EulerOS 2.0 SP2 libvpx vulnerabilit
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
OpenVAS | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2020-1185) | 25 Feb 202000:00 | β | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2020-1609) | 3 Jun 202000:00 | β | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2021-2402) | 15 Sep 202100:00 | β | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for libvpx (EulerOS-SA-2021-1814) | 3 May 202100:00 | β | openvas |
NVD | CVE-2018-9349 | 27 Nov 202422:15 | β | nvd |
Tenable Nessus | EulerOS 2.0 SP5 : libvpx (EulerOS-SA-2020-1609) | 2 Jun 202000:00 | β | nessus |
Tenable Nessus | EulerOS 2.0 SP8 : libvpx (EulerOS-SA-2020-1185) | 25 Feb 202000:00 | β | nessus |
Tenable Nessus | EulerOS 2.0 SP3 : libvpx (EulerOS-SA-2021-1814) | 30 Apr 202100:00 | β | nessus |
CVE | CVE-2018-9349 | 27 Nov 202422:15 | β | cve |
Vulnrichment | CVE-2018-9349 | 27 Nov 202421:45 | β | vulnrichment |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(153332);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/30");
script_cve_id("CVE-2018-9349");
script_name(english:"EulerOS 2.0 SP2 : libvpx (EulerOS-SA-2021-2402)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the version of the libvpx package installed, the EulerOS
installation on the remote host is affected by the following
vulnerability :
- Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE(CVE-2018-9349)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2402
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f641645c");
script_set_attribute(attribute:"solution", value:
"Update the affected libvpx package.");
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2021/09/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/09/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libvpx");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(2)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP2", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["libvpx-1.3.0-5.h3"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"2", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libvpx");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo