Lucene search

K
nessusThis script is Copyright (C) 2008-2021 Tenable Network Security, Inc.FEDORA_2008-3937.NASL
HistoryMay 29, 2008 - 12:00 a.m.

Fedora 8 : libpng10-1.0.37-1.fc8 (2008-3937)

2008-05-2900:00:00
This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.
www.tenable.com
12

This update fixes the way that libpng10 handles unknown zero-length chunks, which in previous versions could result in writing to attacker controlled addresses, depending on how the libpng api is used. To be affected, an application would have to call png_set_keep_unknown_chunks(), which tells libpng not to ignore unknown chunks, but to do something with them. The PNG spec allows for β€˜unknown’ chunks, which are ignored by default, but an application could in theory embed some sort of extra data in a png image, then later get it back out via this mechanism. No packages in Fedora are believed to be affected by this issue, but it’s possible that third-party applications could be.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2008-3937.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(32459);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2008-1382");
  script_bugtraq_id(28770);
  script_xref(name:"FEDORA", value:"2008-3937");

  script_name(english:"Fedora 8 : libpng10-1.0.37-1.fc8 (2008-3937)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This update fixes the way that libpng10 handles unknown zero-length
chunks, which in previous versions could result in writing to attacker
controlled addresses, depending on how the libpng api is used. To be
affected, an application would have to call
png_set_keep_unknown_chunks(), which tells libpng not to ignore
unknown chunks, but to do something with them. The PNG spec allows for
'unknown' chunks, which are ignored by default, but an application
could in theory embed some sort of extra data in a png image, then
later get it back out via this mechanism. No packages in Fedora are
believed to be affected by this issue, but it's possible that
third-party applications could be.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=441839"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2008-May/010612.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?59e25909"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected libpng10 package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(189);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libpng10");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:8");

  script_set_attribute(attribute:"patch_publication_date", value:"2008/05/28");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/05/29");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 8.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC8", reference:"libpng10-1.0.37-1.fc8")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libpng10");
}
VendorProductVersionCPE
fedoraprojectfedoralibpng10p-cpe:/a:fedoraproject:fedora:libpng10
fedoraprojectfedora8cpe:/o:fedoraproject:fedora:8