Debian DSA-1878-1 : devscripts - missing input sanitatio
Reporter | Title | Published | Views | Family All 27 |
---|---|---|---|---|
![]() | [Backports-security-announce] Security update for devscripts | 11 Sep 200917:38 | โ | debian |
![]() | [Backports-security-announce] Security update for devscripts | 11 Sep 200917:38 | โ | debian |
![]() | [Backports-security-announce] Security update for devscripts | 2 Sep 200920:22 | โ | debian |
![]() | [Backports-security-announce] Security update for devscripts | 2 Sep 200920:38 | โ | debian |
![]() | [Backports-security-announce] Security update for devscripts | 11 Sep 200917:38 | โ | debian |
![]() | [Backports-security-announce] Security update for devscripts | 2 Sep 200920:22 | โ | debian |
![]() | [SECURITY] [DSA 1878-1] New devscripts packages fix remote code execution | 2 Sep 200918:56 | โ | debian |
![]() | [SECURITY] [DSA 1878-2] New devscripts packages fix regressions | 11 Sep 200906:20 | โ | debian |
![]() | CVE-2009-2946 | 4 Sep 200920:30 | โ | debiancve |
![]() | Ubuntu: Security Advisory (USN-847-1) | 26 Aug 202200:00 | โ | openvas |
Source | Link |
---|---|
debian | www.debian.org/security/2009/dsa-1878 |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-1878. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(44743);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2009-2946");
script_xref(name:"DSA", value:"1878");
script_name(english:"Debian DSA-1878-1 : devscripts - missing input sanitation");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Raphael Geissert discovered that uscan, a program to check for
availability of new source code versions which is part of the
devscripts package, runs Perl code downloaded from potentially
untrusted sources to implement its URL and version mangling
functionality. This update addresses this issue by reimplementing the
relevant Perl operators without relying on the Perl interpreter,
trying to preserve backwards compatibility as much as possible."
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2009/dsa-1878"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the devscripts package.
For the old stable distribution (etch), this problem has been fixed in
version 2.9.26etch4.
For the stable distribution (lenny), this problem has been fixed in
version 2.10.35lenny6."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:devscripts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:5.0");
script_set_attribute(attribute:"patch_publication_date", value:"2009/09/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/02/24");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"4.0", prefix:"devscripts", reference:"2.9.26etch4")) flag++;
if (deb_check(release:"5.0", prefix:"devscripts", reference:"2.10.35lenny6")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo