Lucene search

K
nessusThis script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.EULEROS_SA-2021-2135.NASL
HistoryJul 21, 2021 - 12:00 a.m.

EulerOS Virtualization 3.0.2.2 : ghostscript (EulerOS-SA-2021-2135)

2021-07-2100:00:00
This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

8.6 High

AI Score

Confidence

High

According to the versions of the ghostscript package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :

  • Ghostscript is a set of software that provides a PostScriptinterpreter, a set of C procedures (the Ghostscript library, whichimplements the graphics capabilities in the PostScript language) andan interpreter for Portable Document Format (PDF) files.
    Ghostscripttranslates PostScript code into many common, bitmapped formats, likethose understood by your printer or screen. Ghostscript is normallyused to display PostScript files and to print PostScript files tonon-PostScript printers.If you need to display PostScript files or print them tonon-PostScript printers, you should install ghostscript. If youinstall ghostscript, you also need to install the ghostscript-fontspackage.Security Fix(es):The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.(CVE-2017-9726)The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.(CVE-2017-9727)The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.(CVE-2017-9739)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(151895);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/07");

  script_cve_id("CVE-2017-9726", "CVE-2017-9727", "CVE-2017-9739");

  script_name(english:"EulerOS Virtualization 3.0.2.2 : ghostscript (EulerOS-SA-2021-2135)");

  script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security
updates.");
  script_set_attribute(attribute:"description", value:
"According to the versions of the ghostscript package installed, the
EulerOS Virtualization installation on the remote host is affected by
the following vulnerabilities :

  - Ghostscript is a set of software that provides a
    PostScriptinterpreter, a set of C procedures (the
    Ghostscript library, whichimplements the graphics
    capabilities in the PostScript language) andan
    interpreter for Portable Document Format (PDF) files.
    Ghostscripttranslates PostScript code into many common,
    bitmapped formats, likethose understood by your printer
    or screen. Ghostscript is normallyused to display
    PostScript files and to print PostScript files
    tonon-PostScript printers.If you need to display
    PostScript files or print them tonon-PostScript
    printers, you should install ghostscript. If youinstall
    ghostscript, you also need to install the
    ghostscript-fontspackage.Security Fix(es):The Ins_MDRP
    function in base/ttinterp.c in Artifex Ghostscript
    GhostXPS 9.21 allows remote attackers to cause a denial
    of service (heap-based buffer over-read and application
    crash) or possibly have unspecified other impact via a
    crafted document.(CVE-2017-9726)The gx_ttfReader__Read
    function in base/gxttfb.c in Artifex Ghostscript
    GhostXPS 9.21 allows remote attackers to cause a denial
    of service (heap-based buffer over-read and application
    crash) or possibly have unspecified other impact via a
    crafted document.(CVE-2017-9727)The Ins_JMPR function
    in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21
    allows remote attackers to cause a denial of service
    (heap-based buffer over-read and application crash) or
    possibly have unspecified other impact via a crafted
    document.(CVE-2017-9739)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
  # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2135
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?541dd393");
  script_set_attribute(attribute:"solution", value:
"Update the affected ghostscript packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-9739");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"patch_publication_date", value:"2021/07/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/07/21");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:ghostscript");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.2.2");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Huawei Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.2.2") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.2.2");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);

flag = 0;

pkgs = ["ghostscript-9.07-31.6.h20.eulerosv2r7"];

foreach (pkg in pkgs)
  if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ghostscript");
}
VendorProductVersionCPE
huaweieulerosghostscriptp-cpe:/a:huawei:euleros:ghostscript
huaweieulerosuvpcpe:/o:huawei:euleros:uvp:3.0.2.2

8.6 High

AI Score

Confidence

High