EulerOS Virtualization for ARM 64 3.0.6.0 : libXrender vulnerabilit
Reporter | Title | Published | Views | Family All 56 |
---|---|---|---|---|
![]() | Huawei EulerOS: Security Advisory for libXrender (EulerOS-SA-2020-2020) | 29 Sep 202000:00 | – | openvas |
![]() | Fedora Update for libXrender FEDORA-2016-ade20198ff | 7 Dec 201600:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-5436-1) | 26 Aug 202200:00 | – | openvas |
![]() | Huawei EulerOS: Security Advisory for libXrender (EulerOS-SA-2019-2458) | 23 Jan 202000:00 | – | openvas |
![]() | Fedora Update for libXrender FEDORA-2016-49d560da23 | 2 Dec 201600:00 | – | openvas |
![]() | Fedora Update for libXrender FEDORA-2016-8877cf648b | 14 Nov 201600:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-664-1) | 8 Mar 202300:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2016:3115-1) | 9 Jun 202100:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2016:2505-1) | 19 Apr 202100:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2016:2828-1) | 19 Apr 202100:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(140968);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/19");
script_cve_id("CVE-2016-7949", "CVE-2016-7950");
script_name(english:"EulerOS Virtualization for ARM 64 3.0.6.0 : libXrender (EulerOS-SA-2020-2020)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization for ARM 64 host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the libXrender package installed, the
EulerOS Virtualization for ARM 64 installation on the remote host is
affected by the following vulnerabilities :
- The XRenderQueryFilters function in X.org libXrender
before 0.9.10 allows remote X servers to trigger
out-of-bounds write operations via vectors involving
filter name lengths.(CVE-2016-7950)
- Multiple buffer overflows in the (1) XvQueryAdaptors
and (2) XvQueryEncodings functions in X.org libXrender
before 0.9.10 allow remote X servers to trigger
out-of-bounds write operations via vectors involving
length fields.(CVE-2016-7949)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-2020
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f0195ffb");
script_set_attribute(attribute:"solution", value:
"Update the affected libXrender packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-7950");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2020/09/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/09/29");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libXrender");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.6.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.6.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.6.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
flag = 0;
pkgs = ["libXrender-0.9.10-8.eulerosv2r8"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libXrender");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo