EulerOS 2.0 SP8 libvpx vulnerabilit
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | EulerOS 2.0 SP2 : libvpx (EulerOS-SA-2021-2402) | 14 Sep 202100:00 | β | nessus |
![]() | EulerOS 2.0 SP5 : libvpx (EulerOS-SA-2020-1609) | 2 Jun 202000:00 | β | nessus |
![]() | EulerOS 2.0 SP3 : libvpx (EulerOS-SA-2021-1814) | 30 Apr 202100:00 | β | nessus |
![]() | CVE-2018-9349 | 27 Nov 202422:15 | β | nvd |
![]() | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2020-1185) | 25 Feb 202000:00 | β | openvas |
![]() | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2021-2402) | 15 Sep 202100:00 | β | openvas |
![]() | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2020-1609) | 3 Jun 202000:00 | β | openvas |
![]() | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2021-1814) | 3 May 202100:00 | β | openvas |
![]() | CVE-2018-9349 | 27 Nov 202421:45 | β | cvelist |
![]() | CVE-2018-9349 | 27 Nov 202421:45 | β | vulnrichment |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(134019);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/12/23");
script_cve_id("CVE-2018-9349");
script_name(english:"EulerOS 2.0 SP8 : libvpx (EulerOS-SA-2020-1185)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the version of the libvpx package installed, the EulerOS
installation on the remote host is affected by the following
vulnerability :
- libvpx provides the VP8/VP9 SDK, which allows you to
integrate your applications with the VP8 and VP9 video
codecs, high quality, royalty free, open source codecs
deployed on millions of computers and devices
worldwide.Security Fix(es):Disclaimer: The entry
creation date may reflect when the CVE ID was allocated
or reserved, and does not necessarily indicate when
this vulnerability was discovered, shared with the
affected vendor, publicly disclosed, or updated in
CVE.(CVE-2018-9349)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1185
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ccd3eb6f");
script_set_attribute(attribute:"solution", value:
"Update the affected libvpx package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-9349");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2020/02/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/25");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvpx");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(8)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
flag = 0;
pkgs = ["libvpx-1.7.0-7.h1.eulerosv2r8"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"8", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvpx");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo