According to the version of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerability :
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(150231);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/27");
script_cve_id("CVE-2020-8625");
script_name(english:"EulerOS 2.0 SP9 : bind (EulerOS-SA-2021-1939)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the version of the bind packages installed, the EulerOS
installation on the remote host is affected by the following
vulnerability :
- BIND servers are vulnerable if they are running an
affected version and are configured to use GSS-TSIG
features. In a configuration which uses BIND's default
settings the vulnerable code path is not exposed, but a
server can be rendered vulnerable by explicitly setting
valid values for the tkey-gssapi-keytab or
tkey-gssapi-credentialconfiguration options. Although
the default configuration is not vulnerable, GSS-TSIG
is frequently used in networks where BIND is integrated
with Samba, as well as in mixed-server environments
that combine BIND servers with Active Directory domain
controllers. The most likely outcome of a successful
exploitation of the vulnerability is a crash of the
named process. However, remote code execution, while
unproven, is theoretically possible. Affects: BIND
9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND
9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of
BIND Supported Preview Edition. Also release versions
9.17.0 -> 9.17.1 of the BIND 9.17 development
branch(CVE-2020-8625)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1939
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ae904c45");
script_set_attribute(attribute:"solution", value:
"Update the affected bind package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-8625");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2021/06/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/06/03");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-chroot");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-export-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-libs-lite");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-pkcs11");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-utils");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:python3-bind");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(9)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
flag = 0;
pkgs = ["bind-9.11.4-17.h11.eulerosv2r9",
"bind-chroot-9.11.4-17.h11.eulerosv2r9",
"bind-export-libs-9.11.4-17.h11.eulerosv2r9",
"bind-libs-9.11.4-17.h11.eulerosv2r9",
"bind-libs-lite-9.11.4-17.h11.eulerosv2r9",
"bind-pkcs11-9.11.4-17.h11.eulerosv2r9",
"bind-utils-9.11.4-17.h11.eulerosv2r9",
"python3-bind-9.11.4-17.h11.eulerosv2r9"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"9", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bind");
}
Vendor | Product | Version | CPE |
---|---|---|---|
huawei | euleros | bind | p-cpe:/a:huawei:euleros:bind |
huawei | euleros | bind-chroot | p-cpe:/a:huawei:euleros:bind-chroot |
huawei | euleros | bind-export-libs | p-cpe:/a:huawei:euleros:bind-export-libs |
huawei | euleros | bind-libs | p-cpe:/a:huawei:euleros:bind-libs |
huawei | euleros | bind-libs-lite | p-cpe:/a:huawei:euleros:bind-libs-lite |
huawei | euleros | bind-pkcs11 | p-cpe:/a:huawei:euleros:bind-pkcs11 |
huawei | euleros | bind-utils | p-cpe:/a:huawei:euleros:bind-utils |
huawei | euleros | python3-bind | p-cpe:/a:huawei:euleros:python3-bind |
huawei | euleros | 2.0 | cpe:/o:huawei:euleros:2.0 |