EulerOS 2.0 SP2 libevent vulnerabilit
Reporter | Title | Published | Views | Family All 58 |
---|---|---|---|---|
![]() | CVE-2014-6272 | 24 Aug 201514:59 | – | debiancve |
![]() | CVE-2015-6525 | 24 Aug 201514:59 | – | debiancve |
![]() | CVE-2014-6272 | 24 Aug 201514:59 | – | cve |
![]() | CVE-2015-6525 | 24 Aug 201514:59 | – | cve |
![]() | CVE-2014-6272 | 24 Aug 201514:00 | – | cvelist |
![]() | CVE-2015-6525 | 24 Aug 201514:00 | – | cvelist |
![]() | Amazon Linux 2 : libevent (ALAS-2019-1359) | 15 Nov 201900:00 | – | nessus |
![]() | Debian DSA-3119-1 : libevent - security update | 7 Jan 201500:00 | – | nessus |
![]() | Debian DLA-137-1 : libevent security update | 26 Mar 201500:00 | – | nessus |
![]() | FreeBSD : libevent -- integer overflow in evbuffers (daa8a49b-99b9-11e4-8f66-3085a9a4510d) | 12 Jan 201500:00 | – | nessus |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(131668);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/08");
script_cve_id("CVE-2014-6272", "CVE-2015-6525");
script_bugtraq_id(71971);
script_name(english:"EulerOS 2.0 SP2 : libevent (EulerOS-SA-2019-2515)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the libevent package installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :
- Multiple integer overflows in the evbuffer API in
Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and
2.1.x before 2.1.5-beta allow context-dependent
attackers to cause a denial of service or possibly have
other unspecified impact via 'insanely large inputs' to
the (1) evbuffer_add, (2) evbuffer_expand, or (3)
bufferevent_write function, which triggers a heap-based
buffer overflow or an infinite loop. NOTE: this
identifier has been SPLIT per ADT3 due to different
affected versions. See CVE-2015-6525 for the functions
that are only affected in 2.0 and later.(CVE-2014-6272)
- Multiple integer overflows in the evbuffer API in
Libevent 2.0.x before 2.0.22 and 2.1.x before
2.1.5-beta allow context-dependent attackers to cause a
denial of service or possibly have other unspecified
impact via 'insanely large inputs' to the (1)
evbuffer_add, (2) evbuffer_prepend, (3)
evbuffer_expand, (4) exbuffer_reserve_space, or (5)
evbuffer_read function, which triggers a heap-based
buffer overflow or an infinite loop. NOTE: this
identifier was SPLIT from CVE-2014-6272 per ADT3 due to
different affected versions.(CVE-2015-6525)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2515
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a2852e43");
script_set_attribute(attribute:"solution", value:
"Update the affected libevent packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-6525");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2019/12/04");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/04");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libevent");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["libevent-2.0.21-4.h4"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libevent");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo