According to the versions of the cups packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.(CVE-2020-3898)
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.(CVE-2019-8675)
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.(CVE-2019-8696)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(142266);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/12");
script_cve_id("CVE-2019-8675", "CVE-2019-8696", "CVE-2020-3898");
script_name(english:"EulerOS 2.0 SP2 : cups (EulerOS-SA-2020-2336)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the cups packages installed, the EulerOS
installation on the remote host is affected by the following
vulnerabilities :
- A memory corruption issue was addressed with improved
validation. This issue is fixed in macOS Catalina
10.15.4. An application may be able to gain elevated
privileges.(CVE-2020-3898)
- A buffer overflow issue was addressed with improved
memory handling. This issue is fixed in macOS Mojave
10.14.6, Security Update 2019-004 High Sierra, Security
Update 2019-004 Sierra. An attacker in a privileged
network position may be able to execute arbitrary
code.(CVE-2019-8675)
- A buffer overflow issue was addressed with improved
memory handling. This issue is fixed in macOS Mojave
10.14.6, Security Update 2019-004 High Sierra, Security
Update 2019-004 Sierra. An attacker in a privileged
network position may be able to execute arbitrary
code.(CVE-2019-8696)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-2336
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ccf61b7a");
script_set_attribute(attribute:"solution", value:
"Update the affected cups packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-8696");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2020/11/03");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/11/03");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:cups");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:cups-client");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:cups-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:cups-filesystem");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:cups-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:cups-lpd");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["cups-1.6.3-26.h5",
"cups-client-1.6.3-26.h5",
"cups-devel-1.6.3-26.h5",
"cups-filesystem-1.6.3-26.h5",
"cups-libs-1.6.3-26.h5",
"cups-lpd-1.6.3-26.h5"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups");
}
Vendor | Product | Version | CPE |
---|---|---|---|
huawei | euleros | cups | p-cpe:/a:huawei:euleros:cups |
huawei | euleros | cups-client | p-cpe:/a:huawei:euleros:cups-client |
huawei | euleros | cups-devel | p-cpe:/a:huawei:euleros:cups-devel |
huawei | euleros | cups-filesystem | p-cpe:/a:huawei:euleros:cups-filesystem |
huawei | euleros | cups-libs | p-cpe:/a:huawei:euleros:cups-libs |
huawei | euleros | cups-lpd | p-cpe:/a:huawei:euleros:cups-lpd |
huawei | euleros | 2.0 | cpe:/o:huawei:euleros:2.0 |