Lucene search

K

EulerOS 2.0 SP2 : libevent (EulerOS-SA-2019-2515)

EulerOS 2.0 SP2 libevent vulnerabilit

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Debian CVE
CVE-2014-6272
24 Aug 201514:59
debiancve
Debian CVE
CVE-2015-6525
24 Aug 201514:59
debiancve
CVE
CVE-2014-6272
24 Aug 201514:59
cve
CVE
CVE-2015-6525
24 Aug 201514:59
cve
Cvelist
CVE-2014-6272
24 Aug 201514:00
cvelist
Cvelist
CVE-2015-6525
24 Aug 201514:00
cvelist
Tenable Nessus
Amazon Linux 2 : libevent (ALAS-2019-1359)
15 Nov 201900:00
nessus
Tenable Nessus
Debian DSA-3119-1 : libevent - security update
7 Jan 201500:00
nessus
Tenable Nessus
Debian DLA-137-1 : libevent security update
26 Mar 201500:00
nessus
Tenable Nessus
FreeBSD : libevent -- integer overflow in evbuffers (daa8a49b-99b9-11e4-8f66-3085a9a4510d)
12 Jan 201500:00
nessus
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(131668);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/08");

  script_cve_id("CVE-2014-6272", "CVE-2015-6525");
  script_bugtraq_id(71971);

  script_name(english:"EulerOS 2.0 SP2 : libevent (EulerOS-SA-2019-2515)");

  script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
  script_set_attribute(attribute:"description", value:
"According to the versions of the libevent package installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :

  - Multiple integer overflows in the evbuffer API in
    Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and
    2.1.x before 2.1.5-beta allow context-dependent
    attackers to cause a denial of service or possibly have
    other unspecified impact via 'insanely large inputs' to
    the (1) evbuffer_add, (2) evbuffer_expand, or (3)
    bufferevent_write function, which triggers a heap-based
    buffer overflow or an infinite loop. NOTE: this
    identifier has been SPLIT per ADT3 due to different
    affected versions. See CVE-2015-6525 for the functions
    that are only affected in 2.0 and later.(CVE-2014-6272)

  - Multiple integer overflows in the evbuffer API in
    Libevent 2.0.x before 2.0.22 and 2.1.x before
    2.1.5-beta allow context-dependent attackers to cause a
    denial of service or possibly have other unspecified
    impact via 'insanely large inputs' to the (1)
    evbuffer_add, (2) evbuffer_prepend, (3)
    evbuffer_expand, (4) exbuffer_reserve_space, or (5)
    evbuffer_read function, which triggers a heap-based
    buffer overflow or an infinite loop. NOTE: this
    identifier was SPLIT from CVE-2014-6272 per ADT3 due to
    different affected versions.(CVE-2015-6525)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
  # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2515
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a2852e43");
  script_set_attribute(attribute:"solution", value:
"Update the affected libevent packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-6525");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"patch_publication_date", value:"2019/12/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/04");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libevent");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Huawei Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
  script_exclude_keys("Host/EulerOS/uvp_version");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");

sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");

uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);

if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);

flag = 0;

pkgs = ["libevent-2.0.21-4.h4"];

foreach (pkg in pkgs)
  if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_HOLE,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libevent");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
04 Dec 2019 00:00Current
10High risk
Vulners AI Score10
CVSS27.5
EPSS0.005
21
.json
Report