Lucene search

K

EulerOS 2.0 SP3 : irssi (EulerOS-SA-2021-1803)

EulerOS 2.0 SP3 irssi vulnerabilit

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
OSV
CVE-2016-7553
27 Feb 201722:59
osv
OSV
irssi - security update
25 Nov 201600:00
osv
OSV
OPENSUSE-SU-2024:10455-1 irssi-0.8.20-3.1 on GA media
15 Jun 202400:00
osv
Fedora
[SECURITY] Fedora 25 Update: irssi-0.8.20-2.fc25
10 Oct 201618:24
fedora
Fedora
[SECURITY] Fedora 24 Update: irssi-0.8.20-2.fc24
10 Oct 201621:54
fedora
Fedora
[SECURITY] Fedora 23 Update: irssi-0.8.20-2.fc23
11 Oct 201601:21
fedora
NVD
CVE-2016-7553
27 Feb 201722:59
nvd
Debian
[SECURITY] [DLA 722-1] irssi security update
25 Nov 201621:08
debian
Tenable Nessus
EulerOS 2.0 SP5 : irssi (EulerOS-SA-2021-1197)
4 Feb 202100:00
nessus
Tenable Nessus
Fedora 25 : irssi (2016-39de4eb5e7)
15 Nov 201600:00
nessus
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(149111);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/03");

  script_cve_id("CVE-2016-7553");

  script_name(english:"EulerOS 2.0 SP3 : irssi (EulerOS-SA-2021-1803)");

  script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"According to the version of the irssi package installed, the EulerOS
installation on the remote host is affected by the following
vulnerability :

  - The buf.pl script before 2.20 in Irssi before 0.8.20
    uses weak permissions for the scrollbuffer dump file
    created between upgrades, which might allow local users
    to obtain sensitive information from private chat
    conversations by reading the file.(CVE-2016-7553)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
  # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1803
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?35b23e2d");
  script_set_attribute(attribute:"solution", value:
"Update the affected irssi package.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-7553");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"patch_publication_date", value:"2021/04/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/04/30");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:irssi");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Huawei Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
  script_exclude_keys("Host/EulerOS/uvp_version");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");

sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(3)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP3");

uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP3", "EulerOS UVP " + uvp);

if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);

flag = 0;

pkgs = ["irssi-0.8.15-16.h10"];

foreach (pkg in pkgs)
  if (rpm_check(release:"EulerOS-2.0", sp:"3", reference:pkg)) flag++;

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_NOTE,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "irssi");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
30 Apr 2021 00:00Current
4.1Medium risk
Vulners AI Score4.1
CVSS22.1
CVSS33.3
EPSS0.00042
20
.json
Report