ID EULEROS_SA-2019-2371.NASL Type nessus Reporter This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-12-10T00:00:00
Description
According to the version of the NetworkManager packages installed,
the EulerOS installation on the remote host is affected by the
following vulnerability :
GNOME NetworkManager version 1.10.2 and earlier
contains a Information Exposure (CWE-200) vulnerability
in DNS resolver that can result in Private DNS queries
leaked to local network's DNS servers, while on VPN.
This vulnerability appears to have been fixed in Some
Ubuntu 16.04 packages were fixed, but later updates
removed the fix. cf.
https://bugs.launchpad.net/ubuntu/+bug/1754671 an
upstream fix does not appear to be available at this
time.(CVE-2018-1000135)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(131863);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id(
"CVE-2018-1000135"
);
script_name(english:"EulerOS 2.0 SP2 : NetworkManager (EulerOS-SA-2019-2371)");
script_summary(english:"Checks the rpm output for the updated package.");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the version of the NetworkManager packages installed,
the EulerOS installation on the remote host is affected by the
following vulnerability :
- GNOME NetworkManager version 1.10.2 and earlier
contains a Information Exposure (CWE-200) vulnerability
in DNS resolver that can result in Private DNS queries
leaked to local network's DNS servers, while on VPN.
This vulnerability appears to have been fixed in Some
Ubuntu 16.04 packages were fixed, but later updates
removed the fix. cf.
https://bugs.launchpad.net/ubuntu/+bug/1754671 an
upstream fix does not appear to be available at this
time.(CVE-2018-1000135)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2371
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?200b357f");
script_set_attribute(attribute:"solution", value:
"Update the affected NetworkManager package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"patch_publication_date", value:"2019/12/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-adsl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-bluetooth");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-config-server");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-glib");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-libnm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-team");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-tui");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-wifi");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:NetworkManager-wwan");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["NetworkManager-1.10.2-16.h8",
"NetworkManager-adsl-1.10.2-16.h8",
"NetworkManager-bluetooth-1.10.2-16.h8",
"NetworkManager-config-server-1.10.2-16.h8",
"NetworkManager-glib-1.10.2-16.h8",
"NetworkManager-libnm-1.10.2-16.h8",
"NetworkManager-team-1.10.2-16.h8",
"NetworkManager-tui-1.10.2-16.h8",
"NetworkManager-wifi-1.10.2-16.h8",
"NetworkManager-wwan-1.10.2-16.h8"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "NetworkManager");
}
{"id": "EULEROS_SA-2019-2371.NASL", "bulletinFamily": "scanner", "title": "EulerOS 2.0 SP2 : NetworkManager (EulerOS-SA-2019-2371)", "description": "According to the version of the NetworkManager packages installed,\nthe EulerOS installation on the remote host is affected by the\nfollowing vulnerability :\n\n - GNOME NetworkManager version 1.10.2 and earlier\n contains a Information Exposure (CWE-200) vulnerability\n in DNS resolver that can result in Private DNS queries\n leaked to local network's DNS servers, while on VPN.\n This vulnerability appears to have been fixed in Some\n Ubuntu 16.04 packages were fixed, but later updates\n removed the fix. cf.\n https://bugs.launchpad.net/ubuntu/+bug/1754671 an\n upstream fix does not appear to be available at this\n time.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2019-12-10T00:00:00", "modified": "2019-12-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/131863", "reporter": "This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?200b357f"], "cvelist": ["CVE-2018-1000135"], "type": "nessus", "lastseen": "2021-01-07T09:00:44", "edition": 11, "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-1000135"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220192371", "OPENVAS:1361412562311220201524", "OPENVAS:1361412562311220192698", "OPENVAS:1361412562311220201722", "OPENVAS:1361412562311220192636", "OPENVAS:1361412562310852531"]}, {"type": "nessus", "idList": ["EULEROS_SA-2019-2698.NASL", "EULEROS_SA-2020-1722.NASL", "EULEROS_SA-2020-1524.NASL", "EULEROS_SA-2019-2636.NASL", "SUSE_SU-2019-1369-1.NASL", "OPENSUSE-2019-1494.NASL", "PHOTONOS_PHSA-2020-1_0-0291_NETWORKMANAGER.NASL"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1494-1"]}], "modified": "2021-01-07T09:00:44", "rev": 2}, "score": {"value": 6.1, "vector": "NONE", "modified": "2021-01-07T09:00:44", "rev": 2}, "vulnersScore": 6.1}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131863);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1000135\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : NetworkManager (EulerOS-SA-2019-2371)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the NetworkManager packages installed,\nthe EulerOS installation on the remote host is affected by the\nfollowing vulnerability :\n\n - GNOME NetworkManager version 1.10.2 and earlier\n contains a Information Exposure (CWE-200) vulnerability\n in DNS resolver that can result in Private DNS queries\n leaked to local network's DNS servers, while on VPN.\n This vulnerability appears to have been fixed in Some\n Ubuntu 16.04 packages were fixed, but later updates\n removed the fix. cf.\n https://bugs.launchpad.net/ubuntu/+bug/1754671 an\n upstream fix does not appear to be available at this\n time.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2371\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?200b357f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected NetworkManager package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-adsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-bluetooth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-config-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-libnm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-team\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-wifi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-wwan\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"NetworkManager-1.10.2-16.h8\",\n \"NetworkManager-adsl-1.10.2-16.h8\",\n \"NetworkManager-bluetooth-1.10.2-16.h8\",\n \"NetworkManager-config-server-1.10.2-16.h8\",\n \"NetworkManager-glib-1.10.2-16.h8\",\n \"NetworkManager-libnm-1.10.2-16.h8\",\n \"NetworkManager-team-1.10.2-16.h8\",\n \"NetworkManager-tui-1.10.2-16.h8\",\n \"NetworkManager-wifi-1.10.2-16.h8\",\n \"NetworkManager-wwan-1.10.2-16.h8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "naslFamily": "Huawei Local Security Checks", "pluginID": "131863", "cpe": ["p-cpe:/a:huawei:euleros:NetworkManager-bluetooth", "p-cpe:/a:huawei:euleros:NetworkManager-wifi", "p-cpe:/a:huawei:euleros:NetworkManager-wwan", "p-cpe:/a:huawei:euleros:NetworkManager-config-server", "p-cpe:/a:huawei:euleros:NetworkManager-adsl", "p-cpe:/a:huawei:euleros:NetworkManager", "p-cpe:/a:huawei:euleros:NetworkManager-libnm", "p-cpe:/a:huawei:euleros:NetworkManager-team", "p-cpe:/a:huawei:euleros:NetworkManager-glib", "cpe:/o:huawei:euleros:2.0", "p-cpe:/a:huawei:euleros:NetworkManager-tui"], "scheme": null, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}}
{"cve": [{"lastseen": "2020-12-09T20:25:29", "description": "GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. https://bugs.launchpad.net/ubuntu/+bug/1754671 an upstream fix does not appear to be available at this time.", "edition": 6, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-03-20T13:29:00", "title": "CVE-2018-1000135", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-1000135"], "modified": "2019-06-03T12:29:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/a:gnome:networkmanager:1.10.2"], "id": "CVE-2018-1000135", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000135", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:networkmanager:1.10.2:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-01-27T18:35:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192636", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192636", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2019-2636)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2636\");\n script_version(\"2020-01-23T13:52:22+0000\");\n script_cve_id(\"CVE-2018-1000135\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 13:52:22 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 13:10:35 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2019-2636)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2636\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2636\");\n script_xref(name:\"URL\", value:\"https://bugs.launchpad.net/ubuntu/+bug/1754671\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'NetworkManager' package(s) announced via the EulerOS-SA-2019-2636 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. the references an upstream fix does not appear to be available at this time.(CVE-2018-1000135)\");\n\n script_tag(name:\"affected\", value:\"'NetworkManager' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-adsl\", rpm:\"NetworkManager-adsl~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-bluetooth\", rpm:\"NetworkManager-bluetooth~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-config-server\", rpm:\"NetworkManager-config-server~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-libnm\", rpm:\"NetworkManager-libnm~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-team\", rpm:\"NetworkManager-team~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-tui\", rpm:\"NetworkManager-tui~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-wifi\", rpm:\"NetworkManager-wifi~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-wwan\", rpm:\"NetworkManager-wwan~1.10.2~16.h9\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-05-06T01:09:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-04-30T00:00:00", "published": "2020-04-30T00:00:00", "id": "OPENVAS:1361412562311220201524", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201524", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2020-1524)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1524\");\n script_version(\"2020-04-30T12:11:26+0000\");\n script_cve_id(\"CVE-2018-1000135\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-04-30 12:11:26 +0000 (Thu, 30 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-04-30 12:11:26 +0000 (Thu, 30 Apr 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2020-1524)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.2\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1524\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1524\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'NetworkManager' package(s) announced via the EulerOS-SA-2020-1524 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An information exposure vulnerability has been found in NetworkManager when dnsmasq is used in DNS processing mode. An attacker in control of a DNS server could receive DNS queries even though a Virtual Private Network (VPN) was configured on the vulnerable machine.(CVE-2018-1000135)\");\n\n script_tag(name:\"affected\", value:\"'NetworkManager' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.2.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.2.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~1.10.2~16.h5\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-config-server\", rpm:\"NetworkManager-config-server~1.10.2~16.h5\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~1.10.2~16.h5\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-libnm\", rpm:\"NetworkManager-libnm~1.10.2~16.h5\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-team\", rpm:\"NetworkManager-team~1.10.2~16.h5\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-tui\", rpm:\"NetworkManager-tui~1.10.2~16.h5\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-01-27T18:41:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192698", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192698", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2019-2698)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2698\");\n script_version(\"2020-01-23T13:52:22+0000\");\n script_cve_id(\"CVE-2018-1000135\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 13:52:22 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 13:14:43 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2019-2698)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2698\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2698\");\n script_xref(name:\"URL\", value:\"https://bugs.launchpad.net/ubuntu/+bug/1754671\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'NetworkManager' package(s) announced via the EulerOS-SA-2019-2698 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. the linked references an upstream fix does not appear to be available at this time.(CVE-2018-1000135)\");\n\n script_tag(name:\"affected\", value:\"'NetworkManager' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-adsl\", rpm:\"NetworkManager-adsl~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-bluetooth\", rpm:\"NetworkManager-bluetooth~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-config-server\", rpm:\"NetworkManager-config-server~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-libnm\", rpm:\"NetworkManager-libnm~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-team\", rpm:\"NetworkManager-team~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-tui\", rpm:\"NetworkManager-tui~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-wifi\", rpm:\"NetworkManager-wifi~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-wwan\", rpm:\"NetworkManager-wwan~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-01-27T18:35:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192371", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192371", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2019-2371)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2371\");\n script_version(\"2020-01-23T13:52:22+0000\");\n script_cve_id(\"CVE-2018-1000135\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 13:52:22 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:51:43 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2019-2371)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2371\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2371\");\n script_xref(name:\"URL\", value:\"https://bugs.launchpad.net/ubuntu/+bug/1754671\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'NetworkManager' package(s) announced via the EulerOS-SA-2019-2371 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. the references an upstream fix does not appear to be available at this time.(CVE-2018-1000135)\");\n\n script_tag(name:\"affected\", value:\"'NetworkManager' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-adsl\", rpm:\"NetworkManager-adsl~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-bluetooth\", rpm:\"NetworkManager-bluetooth~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-config-server\", rpm:\"NetworkManager-config-server~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-libnm\", rpm:\"NetworkManager-libnm~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-team\", rpm:\"NetworkManager-team~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-tui\", rpm:\"NetworkManager-tui~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-wifi\", rpm:\"NetworkManager-wifi~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-wwan\", rpm:\"NetworkManager-wwan~1.10.2~16.h8\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-01-31T16:48:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-06-04T00:00:00", "id": "OPENVAS:1361412562310852531", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852531", "type": "openvas", "title": "openSUSE: Security Advisory for NetworkManager (openSUSE-SU-2019:1494-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852531\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2018-1000135\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-06-04 02:00:47 +0000 (Tue, 04 Jun 2019)\");\n script_name(\"openSUSE: Security Advisory for NetworkManager (openSUSE-SU-2019:1494-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:1494-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00005.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'NetworkManager'\n package(s) announced via the openSUSE-SU-2019:1494-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for NetworkManager fixes the following issues:\n\n The following security issue was fixed:\n\n - CVE-2018-1000135: A potential leak of private DNS queries to other DNS\n servers could happen while on VPN (bsc#1086263, bgo#746422).