Lucene search

K
nessusThis script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DSA-3363.NASL
HistorySep 21, 2015 - 12:00 a.m.

Debian DSA-3363-1 : owncloud-client - security update

2015-09-2100:00:00
This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
5

Johannes Kliemann discovered a vulnerability in ownCloud Desktop Client, the client-side of the ownCloud file sharing services. The vulnerability allows man-in-the-middle attacks in situations where the server is using self-signed certificates and the connection is already established. If the user in the client side manually distrusts the new certificate, the file syncing will continue using the malicious server as valid.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-3363. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(86025);
  script_version("2.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2015-4456");
  script_xref(name:"DSA", value:"3363");

  script_name(english:"Debian DSA-3363-1 : owncloud-client - security update");
  script_summary(english:"Checks dpkg output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Johannes Kliemann discovered a vulnerability in ownCloud Desktop
Client, the client-side of the ownCloud file sharing services. The
vulnerability allows man-in-the-middle attacks in situations where the
server is using self-signed certificates and the connection is already
established. If the user in the client side manually distrusts the new
certificate, the file syncing will continue using the malicious server
as valid."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://packages.debian.org/source/jessie/owncloud-client"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.debian.org/security/2015/dsa-3363"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade the owncloud-client packages.

For the stable distribution (jessie), this problem has been fixed in
version 1.7.0~beta1+really1.6.4+dfsg-1+deb8u1."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:owncloud-client");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");

  script_set_attribute(attribute:"patch_publication_date", value:"2015/09/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/21");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"8.0", prefix:"libowncloudsync-dev", reference:"1.7.0~beta1+really1.6.4+dfsg-1+deb8u1")) flag++;
if (deb_check(release:"8.0", prefix:"libowncloudsync0", reference:"1.7.0~beta1+really1.6.4+dfsg-1+deb8u1")) flag++;
if (deb_check(release:"8.0", prefix:"owncloud-client", reference:"1.7.0~beta1+really1.6.4+dfsg-1+deb8u1")) flag++;
if (deb_check(release:"8.0", prefix:"owncloud-client-cmd", reference:"1.7.0~beta1+really1.6.4+dfsg-1+deb8u1")) flag++;
if (deb_check(release:"8.0", prefix:"owncloud-client-doc", reference:"1.7.0~beta1+really1.6.4+dfsg-1+deb8u1")) flag++;
if (deb_check(release:"8.0", prefix:"owncloud-client-l10n", reference:"1.7.0~beta1+really1.6.4+dfsg-1+deb8u1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_note(port:0, extra:deb_report_get());
  else security_note(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
debiandebian_linuxowncloud-clientp-cpe:/a:debian:debian_linux:owncloud-client
debiandebian_linux8.0cpe:/o:debian:debian_linux:8.0