EulerOS Virtualization for ARM 64 3.0.6.0 Ruby vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2020-1691) | 26 Jun 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2020-1590) | 26 May 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2020-1686) | 16 Jun 202000:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-2192-1) | 1 May 202000:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2020:0995-1) | 9 Jun 202100:00 | – | openvas |
![]() | Fedora: Security Advisory for ruby (FEDORA-2020-a95706b117) | 29 May 202000:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-4721-1) | 9 Jul 202000:00 | – | openvas |
![]() | openSUSE: Security Advisory for ruby2.5 (openSUSE-SU-2020:0586-1) | 2 May 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2020-1615) | 3 Jun 202000:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2020-1955) | 8 Sep 202000:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(137798);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/05");
script_cve_id("CVE-2020-10663", "CVE-2020-10933");
script_name(english:"EulerOS Virtualization for ARM 64 3.0.6.0 : ruby (EulerOS-SA-2020-1691)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization for ARM 64 host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the ruby packages installed, the EulerOS
Virtualization for ARM 64 installation on the remote host is affected
by the following vulnerabilities :
- An issue was discovered in Ruby 2.5.x through 2.5.7,
2.6.x through 2.6.5, and 2.7.0. If a victim calls
BasicSocket#read_nonblock(requested_size, buffer,
exception: false), the method resizes the buffer to fit
the requested size, but no data is copied. Thus, the
buffer string provides the previous value of the heap.
This may expose possibly sensitive data from the
interpreter.(CVE-2020-10933)
- The JSON gem through 2.2.0 for Ruby, as used in Ruby
2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through
2.6.5, has an Unsafe Object Creation Vulnerability.
This is quite similar to CVE-2013-0269, but does not
rely on poor garbage-collection behavior within Ruby.
Specifically, use of JSON parsing methods can lead to
creation of a malicious object within the interpreter,
with adverse effects that are
application-dependent.(CVE-2020-10663)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1691
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2e474eb4");
script_set_attribute(attribute:"solution", value:
"Update the affected ruby packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-10933");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-10663");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2020/06/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/06/25");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ruby");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ruby-irb");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ruby-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygem-bigdecimal");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygem-io-console");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygem-json");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygem-openssl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygem-psych");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygem-rdoc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:rubygems");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.6.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.6.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.6.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
flag = 0;
pkgs = ["ruby-2.5.1-98.h8.eulerosv2r8",
"ruby-irb-2.5.1-98.h8.eulerosv2r8",
"ruby-libs-2.5.1-98.h8.eulerosv2r8",
"rubygem-bigdecimal-1.3.4-98.h8.eulerosv2r8",
"rubygem-io-console-0.4.6-98.h8.eulerosv2r8",
"rubygem-json-2.1.0-98.h8.eulerosv2r8",
"rubygem-openssl-2.1.0-98.h8.eulerosv2r8",
"rubygem-psych-3.0.2-98.h8.eulerosv2r8",
"rubygem-rdoc-6.0.1-98.h8.eulerosv2r8",
"rubygems-2.7.6-98.h8.eulerosv2r8"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ruby");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo