Fedora 13 : myproxy-5.3-1.fc13 (2011-0512)

2011-01-27T00:00:00
ID FEDORA_2011-0512.NASL
Type nessus
Reporter Tenable
Modified 2018-11-28T00:00:00

Description

Release 5.3 fixes a myproxy-logon security bug in MyProxy versions 5.0-5.2 that disabled server identity verification :

The myproxy-logon program in MyProxy versions 5.0 through 5.2 does not enforce the check that the myproxy-server's certificate contains the expected hostname or identity. The impacted MyProxy versions are included in Globus Toolkit releases 5.0.0-5.0.2. This issue is addressed in MyProxy 5.3.

Full details are available: http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt

Other changes in this release :

  • if myproxy-logon GSI mutual authentication with the myproxy-server fails, try again with client-side anonymous authentication, in case the client-side GSI credentials are unacceptable to the myproxy-server (for example, signed by an untrusted CA), but the myproxy-server would accept an anonymous client (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=710 3)

    • fix configure checks for globus_usage_stats_send, globus_usage_stats_send_array, and globus_gsi_proxy_handle_set_extensions when installing without existing Globus libraries in LD_LIBRARY_PATH (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7 098)

    • in myproxy-server-setup, look in /sbin and /usr/sbin for chkconfig or update-rc.d in case they're not in PATH

    • add certificate_issuer_subca_certfile option in myproxy-server.config (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7 119)

    • make all Globus Usage library errors non-fatal (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7 111)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2011-0512.
#

include("compat.inc");

if (description)
{
  script_id(51678);
  script_version("1.11");
  script_cvs_date("Date: 2018/11/28 22:47:43");

  script_cve_id("CVE-2011-0738");
  script_bugtraq_id(45916);
  script_xref(name:"FEDORA", value:"2011-0512");

  script_name(english:"Fedora 13 : myproxy-5.3-1.fc13 (2011-0512)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Release 5.3 fixes a myproxy-logon security bug in MyProxy versions
5.0-5.2 that disabled server identity verification :

The myproxy-logon program in MyProxy versions 5.0 through 5.2 does not
enforce the check that the myproxy-server's certificate contains the
expected hostname or identity. The impacted MyProxy versions are
included in Globus Toolkit releases 5.0.0-5.0.2. This issue is
addressed in MyProxy 5.3.

Full details are available:
http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt

Other changes in this release :

  - if myproxy-logon GSI mutual authentication with the
    myproxy-server fails, try again with client-side
    anonymous authentication, in case the client-side GSI
    credentials are unacceptable to the myproxy-server (for
    example, signed by an untrusted CA), but the
    myproxy-server would accept an anonymous client
    (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=710
    3)

    - fix configure checks for globus_usage_stats_send,
      globus_usage_stats_send_array, and
      globus_gsi_proxy_handle_set_extensions when installing
      without existing Globus libraries in LD_LIBRARY_PATH
      (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7
      098)

    - in myproxy-server-setup, look in /sbin and /usr/sbin
      for chkconfig or update-rc.d in case they're not in
      PATH

    - add certificate_issuer_subca_certfile option in
      myproxy-server.config
      (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7
      119)

    - make all Globus Usage library errors non-fatal
      (http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7
      111)

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7098"
  );
  # http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7103
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?85923f4c"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7111"
  );
  # http://bugzilla.globus.org/bugzilla/show_bug.cgi?id=7119
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?d3dbe1b0"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053473.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?6f536666"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected myproxy package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:myproxy");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13");

  script_set_attribute(attribute:"patch_publication_date", value:"2011/01/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/27");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC13", reference:"myproxy-5.3-1.fc13")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "myproxy");
}