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-1494=1\");\n\n script_tag(name:\"affected\", value:\"'NetworkManager' package(s) on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-debuginfo\", rpm:\"NetworkManager-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-debugsource\", rpm:\"NetworkManager-debugsource~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-devel\", rpm:\"NetworkManager-devel~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib-vpn1\", rpm:\"libnm-glib-vpn1~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib-vpn1-debuginfo\", rpm:\"libnm-glib-vpn1-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib4\", rpm:\"libnm-glib4~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib4-debuginfo\", rpm:\"libnm-glib4-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-util2\", rpm:\"libnm-util2~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-util2-debuginfo\", rpm:\"libnm-util2-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm0\", rpm:\"libnm0~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm0-debuginfo\", rpm:\"libnm0-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"typelib-1_0-NM-1_0\", rpm:\"typelib-1_0-NM-1_0~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"typelib-1_0-NMClient-1_0\", rpm:\"typelib-1_0-NMClient-1_0~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"typelib-1_0-NetworkManager-1_0\", rpm:\"typelib-1_0-NetworkManager-1_0~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-devel-32bit\", rpm:\"NetworkManager-devel-32bit~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib-vpn1-32bit\", rpm:\"libnm-glib-vpn1-32bit~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib-vpn1-32bit-debuginfo\", rpm:\"libnm-glib-vpn1-32bit-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib4-32bit\", rpm:\"libnm-glib4-32bit~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-glib4-32bit-debuginfo\", rpm:\"libnm-glib4-32bit-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-util2-32bit\", rpm:\"libnm-util2-32bit~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libnm-util2-32bit-debuginfo\", rpm:\"libnm-util2-32bit-debuginfo~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-branding-upstream\", rpm:\"NetworkManager-branding-upstream~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-lang\", rpm:\"NetworkManager-lang~1.10.6~lp150.4.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-07-21T19:54:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-07-03T00:00:00", "published": "2020-07-03T00:00:00", "id": "OPENVAS:1361412562311220201722", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201722", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2020-1722)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1722\");\n script_version(\"2020-07-03T06:18:47+0000\");\n script_cve_id(\"CVE-2018-1000135\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-07-03 06:18:47 +0000 (Fri, 03 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 06:18:47 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for NetworkManager (EulerOS-SA-2020-1722)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1722\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1722\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'NetworkManager' package(s) announced via the EulerOS-SA-2020-1722 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An information exposure vulnerability has been found in NetworkManager when dnsmasq is used in DNS processing mode. An attacker in control of a DNS server could receive DNS queries even though a Virtual Private Network (VPN) was configured on the vulnerable machine.(CVE-2018-1000135)\");\n\n script_tag(name:\"affected\", value:\"'NetworkManager' package(s) on Huawei EulerOS Virtualization 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-config-server\", rpm:\"NetworkManager-config-server~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-libnm\", rpm:\"NetworkManager-libnm~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-team\", rpm:\"NetworkManager-team~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"NetworkManager-tui\", rpm:\"NetworkManager-tui~1.10.2~16.h5.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "suse": [{"lastseen": "2019-06-03T14:41:42", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1000135"], "description": "This update for NetworkManager fixes the following issues:\n\n Following security issue was fixed:\n\n - CVE-2018-1000135: A potential leak of private DNS queries to other DNS\n servers could happen while on VPN (bsc#1086263, bgo#746422).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-06-03T12:17:39", "published": "2019-06-03T12:17:39", "id": "OPENSUSE-SU-2019:1494-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00005.html", "title": "Security update for NetworkManager (moderate)", "type": "suse", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-07T09:04:07", "description": "According to the version of the NetworkManager packages installed,\nthe EulerOS Virtualization for ARM 64 installation on the remote host\nis affected by the following vulnerability :\n\n - An information exposure vulnerability has been found in\n NetworkManager when dnsmasq is used in DNS processing\n mode. An attacker in control of a DNS server could\n receive DNS queries even though a Virtual Private\n Network (VPN) was configured on the vulnerable\n machine.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2020-05-01T00:00:00", "title": "EulerOS Virtualization for ARM 64 3.0.2.0 : NetworkManager (EulerOS-SA-2020-1524)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2020-05-01T00:00:00", "cpe": ["cpe:/o:huawei:euleros:uvp:3.0.2.0", "p-cpe:/a:huawei:euleros:NetworkManager-config-server", "p-cpe:/a:huawei:euleros:NetworkManager", "p-cpe:/a:huawei:euleros:NetworkManager-libnm", "p-cpe:/a:huawei:euleros:NetworkManager-team", "p-cpe:/a:huawei:euleros:NetworkManager-glib", "p-cpe:/a:huawei:euleros:NetworkManager-tui"], "id": "EULEROS_SA-2020-1524.NASL", "href": "https://www.tenable.com/plugins/nessus/136227", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136227);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1000135\"\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.2.0 : NetworkManager (EulerOS-SA-2020-1524)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the NetworkManager packages installed,\nthe EulerOS Virtualization for ARM 64 installation on the remote host\nis affected by the following vulnerability :\n\n - An information exposure vulnerability has been found in\n NetworkManager when dnsmasq is used in DNS processing\n mode. An attacker in control of a DNS server could\n receive DNS queries even though a Virtual Private\n Network (VPN) was configured on the vulnerable\n machine.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1524\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3e0cecbf\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected NetworkManager package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-config-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-libnm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-team\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"NetworkManager-1.10.2-16.h5\",\n \"NetworkManager-config-server-1.10.2-16.h5\",\n \"NetworkManager-glib-1.10.2-16.h5\",\n \"NetworkManager-libnm-1.10.2-16.h5\",\n \"NetworkManager-team-1.10.2-16.h5\",\n \"NetworkManager-tui-1.10.2-16.h5\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T09:01:45", "description": "According to the version of the NetworkManager packages installed,\nthe EulerOS installation on the remote host is affected by the\nfollowing vulnerability :\n\n - GNOME NetworkManager version 1.10.2 and earlier\n contains a Information Exposure (CWE-200) vulnerability\n in DNS resolver that can result in Private DNS queries\n leaked to local network's DNS servers, while on VPN.\n This vulnerability appears to have been fixed in Some\n Ubuntu 16.04 packages were fixed, but later updates\n removed the fix. cf.\n https://bugs.launchpad.net/ubuntu/+bug/1754671 an\n upstream fix does not appear to be available at this\n time.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 11, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2019-12-23T00:00:00", "title": "EulerOS 2.0 SP5 : NetworkManager (EulerOS-SA-2019-2698)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2019-12-23T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:NetworkManager-bluetooth", "p-cpe:/a:huawei:euleros:NetworkManager-wifi", "p-cpe:/a:huawei:euleros:NetworkManager-wwan", "p-cpe:/a:huawei:euleros:NetworkManager-config-server", "p-cpe:/a:huawei:euleros:NetworkManager-adsl", "p-cpe:/a:huawei:euleros:NetworkManager", "p-cpe:/a:huawei:euleros:NetworkManager-libnm", "p-cpe:/a:huawei:euleros:NetworkManager-team", "p-cpe:/a:huawei:euleros:NetworkManager-glib", "cpe:/o:huawei:euleros:2.0", "p-cpe:/a:huawei:euleros:NetworkManager-tui"], "id": "EULEROS_SA-2019-2698.NASL", "href": "https://www.tenable.com/plugins/nessus/132365", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132365);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1000135\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : NetworkManager (EulerOS-SA-2019-2698)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the NetworkManager packages installed,\nthe EulerOS installation on the remote host is affected by the\nfollowing vulnerability :\n\n - GNOME NetworkManager version 1.10.2 and earlier\n contains a Information Exposure (CWE-200) vulnerability\n in DNS resolver that can result in Private DNS queries\n leaked to local network's DNS servers, while on VPN.\n This vulnerability appears to have been fixed in Some\n Ubuntu 16.04 packages were fixed, but later updates\n removed the fix. cf.\n https://bugs.launchpad.net/ubuntu/+bug/1754671 an\n upstream fix does not appear to be available at this\n time.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2698\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f5208be1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected NetworkManager package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-adsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-bluetooth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-config-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-libnm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-team\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-wifi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-wwan\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"NetworkManager-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-adsl-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-bluetooth-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-config-server-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-glib-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-libnm-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-team-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-tui-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-wifi-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-wwan-1.10.2-16.h5.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T09:01:36", "description": "According to the version of the NetworkManager packages installed,\nthe EulerOS installation on the remote host is affected by the\nfollowing vulnerability :\n\n - GNOME NetworkManager version 1.10.2 and earlier\n contains a Information Exposure (CWE-200) vulnerability\n in DNS resolver that can result in Private DNS queries\n leaked to local network's DNS servers, while on VPN.\n This vulnerability appears to have been fixed in Some\n Ubuntu 16.04 packages were fixed, but later updates\n removed the fix. cf.\n https://bugs.launchpad.net/ubuntu/+bug/1754671 an\n upstream fix does not appear to be available at this\n time.