EulerOS Virtualization 2.5.2: systemd (EulerOS-SA-2018-1371) is vulnerable to flaws allowing local attackers to freeze system execution and bypass access restrictions
Reporter | Title | Published | Views | Family All 66 |
---|---|---|---|---|
![]() | Huawei EulerOS: Security Advisory for systemd (EulerOS-SA-2019-1217) | 23 Jan 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for systemd (EulerOS-SA-2019-1180) | 23 Jan 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for systemd (EulerOS-SA-2018-1371) | 23 Jan 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for systemd (EulerOS-SA-2020-1436) | 16 Apr 202000:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2018:0546-1) | 19 Apr 202100:00 | – | openvas |
![]() | Fedora Update for systemd FEDORA-2016-894abe29d2 | 7 Dec 201600:00 | – | openvas |
![]() | RedHat Update for systemd RHSA-2016:2610-01 | 4 Nov 201600:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2016-0380) | 28 Jan 202200:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-1762-1) | 25 Apr 201900:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for systemd (EulerOS-SA-2019-1045) | 23 Jan 202000:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(119062);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/04/08");
script_cve_id(
"CVE-2016-7795",
"CVE-2017-18078"
);
script_name(english:"EulerOS Virtualization 2.5.2 : systemd (EulerOS-SA-2018-1371)");
script_summary(english:"Checks the rpm output for the updated packages.");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the systemd packages installed, the
EulerOS Virtualization installation on the remote host is affected by
the following vulnerabilities :
- A flaw was found in the way systemd handled empty
notification messages. A local attacker could use this
flaw to make systemd freeze its execution, preventing
further management of system services, system shutdown,
or zombie process collection via
systemd.i1/4^CVE-2016-7795i1/4%0
- systemd-tmpfiles in systemd before 237 attempts to
support ownership/permission changes on hardlinked
files even if the fs.protected_hardlinks sysctl is
turned off, which allows local users to bypass intended
access restrictions via vectors involving a hard link
to a file for which the user lacks write access, as
demonstrated by changing the ownership of the
/etc/passwd file.i1/4^CVE-2017-18078i1/4%0
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1371
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2c59ea75");
script_set_attribute(attribute:"solution", value:
"Update the affected systemd packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-18078");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2018/11/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/11/21");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libgudev1");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd-networkd");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd-python");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd-resolved");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:systemd-sysv");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:2.5.2");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "2.5.2") audit(AUDIT_OS_NOT, "EulerOS Virtualization 2.5.2");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["libgudev1-219-57.h58",
"systemd-219-57.h58",
"systemd-devel-219-57.h58",
"systemd-libs-219-57.h58",
"systemd-networkd-219-57.h58",
"systemd-python-219-57.h58",
"systemd-resolved-219-57.h58",
"systemd-sysv-219-57.h58"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "systemd");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo