ID FEDORA_2011-16990.NASL Type nessus Reporter This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2011-12-19T00:00:00
Description
The remote Fedora host is missing one or more security updates :
libreport-2.0.8-3.fc16 :
Fri Dec 9 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.8-3
fixed few crashes in bodhi plugin
Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.8-2
fixed crash in bodhi plugin
re-upload better backtrace if available
fixed dupe finding for selinux
don't duplicate comments in bugzilla
fixed problem with empty release
Tue Dec 6 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.8-1
new version
added bodhi plugin rhbz#655783
one tab per file on details page rhbz#751833
search box search thru all data (should help with
privacy) rhbz#748457
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2011-16990.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(57328);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2011-4088");
script_xref(name:"FEDORA", value:"2011-16990");
script_name(english:"Fedora 16 : abrt-2.0.7-2.fc16 / libreport-2.0.8-3.fc16 (2011-16990)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"The remote Fedora host is missing one or more security updates :
libreport-2.0.8-3.fc16 :
- Fri Dec 9 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.8-3
- fixed few crashes in bodhi plugin
- Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.8-2
- fixed crash in bodhi plugin
- re-upload better backtrace if available
- fixed dupe finding for selinux
- don't duplicate comments in bugzilla
- fixed problem with empty release
- Tue Dec 6 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.8-1
- new version
- added bodhi plugin rhbz#655783
- one tab per file on details page rhbz#751833
- search box search thru all data (should help with
privacy) rhbz#748457
- fixed close button position rhbz#741230
- rise the attachment limit to 4kb rhbz#712602
- fixed make check (rpath problem)
- save chnages in editable lines rhbz#710100
- ignore backup files rhbz#707959
- added support for proxies rhbz#533652
- Resolves: 753183 748457 737991 723219 712602 711986
692274 636000 631856 655783 741257 748457 741230
712602 753183 748457 741230 712602 710100 707959
533652
- Sat Nov 5 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.7-2
- bumped release
- Fri Nov 4 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.7-1
- new version
- added support for bodhi (preview)
- dropped unused patches
- reporter-bugzilla/rhts: add code to prevent duplicate
reporting. Closes rhbz#727494 (dvlasenk at redhat.com)
- wizard: search thru all items + tabbed details
rhbz#748457 (jmoskovc at redhat.com)
- wizard: add 'I don't know what caused this problem'
checkbox. Closes rhbz#712508 (dvlasenk at redhat.com)
- reporter-bugzilla: add optional 'Product' parameter.
Closes rhbz#665210 (dvlasenk at redhat.com)
- rhbz#728190 - man pages contain suspicious version
string (npajkovs at redhat.com)
- reporter-print: expand leading ~/ if present. Closes
rhbz#737991 (dvlasenk at redhat.com)
- reporter-rhtsupport: ask rs/problems endpoint before
creating new case. (working on rhbz#677052) (dvlasenk
at redhat.com)
- reporter-mailx: use Bugzilla's output format. Closes
rhbz#717321. (dvlasenk at redhat.com)
- report-newt: add option to display version
(rhbz#741590) (mlichvar at redhat.com)
- Resolves: #727494 #748457 #712508 #665210 rhbz#728190
#737991 #677052 #717321 #741590
abrt-2.0.7-2.fc16 :
- Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.7-2
- added man page
- fixed weird number formatting
- Wed Dec 7 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.7-1
- new version
- disabled kerneloops.org
- abrt-ccpp hook fixes
- catch indentation errors in python rhbz#578969
- fixed make check
- fixed retrace-client to work with rawhide
- require abrtd service in other services rhbz#752014
- fixed problems with dupes rhbz#701717
- keep abrt services enabled when updating F15->F16
- Resolves: 752014 749891 749603 744887 730422 665210
639068 625445 701717 752014 578969 732876 757683
753183 756146 749100
- Fri Nov 4 2011 Jiri Moskovcak <jmoskovc at redhat.com>
2.0.6-1
- new version
- Resolves: #701171 #712508 #726033 #728194 #728314
#730107 #733389 #738602
- Resolves: #741242 #749365 #700252 #734298 #736016
#738324 #748457 #692274
- Resolves: #711986 #723219 #749891 #712602 #744887
#749603 #625445 #665210
- Resolves: #737991 #639068 #578969 #636000 #631856
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=749854"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071026.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c5f77b2d"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?7e1ca5f3"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected abrt and / or libreport packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:abrt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libreport");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:16");
script_set_attribute(attribute:"patch_publication_date", value:"2011/12/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/19");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^16([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 16.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC16", reference:"abrt-2.0.7-2.fc16")) flag++;
if (rpm_check(release:"FC16", reference:"libreport-2.0.8-3.fc16")) flag++;
if (flag)
{
if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
else security_note(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "abrt / libreport");
}
{"id": "FEDORA_2011-16990.NASL", "bulletinFamily": "scanner", "title": "Fedora 16 : abrt-2.0.7-2.fc16 / libreport-2.0.8-3.fc16 (2011-16990)", "description": "The remote Fedora host is missing one or more security updates :\n\nlibreport-2.0.8-3.fc16 :\n\n - Fri Dec 9 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.8-3\n\n - fixed few crashes in bodhi plugin\n\n - Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.8-2\n\n - fixed crash in bodhi plugin\n\n - re-upload better backtrace if available\n\n - fixed dupe finding for selinux\n\n - don't duplicate comments in bugzilla\n\n - fixed problem with empty release\n\n - Tue Dec 6 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.8-1\n\n - new version\n\n - added bodhi plugin rhbz#655783\n\n - one tab per file on details page rhbz#751833\n\n - search box search thru all data (should help with\n privacy) rhbz#748457\n\n - fixed close button position rhbz#741230\n\n - rise the attachment limit to 4kb rhbz#712602\n\n - fixed make check (rpath problem)\n\n - save chnages in editable lines rhbz#710100\n\n - ignore backup files rhbz#707959\n\n - added support for proxies rhbz#533652\n\n - Resolves: 753183 748457 737991 723219 712602 711986\n 692274 636000 631856 655783 741257 748457 741230\n 712602 753183 748457 741230 712602 710100 707959\n 533652\n\n - Sat Nov 5 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-2\n\n - bumped release\n\n - Fri Nov 4 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-1\n\n - new version\n\n - added support for bodhi (preview)\n\n - dropped unused patches\n\n - reporter-bugzilla/rhts: add code to prevent duplicate\n reporting. Closes rhbz#727494 (dvlasenk at redhat.com)\n\n - wizard: search thru all items + tabbed details\n rhbz#748457 (jmoskovc at redhat.com)\n\n - wizard: add 'I don't know what caused this problem'\n checkbox. Closes rhbz#712508 (dvlasenk at redhat.com)\n\n - reporter-bugzilla: add optional 'Product' parameter.\n Closes rhbz#665210 (dvlasenk at redhat.com)\n\n - rhbz#728190 - man pages contain suspicious version\n string (npajkovs at redhat.com)\n\n - reporter-print: expand leading ~/ if present. Closes\n rhbz#737991 (dvlasenk at redhat.com)\n\n - reporter-rhtsupport: ask rs/problems endpoint before\n creating new case. (working on rhbz#677052) (dvlasenk\n at redhat.com)\n\n - reporter-mailx: use Bugzilla's output format. Closes\n rhbz#717321. (dvlasenk at redhat.com)\n\n - report-newt: add option to display version\n (rhbz#741590) (mlichvar at redhat.com)\n\n - Resolves: #727494 #748457 #712508 #665210 rhbz#728190\n #737991 #677052 #717321 #741590\n\nabrt-2.0.7-2.fc16 :\n\n - Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-2\n\n - added man page\n\n - fixed weird number formatting\n\n - Wed Dec 7 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-1\n\n - new version\n\n - disabled kerneloops.org\n\n - abrt-ccpp hook fixes\n\n - catch indentation errors in python rhbz#578969\n\n - fixed make check\n\n - fixed retrace-client to work with rawhide\n\n - require abrtd service in other services rhbz#752014\n\n - fixed problems with dupes rhbz#701717\n\n - keep abrt services enabled when updating F15->F16\n\n - Resolves: 752014 749891 749603 744887 730422 665210\n 639068 625445 701717 752014 578969 732876 757683\n 753183 756146 749100\n\n - Fri Nov 4 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.6-1\n\n - new version\n\n - Resolves: #701171 #712508 #726033 #728194 #728314\n #730107 #733389 #738602\n\n - Resolves: #741242 #749365 #700252 #734298 #736016\n #738324 #748457 #692274\n\n - Resolves: #711986 #723219 #749891 #712602 #744887\n #749603 #625445 #665210\n\n - Resolves: #737991 #639068 #578969 #636000 #631856\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2011-12-19T00:00:00", "modified": "2011-12-19T00:00:00", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:P/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/57328", "reporter": "This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?7e1ca5f3", "https://bugzilla.redhat.com/show_bug.cgi?id=749854", "http://www.nessus.org/u?c5f77b2d"], "cvelist": ["CVE-2011-4088"], "type": "nessus", "lastseen": "2021-01-12T10:09:23", "edition": 23, "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-4088"]}, {"type": "openvas", "idList": ["OPENVAS:870768", "OPENVAS:1361412562310870768", "OPENVAS:864054", "OPENVAS:1361412562310864077", "OPENVAS:1361412562310123895", "OPENVAS:864077", "OPENVAS:881079", "OPENVAS:1361412562310881079", "OPENVAS:1361412562310864054"]}, {"type": "fedora", "idList": ["FEDORA:3EA1B21905", "FEDORA:4AB482195D"]}, {"type": "redhat", "idList": ["RHSA-2012:0841"]}, {"type": "centos", "idList": ["CESA-2012:0841"]}, {"type": "oraclelinux", "idList": ["ELSA-2012-0841"]}, {"type": "nessus", "idList": ["REDHAT-RHSA-2012-0841.NASL", "ORACLELINUX_ELSA-2012-0841.NASL", "CENTOS_RHSA-2012-0841.NASL", "SL_20120620_ABRT__LIBREPORT__BTPARSER__AND_PYTHON_MEH_ON_SL6_X.NASL"]}], "modified": "2021-01-12T10:09:23", "rev": 2}, "score": {"value": 6.1, "vector": "NONE", "modified": "2021-01-12T10:09:23", "rev": 2}, "vulnersScore": 6.1}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16990.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57328);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2011-4088\");\n script_xref(name:\"FEDORA\", value:\"2011-16990\");\n\n script_name(english:\"Fedora 16 : abrt-2.0.7-2.fc16 / libreport-2.0.8-3.fc16 (2011-16990)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote Fedora host is missing one or more security updates :\n\nlibreport-2.0.8-3.fc16 :\n\n - Fri Dec 9 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.8-3\n\n - fixed few crashes in bodhi plugin\n\n - Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.8-2\n\n - fixed crash in bodhi plugin\n\n - re-upload better backtrace if available\n\n - fixed dupe finding for selinux\n\n - don't duplicate comments in bugzilla\n\n - fixed problem with empty release\n\n - Tue Dec 6 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.8-1\n\n - new version\n\n - added bodhi plugin rhbz#655783\n\n - one tab per file on details page rhbz#751833\n\n - search box search thru all data (should help with\n privacy) rhbz#748457\n\n - fixed close button position rhbz#741230\n\n - rise the attachment limit to 4kb rhbz#712602\n\n - fixed make check (rpath problem)\n\n - save chnages in editable lines rhbz#710100\n\n - ignore backup files rhbz#707959\n\n - added support for proxies rhbz#533652\n\n - Resolves: 753183 748457 737991 723219 712602 711986\n 692274 636000 631856 655783 741257 748457 741230\n 712602 753183 748457 741230 712602 710100 707959\n 533652\n\n - Sat Nov 5 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-2\n\n - bumped release\n\n - Fri Nov 4 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-1\n\n - new version\n\n - added support for bodhi (preview)\n\n - dropped unused patches\n\n - reporter-bugzilla/rhts: add code to prevent duplicate\n reporting. Closes rhbz#727494 (dvlasenk at redhat.com)\n\n - wizard: search thru all items + tabbed details\n rhbz#748457 (jmoskovc at redhat.com)\n\n - wizard: add 'I don't know what caused this problem'\n checkbox. Closes rhbz#712508 (dvlasenk at redhat.com)\n\n - reporter-bugzilla: add optional 'Product' parameter.\n Closes rhbz#665210 (dvlasenk at redhat.com)\n\n - rhbz#728190 - man pages contain suspicious version\n string (npajkovs at redhat.com)\n\n - reporter-print: expand leading ~/ if present. Closes\n rhbz#737991 (dvlasenk at redhat.com)\n\n - reporter-rhtsupport: ask rs/problems endpoint before\n creating new case. (working on rhbz#677052) (dvlasenk\n at redhat.com)\n\n - reporter-mailx: use Bugzilla's output format. Closes\n rhbz#717321. (dvlasenk at redhat.com)\n\n - report-newt: add option to display version\n (rhbz#741590) (mlichvar at redhat.com)\n\n - Resolves: #727494 #748457 #712508 #665210 rhbz#728190\n #737991 #677052 #717321 #741590\n\nabrt-2.0.7-2.fc16 :\n\n - Thu Dec 8 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-2\n\n - added man page\n\n - fixed weird number formatting\n\n - Wed Dec 7 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.7-1\n\n - new version\n\n - disabled kerneloops.org\n\n - abrt-ccpp hook fixes\n\n - catch indentation errors in python rhbz#578969\n\n - fixed make check\n\n - fixed retrace-client to work with rawhide\n\n - require abrtd service in other services rhbz#752014\n\n - fixed problems with dupes rhbz#701717\n\n - keep abrt services enabled when updating F15->F16\n\n - Resolves: 752014 749891 749603 744887 730422 665210\n 639068 625445 701717 752014 578969 732876 757683\n 753183 756146 749100\n\n - Fri Nov 4 2011 Jiri Moskovcak <jmoskovc at redhat.com>\n 2.0.6-1\n\n - new version\n\n - Resolves: #701171 #712508 #726033 #728194 #728314\n #730107 #733389 #738602\n\n - Resolves: #741242 #749365 #700252 #734298 #736016\n #738324 #748457 #692274\n\n - Resolves: #711986 #723219 #749891 #712602 #744887\n #749603 #625445 #665210\n\n - Resolves: #737991 #639068 #578969 #636000 #631856\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749854\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071026.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5f77b2d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7e1ca5f3\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected abrt and / or libreport packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:abrt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libreport\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"abrt-2.0.7-2.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"libreport-2.0.8-3.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrt / libreport\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "57328", "cpe": ["p-cpe:/a:fedoraproject:fedora:abrt", "p-cpe:/a:fedoraproject:fedora:libreport", "cpe:/o:fedoraproject:fedora:16"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:39:33", "description": "ABRT might allow attackers to obtain sensitive information from crash reports.", "edition": 4, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2020-01-31T17:15:00", "title": "CVE-2011-4088", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4088"], "modified": "2020-02-05T19:01:00", "cpe": ["cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/o:fedoraproject:fedora:16", "cpe:/a:abrt_project:abrt:2.0.6", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2011-4088", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4088", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:abrt_project:abrt:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2018-01-18T11:07:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4088"], "description": "Check for the Version of libreport", "modified": "2018-01-17T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:864054", "href": "http://plugins.openvas.org/nasl.php?oid=864054", "type": "openvas", "title": "Fedora Update for libreport FEDORA-2011-16990", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libreport FEDORA-2011-16990\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"libreport on Fedora 16\";\ntag_insight = \"Libraries providing API for reporting different problems in applications\n to different bug targets like Bugzilla, ftp, trac, etc...\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html\");\n script_id(864054);\n script_version(\"$Revision: 8448 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:18:06 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 13:05:38 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4088\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2011-16990\");\n script_name(\"Fedora Update for libreport FEDORA-2011-16990\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of libreport\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.8~3.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2020-02-10T16:45:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4088"], "description": "The remote host is missing an update for the ", "modified": "2020-02-10T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:1361412562310864054", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864054", "type": "openvas", "title": "Fedora Update for libreport FEDORA-2011-16990", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libreport FEDORA-2011-16990\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864054\");\n script_version(\"2020-02-10T07:58:04+0000\");\n script_tag(name:\"last_modification\", value:\"2020-02-10 07:58:04 +0000 (Mon, 10 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 13:05:38 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4088\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-16990\");\n script_name(\"Fedora Update for libreport FEDORA-2011-16990\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libreport'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"libreport on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.8~3.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2018-01-02T10:57:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4088"], "description": "Check for the Version of abrt", "modified": "2017-12-28T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:864077", "href": "http://plugins.openvas.org/nasl.php?oid=864077", "type": "openvas", "title": "Fedora Update for abrt FEDORA-2011-16990", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for abrt FEDORA-2011-16990\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"abrt on Fedora 16\";\ntag_insight = \"abrt is a tool to help users to detect defects in applications and\n to create a bug report with all informations needed by maintainer to fix it.\n It uses plugin system to extend its functionality.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071026.html\");\n script_id(864077);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 13:08:27 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4088\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_xref(name: \"FEDORA\", value: \"2011-16990\");\n script_name(\"Fedora Update for abrt FEDORA-2011-16990\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of abrt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"abrt\", rpm:\"abrt~2.0.7~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2020-02-06T14:45:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-4088"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:1361412562310864077", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864077", "type": "openvas", "title": "Fedora Update for abrt FEDORA-2011-16990", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for abrt FEDORA-2011-16990\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071026.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864077\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 13:08:27 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4088\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-16990\");\n script_name(\"Fedora Update for abrt FEDORA-2011-16990\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'abrt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"abrt on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"abrt\", rpm:\"abrt~2.0.7~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2018-01-02T10:57:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "Check for the Version of abrt", "modified": "2017-12-29T00:00:00", "published": "2012-07-30T00:00:00", "id": "OPENVAS:881079", "href": "http://plugins.openvas.org/nasl.php?oid=881079", "type": "openvas", "title": "CentOS Update for abrt CESA-2012:0841 centos6 ", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for abrt CESA-2012:0841 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_insight = \"ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\n defects in applications and to create a bug report with all the information\n needed by a maintainer to fix it. It uses a plug-in system to extend its\n functionality. libreport provides an API for reporting different problems\n in applications to different bug targets, such as Bugzilla, FTP, and Trac.\n\n The btparser utility is a backtrace parser and analyzer library, which\n works with backtraces produced by the GNU Project Debugger. It can parse a\n text file with a backtrace to a tree of C structures, allowing to analyze\n the threads and frames of the backtrace and process them.\n \n The python-meh package provides a python library for handling exceptions.\n \n If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package\n installed and the abrt-ccpp service running), and the sysctl\n fs.suid_dumpable option was set to "2" (it is "0" by default), core dumps\n of set user ID (setuid) programs were created with insecure group ID\n permissions. This could allow local, unprivileged users to obtain sensitive\n information from the core dump files of setuid processes they would\n otherwise not be able to access. (CVE-2012-1106)\n \n ABRT did not allow users to easily search the collected crash information\n for sensitive data prior to submitting it. This could lead to users\n unintentionally exposing sensitive information via the submitted crash\n reports. This update adds functionality to search across all the collected\n data. Note that this fix does not apply to the default configuration, where\n reports are sent to Red Hat Customer Support. It only takes effect for\n users sending information to Red Hat Bugzilla. (CVE-2011-4088)\n \n Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n \n These updated packages include numerous bug fixes. Space precludes\n documenting all of these changes in this advisory. Users are directed to\n the Red Hat Enterprise Linux 6.3 Technical Notes for information on the\n most significant of these changes.\n \n All users of abrt, libreport, btparser, and python-meh are advised to\n upgrade to these updated packages, which correct these issues.\";\n\ntag_affected = \"abrt on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-July/018708.html\");\n script_id(881079);\n script_version(\"$Revision: 8257 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-29 07:29:46 +0100 (Fri, 29 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 16:01:50 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:N/A:N\");\n script_xref(name: \"CESA\", value: \"2012:0841\");\n script_name(\"CentOS Update for abrt CESA-2012:0841 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of abrt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"abrt\", rpm:\"abrt~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-ccpp\", rpm:\"abrt-addon-ccpp~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-kerneloops\", rpm:\"abrt-addon-kerneloops~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-python\", rpm:\"abrt-addon-python~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-vmcore\", rpm:\"abrt-addon-vmcore~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-cli\", rpm:\"abrt-cli~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-desktop\", rpm:\"abrt-desktop~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-devel\", rpm:\"abrt-devel~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-gui\", rpm:\"abrt-gui~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-libs\", rpm:\"abrt-libs~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-tui\", rpm:\"abrt-tui~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser\", rpm:\"btparser~0.16~3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser-devel\", rpm:\"btparser-devel~0.16~3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser-python\", rpm:\"btparser-python~0.16~3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-cli\", rpm:\"libreport-cli~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-devel\", rpm:\"libreport-devel~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-gtk\", rpm:\"libreport-gtk~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-gtk-devel\", rpm:\"libreport-gtk-devel~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-newt\", rpm:\"libreport-newt~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-bugzilla\", rpm:\"libreport-plugin-bugzilla~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-kerneloops\", rpm:\"libreport-plugin-kerneloops~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-logger\", rpm:\"libreport-plugin-logger~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-mailx\", rpm:\"libreport-plugin-mailx~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-reportuploader\", rpm:\"libreport-plugin-reportuploader~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-rhtsupport\", rpm:\"libreport-plugin-rhtsupport~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-python\", rpm:\"libreport-python~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-01-02T10:57:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "Check for the Version of abrt, libreport, btparser, and python-meh", "modified": "2017-12-28T00:00:00", "published": "2012-06-22T00:00:00", "id": "OPENVAS:870768", "href": "http://plugins.openvas.org/nasl.php?oid=870768", "type": "openvas", "title": "RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\n defects in applications and to create a bug report with all the information\n needed by a maintainer to fix it. It uses a plug-in system to extend its\n functionality. libreport provides an API for reporting different problems\n in applications to different bug targets, such as Bugzilla, FTP, and Trac.\n\n The btparser utility is a backtrace parser and analyzer library, which\n works with backtraces produced by the GNU Project Debugger. It can parse a\n text file with a backtrace to a tree of C structures, allowing to analyze\n the threads and frames of the backtrace and process them.\n\n The python-meh package provides a python library for handling exceptions.\n\n If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package\n installed and the abrt-ccpp service running), and the sysctl\n fs.suid_dumpable option was set to '2' (it is '0' by default),core dumps\n of set user ID (setuid) programs were created with insecure group ID\n permissions. This could allow local, unprivileged users to obtain sensitive\n information from the core dump files of setuid processes they would\n otherwise not be able to access. (CVE-2012-1106)\n\n ABRT did not allow users to easily search the collected crash information\n for sensitive data prior to submitting it. This could lead to users\n unintentionally exposing sensitive information via the submitted crash\n reports. This update adds functionality to search across all the collected\n data. Note that this fix does not apply to the default configuration, where\n reports are sent to Red Hat Customer Support. It only takes effect for\n users sending information to Red Hat Bugzilla. (CVE-2011-4088)\n\n Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\n These updated packages include numerous bug fixes. Space precludes\n documenting all of these changes in this advisory. Users are directed to\n the Red Hat Enterprise Linux 6.3 Technical Notes for information on the\n most significant of these changes.\n\n All users of abrt, libreport, btparser, and python-meh are advised to\n upgrade to these updated packages, which correct these issues.\";\n\ntag_affected = \"abrt, libreport, btparser, and python-meh on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-June/msg00028.html\");\n script_id(870768);\n script_version(\"$Revision: 8253 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 07:29:51 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-22 10:26:13 +0530 (Fri, 22 Jun 2012)\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_xref(name: \"RHSA\", value: \"2012:0841-04\");\n script_name(\"RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of abrt, libreport, btparser, and python-meh\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"btparser\", rpm:\"btparser~0.16~3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser-debuginfo\", rpm:\"btparser-debuginfo~0.16~3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-cli\", rpm:\"libreport-cli~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-debuginfo\", rpm:\"libreport-debuginfo~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-gtk\", rpm:\"libreport-gtk~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-newt\", rpm:\"libreport-newt~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-kerneloops\", rpm:\"libreport-plugin-kerneloops~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-logger\", rpm:\"libreport-plugin-logger~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-mailx\", rpm:\"libreport-plugin-mailx~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-reportuploader\", rpm:\"libreport-plugin-reportuploader~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-rhtsupport\", rpm:\"libreport-plugin-rhtsupport~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-python\", rpm:\"libreport-python~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-meh\", rpm:\"python-meh~0.12.1~3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2020-02-10T16:42:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "Oracle Linux Local Security Checks ELSA-2012-0841", "modified": "2020-02-10T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123895", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123895", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-0841", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123895\");\n script_version(\"2020-02-10T07:58:04+0000\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:09:58 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-02-10 07:58:04 +0000 (Mon, 10 Feb 2020)\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-0841\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-0841\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-0841.html\");\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"abrt\", rpm:\"abrt~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-addon-ccpp\", rpm:\"abrt-addon-ccpp~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-addon-kerneloops\", rpm:\"abrt-addon-kerneloops~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-addon-python\", rpm:\"abrt-addon-python~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-addon-vmcore\", rpm:\"abrt-addon-vmcore~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-cli\", rpm:\"abrt-cli~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-desktop\", rpm:\"abrt-desktop~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-devel\", rpm:\"abrt-devel~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-gui\", rpm:\"abrt-gui~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-libs\", rpm:\"abrt-libs~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"abrt-tui\", rpm:\"abrt-tui~2.0.8~6.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"btparser\", rpm:\"btparser~0.16~3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"btparser-devel\", rpm:\"btparser-devel~0.16~3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"btparser-python\", rpm:\"btparser-python~0.16~3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-cli\", rpm:\"libreport-cli~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-devel\", rpm:\"libreport-devel~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-gtk\", rpm:\"libreport-gtk~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-gtk-devel\", rpm:\"libreport-gtk-devel~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-newt\", rpm:\"libreport-newt~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-plugin-bugzilla\", rpm:\"libreport-plugin-bugzilla~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-plugin-kerneloops\", rpm:\"libreport-plugin-kerneloops~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-plugin-logger\", rpm:\"libreport-plugin-logger~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-plugin-mailx\", rpm:\"libreport-plugin-mailx~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-plugin-reportuploader\", rpm:\"libreport-plugin-reportuploader~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"libreport-python\", rpm:\"libreport-python~2.0.9~5.0.1.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"python-meh\", rpm:\"python-meh~0.12.1~3.el6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-02-10T16:46:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "The remote host is missing an update for the ", "modified": "2020-02-10T00:00:00", "published": "2012-06-22T00:00:00", "id": "OPENVAS:1361412562310870768", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870768", "type": "openvas", "title": "RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-June/msg00028.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870768\");\n script_version(\"2020-02-10T07:58:04+0000\");\n script_tag(name:\"last_modification\", value:\"2020-02-10 07:58:04 +0000 (Mon, 10 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-06-22 10:26:13 +0530 (Fri, 22 Jun 2012)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_xref(name:\"RHSA\", value:\"2012:0841-04\");\n script_name(\"RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'abrt, libreport, btparser, and python-meh'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"abrt, libreport, btparser, and python-meh on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\n defects in applications and to create a bug report with all the information\n needed by a maintainer to fix it. It uses a plug-in system to extend its\n functionality. libreport provides an API for reporting different problems\n in applications to different bug targets, such as Bugzilla, FTP, and Trac.\n\n The btparser utility is a backtrace parser and analyzer library, which\n works with backtraces produced by the GNU Project Debugger. It can parse a\n text file with a backtrace to a tree of C structures, allowing to analyze\n the threads and frames of the backtrace and process them.\n\n The python-meh package provides a python library for handling exceptions.\n\n If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package\n installed and the abrt-ccpp service running), and the sysctl\n fs.suid_dumpable option was set to '2' (it is '0' by default), core dumps\n of set user ID (setuid) programs were created with insecure group ID\n permissions. This could allow local, unprivileged users to obtain sensitive\n information from the core dump files of setuid processes they would\n otherwise not be able to access. (CVE-2012-1106)\n\n ABRT did not allow users to easily search the collected crash information\n for sensitive data prior to submitting it. This could lead to users\n unintentionally exposing sensitive information via the submitted crash\n reports. This update adds functionality to search across all the collected\n data. Note that this fix does not apply to the default configuration, where\n reports are sent to Red Hat Customer Support. It only takes effect for\n users sending information to Red Hat Bugzilla. (CVE-2011-4088)\n\n Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\n These updated packages include numerous bug fixes. Space precludes\n documenting all of these changes in this advisory. Users are directed to\n the Red Hat Enterprise Linux 6.3 Technical Notes for information on the\n most significant of these changes.\n\n All users of abrt, libreport, btparser, and python-meh are advised to\n upgrade to these updated packages, which correct these issues.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"btparser\", rpm:\"btparser~0.16~3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser-debuginfo\", rpm:\"btparser-debuginfo~0.16~3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-cli\", rpm:\"libreport-cli~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-debuginfo\", rpm:\"libreport-debuginfo~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-gtk\", rpm:\"libreport-gtk~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-newt\", rpm:\"libreport-newt~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-kerneloops\", rpm:\"libreport-plugin-kerneloops~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-logger\", rpm:\"libreport-plugin-logger~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-mailx\", rpm:\"libreport-plugin-mailx~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-reportuploader\", rpm:\"libreport-plugin-reportuploader~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-rhtsupport\", rpm:\"libreport-plugin-rhtsupport~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-python\", rpm:\"libreport-python~2.0.9~5.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-meh\", rpm:\"python-meh~0.12.1~3.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-02-10T16:46:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "The remote host is missing an update for the ", "modified": "2020-02-10T00:00:00", "published": "2012-07-30T00:00:00", "id": "OPENVAS:1361412562310881079", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881079", "type": "openvas", "title": "CentOS Update for abrt CESA-2012:0841 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for abrt CESA-2012:0841 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\n\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-July/018708.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881079\");\n script_version(\"2020-02-10T07:58:04+0000\");\n script_tag(name:\"last_modification\", value:\"2020-02-10 07:58:04 +0000 (Mon, 10 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 16:01:50 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_xref(name:\"CESA\", value:\"2012:0841\");\n script_name(\"CentOS Update for abrt CESA-2012:0841 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'abrt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"abrt on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\n defects in applications and to create a bug report with all the information\n needed by a maintainer to fix it. It uses a plug-in system to extend its\n functionality. libreport provides an API for reporting different problems\n in applications to different bug targets, such as Bugzilla, FTP, and Trac.\n\n The btparser utility is a backtrace parser and analyzer library, which\n works with backtraces produced by the GNU Project Debugger. It can parse a\n text file with a backtrace to a tree of C structures, allowing to analyze\n the threads and frames of the backtrace and process them.\n\n The python-meh package provides a python library for handling exceptions.\n\n If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package\n installed and the abrt-ccpp service running), and the sysctl\n fs.suid_dumpable option was set to '2' (it is '0' by default), core dumps\n of set user ID (setuid) programs were created with insecure group ID\n permissions. This could allow local, unprivileged users to obtain sensitive\n information from the core dump files of setuid processes they would\n otherwise not be able to access. (CVE-2012-1106)\n\n ABRT did not allow users to easily search the collected crash information\n for sensitive data prior to submitting it. This could lead to users\n unintentionally exposing sensitive information via the submitted crash\n reports. This update adds functionality to search across all the collected\n data. Note that this fix does not apply to the default configuration, where\n reports are sent to Red Hat Customer Support. It only takes effect for\n users sending information to Red Hat Bugzilla. (CVE-2011-4088)\n\n Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\n These updated packages include numerous bug fixes. Space precludes\n documenting all of these changes in this advisory. Users are directed to\n the Red Hat Enterprise Linux 6.3 Technical Notes for information on the\n most significant of these changes.\n\n All users of abrt, libreport, btparser, and python-meh are advised to\n upgrade to these updated packages, which correct these issues.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"abrt\", rpm:\"abrt~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-ccpp\", rpm:\"abrt-addon-ccpp~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-kerneloops\", rpm:\"abrt-addon-kerneloops~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-python\", rpm:\"abrt-addon-python~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-addon-vmcore\", rpm:\"abrt-addon-vmcore~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-cli\", rpm:\"abrt-cli~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-desktop\", rpm:\"abrt-desktop~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-devel\", rpm:\"abrt-devel~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-gui\", rpm:\"abrt-gui~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-libs\", rpm:\"abrt-libs~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"abrt-tui\", rpm:\"abrt-tui~2.0.8~6.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser\", rpm:\"btparser~0.16~3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser-devel\", rpm:\"btparser-devel~0.16~3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"btparser-python\", rpm:\"btparser-python~0.16~3.