EulerOS 2.0 SP9 telnet vulnerability (CVE-2022-39028
Reporter | Title | Published | Views | Family All 37 |
---|---|---|---|---|
Tenable Nessus | SUSE SLED15 / SLES15 Security Update : telnet (SUSE-SU-2022:3783-1) | 28 Oct 202200:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP9 : telnet (EulerOS-SA-2024-1948) | 16 Jul 202400:00 | – | nessus |
Tenable Nessus | SUSE SLES12 Security Update : telnet (SUSE-SU-2022:3735-1) | 27 Oct 202200:00 | – | nessus |
Tenable Nessus | Photon OS 4.0: Netkit PHSA-2023-4.0-0483 | 24 Jul 202400:00 | – | nessus |
Tenable Nessus | Photon OS 3.0: Netkit PHSA-2023-3.0-0665 | 24 Jul 202400:00 | – | nessus |
Tenable Nessus | Photon OS 5.0: Netkit PHSA-2023-5.0-0108 | 24 Jul 202400:00 | – | nessus |
Tenable Nessus | SUSE SLES12 Security Update : krb5-appl (SUSE-SU-2022:3471-1) | 30 Sep 202200:00 | – | nessus |
Tenable Nessus | Ubuntu 20.04 LTS / 22.04 LTS / 23.04 : Inetutils vulnerabilities (USN-6304-1) | 22 Aug 202300:00 | – | nessus |
Tenable Nessus | RHEL 6 : krb5-appl (Unpatched Vulnerability) | 11 May 202400:00 | – | nessus |
Tenable Nessus | Debian DLA-3205-1 : inetutils - LTS security update | 27 Nov 202200:00 | – | nessus |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(202527);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/16");
script_cve_id("CVE-2022-39028");
script_name(english:"EulerOS 2.0 SP9 : telnet (EulerOS-SA-2024-1975)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the versions of the telnet package installed, the EulerOS installation on the remote host is affected by
the following vulnerabilities :
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer
dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but
the telnet service would remain available through inetd. However, if the telnetd application has many
crashes within a short time interval, the telnet service would become unavailable after inetd logs a
'telnet/tcp server failing (looping), service terminated' error. NOTE: MIT krb5-appl is not supported
upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT
Kerberos 5 (aka krb5) product many years ago, at version 1.8.(CVE-2022-39028)
Tenable has extracted the preceding description block directly from the EulerOS telnet security advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2024-1975
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?68a0468b");
script_set_attribute(attribute:"solution", value:
"Update the affected telnet packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-39028");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/08/30");
script_set_attribute(attribute:"patch_publication_date", value:"2024/07/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:telnet");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var _release = get_kb_item("Host/EulerOS/release");
if (isnull(_release) || _release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
var uvp = get_kb_item("Host/EulerOS/uvp_version");
if (_release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9");
var sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(9)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP9", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu && "x86" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "x86" >!< cpu) audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
var flag = 0;
var pkgs = [
"telnet-0.17-75.h3.eulerosv2r9"
];
foreach (var pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"9", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "telnet");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo