Lucene search

K

Fedora 12 : cpio-2.10-5.fc12 (2010-4321)

๐Ÿ—“๏ธย 01 Jul 2010ย 00:00:00Reported byย This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.Typeย 
nessus
ย nessus
๐Ÿ”—ย www.tenable.com๐Ÿ‘ย 19ย Views

Fedora 12 cpio-2.10-5.fc12 security update (2010-4321) fix heap-based buffer overflo

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Fedora
[SECURITY] Fedora 13 Update: tar-1.22-16.fc13
14 Mar 201013:45
โ€“fedora
Fedora
[SECURITY] Fedora 13 Update: cpio-2.10-6.fc13
20 Mar 201003:37
โ€“fedora
Fedora
[SECURITY] Fedora 11 Update: cpio-2.9.90-8.fc11
27 Mar 201000:57
โ€“fedora
Fedora
[SECURITY] Fedora 11 Update: tar-1.22-5.fc11
27 Mar 201001:00
โ€“fedora
Fedora
[SECURITY] Fedora 12 Update: tar-1.22-12.fc12
16 Mar 201023:16
โ€“fedora
Fedora
[SECURITY] Fedora 12 Update: cpio-2.10-5.fc12
16 Mar 201023:19
โ€“fedora
Tenable Nessus
Fedora 11 : cpio-2.9.90-8.fc11 (2010-4302)
1 Jul 201000:00
โ€“nessus
Tenable Nessus
Fedora 12 : tar-1.22-12.fc12 (2010-4309)
1 Jul 201000:00
โ€“nessus
Tenable Nessus
GLSA-201111-11 : GNU Tar: User-assisted execution of arbitrary code
22 Nov 201100:00
โ€“nessus
Tenable Nessus
GLSA-201311-21 : cpio: Arbitrary code execution
29 Nov 201300:00
โ€“nessus
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2010-4321.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(47353);
  script_version("1.11");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2010-0624");
  script_bugtraq_id(38628);
  script_xref(name:"FEDORA", value:"2010-4321");

  script_name(english:"Fedora 12 : cpio-2.10-5.fc12 (2010-4321)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"  - CVE-2010-0624 fix heap-based buffer overflow by
    expanding a specially- crafted archive(#572150)

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=564368"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?d7376c3f"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected cpio package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:cpio");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:12");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/03/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^12([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 12.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC12", reference:"cpio-2.10-5.fc12")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cpio");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Jul 2010 00:00Current
0.3Low risk
Vulners AI Score0.3
CVSS26.8
EPSS0.018
19
.json
Report