Lucene search

K
nessusThis script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DSA-1973.NASL
HistoryFeb 24, 2010 - 12:00 a.m.

Debian DSA-1973-1 : glibc, eglibc - information disclosure

2010-02-2400:00:00
This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

Christoph Pleger has discovered that the GNU C Library (aka glibc) and its derivatives add information from the passwd.adjunct.byname map to entries in the passwd map, which allows local users to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-1973. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(44838);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");

  script_cve_id("CVE-2010-0015");
  script_xref(name:"DSA", value:"1973");

  script_name(english:"Debian DSA-1973-1 : glibc, eglibc - information disclosure");
  script_summary(english:"Checks dpkg output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Christoph Pleger has discovered that the GNU C Library (aka glibc) and
its derivatives add information from the passwd.adjunct.byname map to
entries in the passwd map, which allows local users to obtain the
encrypted passwords of NIS accounts by calling the getpwnam function."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560333"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.debian.org/security/2010/dsa-1973"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade the glibc or eglibc package.

For the oldstable distribution (etch), this problem has been fixed in
version 2.3.6.ds1-13etch10 of the glibc package.

For the stable distribution (lenny), this problem has been fixed in
version 2.7-18lenny2 of the glibc package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cwe_id(255);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:eglibc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:glibc");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:5.0");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/01/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/02/24");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"4.0", prefix:"glibc-doc", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-amd64", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dbg", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dev", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dev-amd64", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dev-i386", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dev-ppc64", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dev-s390x", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-dev-sparc64", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-i386", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-i686", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-pic", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-ppc64", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-prof", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-s390x", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-sparc64", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-sparcv9", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-sparcv9b", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6-xen", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6.1", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6.1-dbg", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6.1-dev", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6.1-pic", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"libc6.1-prof", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"locales", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"locales-all", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"4.0", prefix:"nscd", reference:"2.3.6.ds1-13etch10")) flag++;
if (deb_check(release:"5.0", prefix:"glibc-doc", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"glibc-source", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-amd64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dbg", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-amd64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-i386", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-mips64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-mipsn32", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-ppc64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-s390x", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-dev-sparc64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-i386", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-i686", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-mips64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-mipsn32", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-pic", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-ppc64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-prof", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-s390x", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-sparc64", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-sparcv9b", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6-xen", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6.1", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6.1-alphaev67", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6.1-dbg", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6.1-dev", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6.1-pic", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"libc6.1-prof", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"locales", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"locales-all", reference:"2.7-18lenny2")) flag++;
if (deb_check(release:"5.0", prefix:"nscd", reference:"2.7-18lenny2")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
debiandebian_linuxeglibcp-cpe:/a:debian:debian_linux:eglibc
debiandebian_linuxglibcp-cpe:/a:debian:debian_linux:glibc
debiandebian_linux4.0cpe:/o:debian:debian_linux:4.0
debiandebian_linux5.0cpe:/o:debian:debian_linux:5.0