling Clients' extension, allowing a malicious\nXMPP server to trigger commands to leak private conversations from\nencrypted sessions. With this update XEP-0146 support has been\ndisabled by default and made opt-in via the 'remote_commands' option.", "edition": 28, "cvss3": {"score": 4.5, "vector": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"}, "published": "2017-08-15T00:00:00", "title": "Debian DSA-3943-1 : gajim - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "modified": "2017-08-15T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:gajim"], "id": "DEBIAN_DSA-3943.NASL", "href": "https://www.tenable.com/plugins/nessus/102483", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3943. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(102483);\n script_version(\"3.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-10376\");\n script_xref(name:\"DSA\", value:\"3943\");\n\n script_name(english:\"Debian DSA-3943-1 : gajim - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Gajim, a GTK+-based XMPP/Jabber client, unconditionally implements the\n'XEP-0146: Remote Controlling Clients' extension, allowing a malicious\nXMPP server to trigger commands to leak private conversations from\nencrypted sessions. With this update XEP-0146 support has been\ndisabled by default and made opt-in via the 'remote_commands' option.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863445\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/gajim\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2017/dsa-3943\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the gajim packages.\n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 0.16-1+deb8u2.\n\nFor the stable distribution (stretch), this problem has been fixed\nprior to the initial release.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:gajim\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/08/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/08/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"gajim\", reference:\"0.16-1+deb8u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:deb_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:33:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-06-16T00:00:00", "id": "OPENVAS:1361412562310872766", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872766", "type": "openvas", "title": "Fedora Update for gajim FEDORA-2017-62547837ba", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for gajim FEDORA-2017-62547837ba\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872766\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-16 07:11:39 +0200 (Fri, 16 Jun 2017)\");\n script_cve_id(\"CVE-2016-10376\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for gajim FEDORA-2017-62547837ba\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gajim'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"gajim on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-62547837ba\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4SIMLXNRVBOLRH43WZEIDIETEZ6ZRG6L\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"gajim\", rpm:\"gajim~0.16.8~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:34:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2017-06-16T00:00:00", "id": "OPENVAS:1361412562310872768", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872768", "type": "openvas", "title": "Fedora Update for gajim FEDORA-2017-3c561780c8", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for gajim FEDORA-2017-3c561780c8\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872768\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-06-16 07:11:48 +0200 (Fri, 16 Jun 2017)\");\n script_cve_id(\"CVE-2016-10376\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for gajim FEDORA-2017-3c561780c8\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gajim'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"gajim on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-3c561780c8\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UVYQKJTZWS4WXEWKDCUBJC2AIJDADFUA\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"gajim\", rpm:\"gajim~0.16.8~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-10376"], "description": "Gajim, a GTK+-based XMPP/Jabber client, unconditionally implements the\n", "modified": "2019-03-18T00:00:00", "published": "2017-08-14T00:00:00", "id": "OPENVAS:1361412562310703943", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703943", "type": "openvas", "title": "Debian Security Advisory DSA 3943-1 (gajim - security update)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: deb_3943.nasl 14280 2019-03-18 14:50:45Z cfischer $\n#\n# Auto-generated from advisory DSA 3943-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703943\");\n script_version(\"$Revision: 14280 $\");\n script_cve_id(\"CVE-2016-10376\");\n script_name(\"Debian Security Advisory DSA 3943-1 (gajim - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:50:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-08-14 00:00:00 +0200 (Mon, 14 Aug 2017)\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2017/dsa-3943.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2017 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"gajim on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the oldstable distribution (jessie), this problem has been fixed\nin version 0.16-1+deb8u2.\n\nFor the stable distribution (stretch), this problem has been fixed prior\nto the initial release.\n\nWe recommend that you upgrade your gajim packages.\");\n script_tag(name:\"summary\", value:\"Gajim, a GTK+-based XMPP/Jabber client, unconditionally implements the\n'XEP-0146: Remote Controlling Clients' extension, allowing a malicious\nXMPP server to trigger commands to leak private conversations from\nencrypted sessions. With this update XEP-0146 support has been disabled\nby default and made opt-in via the remote_commands\noption.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"gajim\", ver:\"0.16-1+deb8u2\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}], "gentoo": [{"lastseen": "2017-07-10T04:20:04", "bulletinFamily": "unix", "cvelist": ["CVE-2016-10376"], "description": "### Background\n\nGajim is a Jabber/XMPP client which uses GTK+.\n\n### Description\n\nGajim unconditionally implements the \u201cXEP-0146: Remote Controlling Clients\u201d extension. \n\n### Impact\n\nRemote attackers, by enticing a user to connect to a malicious XMPP server, could extract plaintext from Off The Record (OTR) encrypted sessions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Gajim users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-im/gajim-0.16.6-r1\"", "edition": 1, "modified": "2017-07-10T00:00:00", "published": "2017-07-10T00:00:00", "href": "https://security.gentoo.org/glsa/201707-14", "id": "GLSA-201707-14", "title": "Gajim: Information disclosure", "type": "gentoo", "cvss": {"score": 3.5, "vector": "AV:NETWORK/AC:MEDIUM/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}}], "debian": [{"lastseen": "2019-05-30T02:21:43", "bulletinFamily": "unix", "cvelist": ["CVE-2016-10376"], "description": "Package : gajim\nVersion : 0.15.1-4.1+deb7u3\nCVE ID : CVE-2016-10376\nDebian Bug : 863445\n\nGajim implements XEP-0146, an XMPP extension to run commands remotely\nfrom another client. However it was found that malicious servers can\ntrigger commands, which could lead to leaking private conversations\nfrom encrypted sessions. To solve this, XEP-0146 support has been\ndisabled by default.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n0.15.1-4.1+deb7u3.\n\nWe recommend that you upgrade your gajim packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 2, "modified": "2017-05-30T18:31:41", "published": "2017-05-30T18:31:41", "id": "DEBIAN:DLA-967-1:1D524", "href": "https://lists.debian.org/debian-lts-announce/2017/debian-lts-announce-201705/msg00036.html", "title": "[SECURITY] [DLA 967-1] gajim security update", "type": "debian", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-30T02:22:55", "bulletinFamily": "unix", "cvelist": ["CVE-2016-10376"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3943-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nAugust 14, 2017 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : gajim\nCVE ID : CVE-2016-10376\nDebian Bug : 863445\n\nGajim, a GTK+-based XMPP/Jabber client, unconditionally implements the\n"XEP-0146: Remote Controlling Clients" extension, allowing a malicious\nXMPP server to trigger commands to leak private conversations from\nencrypted sessions. With this update XEP-0146 support has been disabled\nby default and made opt-in via the 'remote_commands' option.\n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 0.16-1+deb8u2.\n\nFor the stable distribution (stretch), this problem has been fixed prior\nto the initial release.\n\nWe recommend that you upgrade your gajim packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 2, "modified": "2017-08-14T19:21:00", "published": "2017-08-14T19:21:00", "id": "DEBIAN:DSA-3943-1:44EF4", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2017/msg00204.html", "title": "[SECURITY] [DSA 3943-1] gajim security update", "type": "debian", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:P/I:N/A:N"}}]}