According to the versions of the libarchive package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.(CVE-2019-18408)
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.(CVE-2015-2304)
Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.(CVE-2015-8933)
The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.(CVE-2016-10209)
An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive.(CVE-2017-5601)
read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.(CVE-2017-14502)
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.(CVE-2016-8689)
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.(CVE-2016-8687)
libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.(CVE-2017-14503)
The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.(CVE-201 6-8688)
The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.(CVE-2016-10349)
The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.(CVE-2016-10350)
libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible.
This attack appear to be exploitable via the victim must open a specially crafted RAR archive.(CVE-2018-1000878)
libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.(CVE-2018-1000877)
bsdcpio in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read and crash) via crafted cpio file.(CVE-2015-8915)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(131871);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/04");
script_cve_id(
"CVE-2015-2304",
"CVE-2015-8915",
"CVE-2015-8933",
"CVE-2016-10209",
"CVE-2016-10349",
"CVE-2016-10350",
"CVE-2016-8687",
"CVE-2016-8688",
"CVE-2016-8689",
"CVE-2017-14502",
"CVE-2017-14503",
"CVE-2017-5601",
"CVE-2018-1000877",
"CVE-2018-1000878",
"CVE-2019-18408"
);
script_bugtraq_id(73137);
script_name(english:"EulerOS 2.0 SP2 : libarchive (EulerOS-SA-2019-2379)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the libarchive package installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :
- archive_read_format_rar_read_data in
archive_read_support_format_rar.c in libarchive before
3.4.0 has a use-after-free in a certain ARCHIVE_FAILED
situation, related to
Ppmd7_DecodeSymbol.(CVE-2019-18408)
- Absolute path traversal vulnerability in bsdcpio in
libarchive 3.1.2 and earlier allows remote attackers to
write to arbitrary files via a full pathname in an
archive.(CVE-2015-2304)
- Integer overflow in the archive_read_format_tar_skip
function in archive_read_support_format_tar.c in
libarchive before 3.2.0 allows remote attackers to
cause a denial of service (crash) via a crafted tar
file.(CVE-2015-8933)
- The archive_wstring_append_from_mbs function in
archive_string.c in libarchive 3.2.2 allows remote
attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted
archive file.(CVE-2016-10209)
- An error in the lha_read_file_header_1() function
(archive_read_support_format_lha.c) in libarchive 3.2.2
allows remote attackers to trigger an out-of-bounds
read memory access and subsequently cause a crash via a
specially crafted archive.(CVE-2017-5601)
- read_header in archive_read_support_format_rar.c in
libarchive 3.3.2 suffers from an off-by-one error for
UTF-16 names in RAR archives, leading to an
out-of-bounds read in
archive_read_format_rar_read_header.(CVE-2017-14502)
- The read_Header function in
archive_read_support_format_7zip.c in libarchive 3.2.1
allows remote attackers to cause a denial of service
(out-of-bounds read) via multiple EmptyStream
attributes in a header in a 7zip
archive.(CVE-2016-8689)
- Stack-based buffer overflow in the safe_fprintf
function in tar/util.c in libarchive 3.2.1 allows
remote attackers to cause a denial of service via a
crafted non-printable multibyte character in a
filename.(CVE-2016-8687)
- libarchive 3.3.2 suffers from an out-of-bounds read
within lha_read_data_none() in
archive_read_support_format_lha.c when extracting a
specially crafted lha archive, related to
lha_crc16.(CVE-2017-14503)
- The mtree bidder in libarchive 3.2.1 does not keep
track of line sizes when extending the read-ahead,
which allows remote attackers to cause a denial of
service (crash) via a crafted file, which triggers an
invalid read in the (1) detect_form or (2) bid_entry
function in
libarchive/archive_read_support_format_mtree.c.(CVE-201
6-8688)
- The archive_le32dec function in archive_endian.h in
libarchive 3.2.2 allows remote attackers to cause a
denial of service (heap-based buffer over-read and
application crash) via a crafted file.(CVE-2016-10349)
- The archive_read_format_cab_read_header function in
archive_read_support_format_cab.c in libarchive 3.2.2
allows remote attackers to cause a denial of service
(heap-based buffer over-read and application crash) via
a crafted file.(CVE-2016-10350)
- libarchive version commit
416694915449219d505531b1096384f3237dd6cc onwards
(release v3.1.0 onwards) contains a CWE-416: Use After
Free vulnerability in RAR decoder -
libarchive/archive_read_support_format_rar.c that can
result in Crash/DoS - it is unknown if RCE is possible.
This attack appear to be exploitable via the victim
must open a specially crafted RAR
archive.(CVE-2018-1000878)
- libarchive version commit
416694915449219d505531b1096384f3237dd6cc onwards
(release v3.1.0 onwards) contains a CWE-415: Double
Free vulnerability in RAR decoder -
libarchive/archive_read_support_format_rar.c,
parse_codes(), realloc(rar->lzss.window, new_size) with
new_size = 0 that can result in Crash/DoS. This attack
appear to be exploitable via the victim must open a
specially crafted RAR archive.(CVE-2018-1000877)
- bsdcpio in libarchive before 3.2.0 allows remote
attackers to cause a denial of service (invalid read
and crash) via crafted cpio file.(CVE-2015-8915)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2379
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b1a05c42");
script_set_attribute(attribute:"solution", value:
"Update the affected libarchive packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-1000878");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2019/12/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libarchive");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["libarchive-3.1.2-10.h7"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libarchive");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8687
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000878
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408
www.nessus.org/u?b1a05c42