5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.2 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
According to the versions of the mariadb packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
It was found that the MariaDB client library did not properly check host names against server identities noted in the X.509 certificates when establishing secure connections using TLS/SSL. A man-in-the-middle attacker could possibly use this flaw to impersonate a server to a client. (CVE-2016-2047)
This update fixes several vulnerabilities in the MariaDB database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section.(CVE-2015-4792, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4870, CVE-2015-4879, CVE-2015-4913, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0616)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(99774);
script_version("1.15");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id(
"CVE-2015-4792",
"CVE-2015-4802",
"CVE-2015-4815",
"CVE-2015-4816",
"CVE-2015-4819",
"CVE-2015-4826",
"CVE-2015-4830",
"CVE-2015-4836",
"CVE-2015-4858",
"CVE-2015-4861",
"CVE-2015-4870",
"CVE-2015-4879",
"CVE-2015-4913",
"CVE-2016-0505",
"CVE-2016-0546",
"CVE-2016-0596",
"CVE-2016-0597",
"CVE-2016-0598",
"CVE-2016-0600",
"CVE-2016-0606",
"CVE-2016-0608",
"CVE-2016-0609",
"CVE-2016-0616",
"CVE-2016-2047"
);
script_name(english:"EulerOS 2.0 SP1 : mariadb (EulerOS-SA-2016-1011)");
script_summary(english:"Checks the rpm output for the updated packages.");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the mariadb packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :
- It was found that the MariaDB client library did not
properly check host names against server identities
noted in the X.509 certificates when establishing
secure connections using TLS/SSL. A man-in-the-middle
attacker could possibly use this flaw to impersonate a
server to a client. (CVE-2016-2047)
- This update fixes several vulnerabilities in the
MariaDB database server. Information about these flaws
can be found on the Oracle Critical Patch Update
Advisory page, listed in the References
section.(CVE-2015-4792, CVE-2015-4802, CVE-2015-4815,
CVE-2015-4816, CVE-2015-4819, CVE-2015-4826,
CVE-2015-4830, CVE-2015-4836, CVE-2015-4858,
CVE-2015-4861, CVE-2015-4870, CVE-2015-4879,
CVE-2015-4913, CVE-2016-0505, CVE-2016-0546,
CVE-2016-0596, CVE-2016-0597, CVE-2016-0598,
CVE-2016-0600, CVE-2016-0606, CVE-2016-0608,
CVE-2016-0609, CVE-2016-0616)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2016-1011
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3298c9dc");
script_set_attribute(attribute:"solution", value:
"Update the affected mariadb packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"patch_publication_date", value:"2016/03/31");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/05/01");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb-bench");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb-embedded");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb-server");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mariadb-test");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(1)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP1");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP1", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["mariadb-5.5.47-1",
"mariadb-bench-5.5.47-1",
"mariadb-devel-5.5.47-1",
"mariadb-embedded-5.5.47-1",
"mariadb-libs-5.5.47-1",
"mariadb-server-5.5.47-1",
"mariadb-test-5.5.47-1"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"1", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mariadb");
}
Vendor | Product | Version | CPE |
---|---|---|---|
huawei | euleros | mariadb | p-cpe:/a:huawei:euleros:mariadb |
huawei | euleros | mariadb-bench | p-cpe:/a:huawei:euleros:mariadb-bench |
huawei | euleros | mariadb-devel | p-cpe:/a:huawei:euleros:mariadb-devel |
huawei | euleros | mariadb-embedded | p-cpe:/a:huawei:euleros:mariadb-embedded |
huawei | euleros | mariadb-libs | p-cpe:/a:huawei:euleros:mariadb-libs |
huawei | euleros | mariadb-server | p-cpe:/a:huawei:euleros:mariadb-server |
huawei | euleros | mariadb-test | p-cpe:/a:huawei:euleros:mariadb-test |
huawei | euleros | 2.0 | cpe:/o:huawei:euleros:2.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047
www.nessus.org/u?3298c9dc
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.2 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C