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 11, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2019-12-18T00:00:00", "title": "EulerOS 2.0 SP3 : NetworkManager (EulerOS-SA-2019-2636)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2019-12-18T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:NetworkManager-bluetooth", "p-cpe:/a:huawei:euleros:NetworkManager-wifi", "p-cpe:/a:huawei:euleros:NetworkManager-wwan", "p-cpe:/a:huawei:euleros:NetworkManager-config-server", "p-cpe:/a:huawei:euleros:NetworkManager-adsl", "p-cpe:/a:huawei:euleros:NetworkManager", "p-cpe:/a:huawei:euleros:NetworkManager-libnm", "p-cpe:/a:huawei:euleros:NetworkManager-team", "p-cpe:/a:huawei:euleros:NetworkManager-glib", "cpe:/o:huawei:euleros:2.0", "p-cpe:/a:huawei:euleros:NetworkManager-tui"], "id": "EULEROS_SA-2019-2636.NASL", "href": "https://www.tenable.com/plugins/nessus/132171", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132171);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1000135\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : NetworkManager (EulerOS-SA-2019-2636)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the NetworkManager packages installed,\nthe EulerOS installation on the remote host is affected by the\nfollowing vulnerability :\n\n - GNOME NetworkManager version 1.10.2 and earlier\n contains a Information Exposure (CWE-200) vulnerability\n in DNS resolver that can result in Private DNS queries\n leaked to local network's DNS servers, while on VPN.\n This vulnerability appears to have been fixed in Some\n Ubuntu 16.04 packages were fixed, but later updates\n removed the fix. cf.\n https://bugs.launchpad.net/ubuntu/+bug/1754671 an\n upstream fix does not appear to be available at this\n time.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2636\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c12762b2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected NetworkManager package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-adsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-bluetooth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-config-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-libnm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-team\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-wifi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-wwan\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"NetworkManager-1.10.2-16.h9\",\n \"NetworkManager-adsl-1.10.2-16.h9\",\n \"NetworkManager-bluetooth-1.10.2-16.h9\",\n \"NetworkManager-config-server-1.10.2-16.h9\",\n \"NetworkManager-glib-1.10.2-16.h9\",\n \"NetworkManager-libnm-1.10.2-16.h9\",\n \"NetworkManager-team-1.10.2-16.h9\",\n \"NetworkManager-tui-1.10.2-16.h9\",\n \"NetworkManager-wifi-1.10.2-16.h9\",\n \"NetworkManager-wwan-1.10.2-16.h9\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-07T09:05:06", "description": "According to the version of the NetworkManager packages installed,\nthe EulerOS Virtualization installation on the remote host is\naffected by the following vulnerability :\n\n - An information exposure vulnerability has been found in\n NetworkManager when dnsmasq is used in DNS processing\n mode. An attacker in control of a DNS server could\n receive DNS queries even though a Virtual Private\n Network (VPN) was configured on the vulnerable\n machine.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2020-07-01T00:00:00", "title": "EulerOS Virtualization 3.0.6.0 : NetworkManager (EulerOS-SA-2020-1722)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2020-07-01T00:00:00", "cpe": ["cpe:/o:huawei:euleros:uvp:3.0.6.0", "p-cpe:/a:huawei:euleros:NetworkManager-config-server", "p-cpe:/a:huawei:euleros:NetworkManager", "p-cpe:/a:huawei:euleros:NetworkManager-libnm", "p-cpe:/a:huawei:euleros:NetworkManager-team", "p-cpe:/a:huawei:euleros:NetworkManager-glib", "p-cpe:/a:huawei:euleros:NetworkManager-tui"], "id": "EULEROS_SA-2020-1722.NASL", "href": "https://www.tenable.com/plugins/nessus/137941", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137941);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1000135\"\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.6.0 : NetworkManager (EulerOS-SA-2020-1722)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the NetworkManager packages installed,\nthe EulerOS Virtualization installation on the remote host is\naffected by the following vulnerability :\n\n - An information exposure vulnerability has been found in\n NetworkManager when dnsmasq is used in DNS processing\n mode. An attacker in control of a DNS server could\n receive DNS queries even though a Virtual Private\n Network (VPN) was configured on the vulnerable\n machine.(CVE-2018-1000135)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1722\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?03cce000\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected NetworkManager package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-config-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-libnm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-team\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:NetworkManager-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.6.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.6.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.6.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"NetworkManager-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-config-server-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-glib-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-libnm-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-team-1.10.2-16.h5.eulerosv2r7\",\n \"NetworkManager-tui-1.10.2-16.h5.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-05-09T08:51:47", "description": "An update of the NetworkManager package has been released.", "edition": 2, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2020-05-07T00:00:00", "title": "Photon OS 1.0: Networkmanager PHSA-2020-1.0-0291", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2020-05-07T00:00:00", "cpe": ["cpe:/o:vmware:photonos:1.0", "p-cpe:/a:vmware:photonos:NetworkManager"], "id": "PHOTONOS_PHSA-2020-1_0-0291_NETWORKMANAGER.NASL", "href": "https://www.tenable.com/plugins/nessus/136405", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2020-1.0-0291. The text\n# itself is copyright (C) VMware, Inc.\n\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136405);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/08\");\n\n script_cve_id(\"CVE-2018-1000135\");\n script_bugtraq_id(103478);\n\n script_name(english:\"Photon OS 1.0: Networkmanager PHSA-2020-1.0-0291\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the NetworkManager package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-1.0-291.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-1000135\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:1.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 1\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 1.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-1.0\", cpu:\"x86_64\", reference:\"NetworkManager-1.22.10-1.ph1\")) flag++;\nif (rpm_check(release:\"PhotonOS-1.0\", cpu:\"x86_64\", reference:\"NetworkManager-debuginfo-1.22.10-1.ph1\")) flag++;\nif (rpm_check(release:\"PhotonOS-1.0\", cpu:\"x86_64\", reference:\"NetworkManager-devel-1.22.10-1.ph1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-09-23T16:33:13", "description": "This update for NetworkManager fixes the following issues :\n\nFollowing security issue was fixed :\n\n - CVE-2018-1000135: A potential leak of private DNS\n queries to other DNS servers could happen while on VPN\n (bsc#1086263, bgo#746422).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "edition": 14, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2019-06-04T00:00:00", "title": "openSUSE Security Update : NetworkManager (openSUSE-2019-1494)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2019-06-04T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:NetworkManager-branding-upstream", "p-cpe:/a:novell:opensuse:libnm-glib4-32bit", "p-cpe:/a:novell:opensuse:NetworkManager-devel", "p-cpe:/a:novell:opensuse:NetworkManager-devel-32bit", "p-cpe:/a:novell:opensuse:typelib-1_0-NetworkManager-1_0", "cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:NetworkManager-lang", "p-cpe:/a:novell:opensuse:libnm0", "p-cpe:/a:novell:opensuse:NetworkManager-debugsource", "p-cpe:/a:novell:opensuse:libnm-glib4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:typelib-1_0-NM-1_0", "p-cpe:/a:novell:opensuse:libnm-glib4", "p-cpe:/a:novell:opensuse:libnm-glib4-debuginfo", "p-cpe:/a:novell:opensuse:typelib-1_0-NMClient-1_0", "p-cpe:/a:novell:opensuse:libnm-util2-debuginfo", "p-cpe:/a:novell:opensuse:libnm-util2-32bit", "p-cpe:/a:novell:opensuse:libnm-glib-vpn1-32bit", "p-cpe:/a:novell:opensuse:NetworkManager-debuginfo", "p-cpe:/a:novell:opensuse:libnm-glib-vpn1", "p-cpe:/a:novell:opensuse:libnm-util2-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libnm0-debuginfo", "p-cpe:/a:novell:opensuse:NetworkManager", "p-cpe:/a:novell:opensuse:libnm-util2", "p-cpe:/a:novell:opensuse:libnm-glib-vpn1-debuginfo", "p-cpe:/a:novell:opensuse:libnm-glib-vpn1-32bit-debuginfo"], "id": "OPENSUSE-2019-1494.NASL", "href": "https://www.tenable.com/plugins/nessus/125694", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-1494.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125694);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/22\");\n\n script_cve_id(\"CVE-2018-1000135\");\n\n script_name(english:\"openSUSE Security Update : NetworkManager (openSUSE-2019-1494)\");\n script_summary(english:\"Check for the openSUSE-2019-1494 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for NetworkManager fixes the following issues :\n\nFollowing security issue was fixed :\n\n - CVE-2018-1000135: A potential leak of private DNS\n queries to other DNS servers could happen while on VPN\n (bsc#1086263, bgo#746422).\n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1086263\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected NetworkManager packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib-vpn1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib-vpn1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib-vpn1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib-vpn1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-glib4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-util2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-util2-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-util2-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm-util2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libnm0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:typelib-1_0-NM-1_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:typelib-1_0-NMClient-1_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:typelib-1_0-NetworkManager-1_0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"NetworkManager-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"NetworkManager-branding-upstream-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"NetworkManager-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"NetworkManager-debugsource-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"NetworkManager-devel-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"NetworkManager-lang-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm-glib-vpn1-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm-glib-vpn1-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm-glib4-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm-glib4-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm-util2-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm-util2-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm0-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libnm0-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"typelib-1_0-NM-1_0-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"typelib-1_0-NMClient-1_0-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"typelib-1_0-NetworkManager-1_0-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"NetworkManager-devel-32bit-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libnm-glib-vpn1-32bit-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libnm-glib-vpn1-32bit-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libnm-glib4-32bit-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libnm-glib4-32bit-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libnm-util2-32bit-1.10.6-lp150.4.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libnm-util2-32bit-debuginfo-1.10.6-lp150.4.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager / NetworkManager-branding-upstream / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-14T06:18:14", "description": "This update for NetworkManager fixes the following issues :\n\nFollowing security issue was fixed :\n\nCVE-2018-1000135: A potential leak of private DNS queries to other DNS\nservers could happen while on VPN (bsc#1086263, bgo#746422).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 18, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2019-05-29T00:00:00", "title": "SUSE SLED15 / SLES15 Security Update : NetworkManager (SUSE-SU-2019:1369-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000135"], "modified": "2019-05-29T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libnm-glib-vpn1-debuginfo", "p-cpe:/a:novell:suse_linux:libnm-util2", "p-cpe:/a:novell:suse_linux:libnm0", "p-cpe:/a:novell:suse_linux:NetworkManager-debuginfo", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:libnm-glib4", "p-cpe:/a:novell:suse_linux:libnm-glib-vpn1", "p-cpe:/a:novell:suse_linux:libnm0-debuginfo", "p-cpe:/a:novell:suse_linux:typelib-1_0-NMClient", "p-cpe:/a:novell:suse_linux:typelib-1_0-NM", "p-cpe:/a:novell:suse_linux:NetworkManager", "p-cpe:/a:novell:suse_linux:NetworkManager-debugsource", "p-cpe:/a:novell:suse_linux:typelib-1_0-NetworkManager", "p-cpe:/a:novell:suse_linux:libnm-util2-debuginfo", "p-cpe:/a:novell:suse_linux:NetworkManager-devel", "p-cpe:/a:novell:suse_linux:libnm-glib4-debuginfo"], "id": "SUSE_SU-2019-1369-1.NASL", "href": "https://www.tenable.com/plugins/nessus/125539", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:1369-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125539);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2018-1000135\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : NetworkManager (SUSE-SU-2019:1369-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for NetworkManager fixes the following issues :\n\nFollowing security issue was fixed :\n\nCVE-2018-1000135: A potential leak of private DNS queries to other DNS\nservers could happen while on VPN (bsc#1086263, bgo#746422).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1086263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-1000135/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20191369-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78672c05\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15:zypper in -t patch\nSUSE-SLE-Product-WE-15-2019-1369=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-2019-1369=1\n\nSUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t\npatch SUSE-SLE-Module-Desktop-Applications-15-2019-1369=1\n\nSUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-2019-1369=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:NetworkManager-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:NetworkManager-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:NetworkManager-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm-glib-vpn1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm-glib-vpn1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm-glib4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm-glib4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm-util2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm-util2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libnm0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:typelib-1_0-NM\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:typelib-1_0-NMClient\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:typelib-1_0-NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/03/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"NetworkManager-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"NetworkManager-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"NetworkManager-debugsource-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"NetworkManager-devel-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm-glib-vpn1-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm-glib-vpn1-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm-glib4-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm-glib4-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm-util2-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm-util2-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libnm0-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"typelib-1_0-NM-1_0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"typelib-1_0-NMClient-1_0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"typelib-1_0-NetworkManager-1_0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"NetworkManager-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"NetworkManager-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"NetworkManager-debugsource-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"NetworkManager-devel-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm-glib-vpn1-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm-glib-vpn1-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm-glib4-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm-glib4-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm-util2-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm-util2-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libnm0-debuginfo-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"typelib-1_0-NM-1_0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"typelib-1_0-NMClient-1_0-1.10.6-5.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"typelib-1_0-NetworkManager-1_0-1.10.6-5.6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}