7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.011 Low
EPSS
Percentile
84.6%
According to the versions of the irssi package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
An issue was discovered in Irssi before 1.0.4. When receiving messages with invalid time stamps, Irssi would try to dereference a NULL pointer.(CVE-2017-10965)
An issue was discovered in Irssi before 1.0.4. While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it. This would then result in use-after-free conditions on each access of the hash table.(CVE-2017-10966)
In Irssi before 1.0.3, when receiving a DCC message without source nick/host, it attempts to dereference a NULL pointer. Thus, remote IRC servers can cause a crash.(CVE-2017-9468)
In Irssi before 1.0.3, when receiving certain incorrectly quoted DCC files, it tries to find the terminating quote one byte before the allocated memory.
Thus, remote attackers might be able to cause a crash.(CVE-2017-9469)
In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.(CVE-2018-5208)
Irssi before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a string containing a formatting sequence (%[) without a closing bracket (]).(CVE-2017-5356)
The nickcmp function in Irssi before 0.8.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a message without a nick.(CVE-2017-5193)
Use-after-free vulnerability in Irssi before 0.8.21 allows remote attackers to cause a denial of service (crash) via an invalid nick message.(CVE-2017-5194)
When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer.(CVE-2018-5206)
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.(CVE-2018-5207)
When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string.(CVE-2018-5205)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(132130);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/04");
script_cve_id(
"CVE-2017-10965",
"CVE-2017-10966",
"CVE-2017-5193",
"CVE-2017-5194",
"CVE-2017-5356",
"CVE-2017-9468",
"CVE-2017-9469",
"CVE-2018-5205",
"CVE-2018-5206",
"CVE-2018-5207",
"CVE-2018-5208"
);
script_name(english:"EulerOS 2.0 SP3 : irssi (EulerOS-SA-2019-2595)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the irssi package installed, the EulerOS
installation on the remote host is affected by the following
vulnerabilities :
- An issue was discovered in Irssi before 1.0.4. When
receiving messages with invalid time stamps, Irssi
would try to dereference a NULL
pointer.(CVE-2017-10965)
- An issue was discovered in Irssi before 1.0.4. While
updating the internal nick list, Irssi could
incorrectly use the GHashTable interface and free the
nick while updating it. This would then result in
use-after-free conditions on each access of the hash
table.(CVE-2017-10966)
- In Irssi before 1.0.3, when receiving a DCC message
without source nick/host, it attempts to dereference a
NULL pointer. Thus, remote IRC servers can cause a
crash.(CVE-2017-9468)
- In Irssi before 1.0.3, when receiving certain
incorrectly quoted DCC files, it tries to find the
terminating quote one byte before the allocated memory.
Thus, remote attackers might be able to cause a
crash.(CVE-2017-9469)
- In Irssi before 1.0.6, a calculation error in the
completion code could cause a heap buffer overflow when
completing certain strings.(CVE-2018-5208)
- Irssi before 0.8.21 allows remote attackers to cause a
denial of service (out-of-bounds read and crash) via a
string containing a formatting sequence (%[) without a
closing bracket (]).(CVE-2017-5356)
- The nickcmp function in Irssi before 0.8.21 allows
remote attackers to cause a denial of service (NULL
pointer dereference and crash) via a message without a
nick.(CVE-2017-5193)
- Use-after-free vulnerability in Irssi before 0.8.21
allows remote attackers to cause a denial of service
(crash) via an invalid nick message.(CVE-2017-5194)
- When the channel topic is set without specifying a
sender, Irssi before 1.0.6 may dereference a NULL
pointer.(CVE-2018-5206)
- When using an incomplete variable argument, Irssi
before 1.0.6 may access data beyond the end of the
string.(CVE-2018-5207)
- When using incomplete escape codes, Irssi before 1.0.6
may access data beyond the end of the
string.(CVE-2018-5205)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2595
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fa138732");
script_set_attribute(attribute:"solution", value:
"Update the affected irssi packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-5208");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2019/12/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/18");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:irssi");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(3)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP3");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP3", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["irssi-0.8.15-16.h9"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"3", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "irssi");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5356
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5208
www.nessus.org/u?fa138732
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.011 Low
EPSS
Percentile
84.6%