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport\", rpm:\"libreport~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-cli\", rpm:\"libreport-cli~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-devel\", rpm:\"libreport-devel~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-gtk\", rpm:\"libreport-gtk~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-gtk-devel\", rpm:\"libreport-gtk-devel~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-newt\", rpm:\"libreport-newt~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-bugzilla\", rpm:\"libreport-plugin-bugzilla~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-kerneloops\", rpm:\"libreport-plugin-kerneloops~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-logger\", rpm:\"libreport-plugin-logger~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-mailx\", rpm:\"libreport-plugin-mailx~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-reportuploader\", rpm:\"libreport-plugin-reportuploader~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-plugin-rhtsupport\", rpm:\"libreport-plugin-rhtsupport~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libreport-python\", rpm:\"libreport-python~2.0.9~5.el6.centos\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4088"], "description": "Libraries providing API for reporting different problems in applications to different bug targets like Bugzilla, ftp, trac, etc... ", "modified": "2011-12-16T19:56:32", "published": "2011-12-16T19:56:32", "id": "FEDORA:4AB482195D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: libreport-2.0.8-3.fc16", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4088"], "description": "abrt is a tool to help users to detect defects in applications and to create a bug report with all informations needed by maintainer to fix it. It uses plugin system to extend its functionality. ", "modified": "2011-12-16T19:56:32", "published": "2011-12-16T19:56:32", "id": "FEDORA:3EA1B21905", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: abrt-2.0.7-2.fc16", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "redhat": [{"lastseen": "2020-02-06T11:31:11", "bulletinFamily": "unix", "cvelist": ["CVE-2011-4088", "CVE-2012-1106"], "description": "ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the information\nneeded by a maintainer to fix it. It uses a plug-in system to extend its\nfunctionality. libreport provides an API for reporting different problems\nin applications to different bug targets, such as Bugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can parse a\ntext file with a backtrace to a tree of C structures, allowing to analyze\nthe threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling exceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package\ninstalled and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to \"2\" (it is \"0\" by default), core dumps\nof set user ID (setuid) programs were created with insecure group ID\npermissions. This could allow local, unprivileged users to obtain sensitive\ninformation from the core dump files of setuid processes they would\notherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash information\nfor sensitive data prior to submitting it. This could lead to users\nunintentionally exposing sensitive information via the submitted crash\nreports. This update adds functionality to search across all the collected\ndata. Note that this fix does not apply to the default configuration, where\nreports are sent to Red Hat Customer Support. It only takes effect for\nusers sending information to Red Hat Bugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed to\nthe Red Hat Enterprise Linux 6.3 Technical Notes for information on the\nmost significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.\n", "modified": "2018-06-06T20:24:25", "published": "2012-06-20T04:00:00", "id": "RHSA-2012:0841", "href": "https://access.redhat.com/errata/RHSA-2012:0841", "type": "redhat", "title": "(RHSA-2012:0841) Low: abrt, libreport, btparser, and python-meh security and bug fix update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "centos": [{"lastseen": "2020-02-06T15:27:17", "bulletinFamily": "unix", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "**CentOS Errata and Security Advisory** CESA-2012:0841\n\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the information\nneeded by a maintainer to fix it. It uses a plug-in system to extend its\nfunctionality. libreport provides an API for reporting different problems\nin applications to different bug targets, such as Bugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can parse a\ntext file with a backtrace to a tree of C structures, allowing to analyze\nthe threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling exceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package\ninstalled and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to \"2\" (it is \"0\" by default), core dumps\nof set user ID (setuid) programs were created with insecure group ID\npermissions. This could allow local, unprivileged users to obtain sensitive\ninformation from the core dump files of setuid processes they would\notherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash information\nfor sensitive data prior to submitting it. This could lead to users\nunintentionally exposing sensitive information via the submitted crash\nreports. This update adds functionality to search across all the collected\ndata. Note that this fix does not apply to the default configuration, where\nreports are sent to Red Hat Customer Support. It only takes effect for\nusers sending information to Red Hat Bugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed to\nthe Red Hat Enterprise Linux 6.3 Technical Notes for information on the\nmost significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-July/030746.html\n\n**Affected packages:**\nabrt\nabrt-addon-ccpp\nabrt-addon-kerneloops\nabrt-addon-python\nabrt-addon-vmcore\nabrt-cli\nabrt-desktop\nabrt-devel\nabrt-gui\nabrt-libs\nabrt-tui\nbtparser\nbtparser-devel\nbtparser-python\nlibreport\nlibreport-cli\nlibreport-devel\nlibreport-gtk\nlibreport-gtk-devel\nlibreport-newt\nlibreport-plugin-bugzilla\nlibreport-plugin-kerneloops\nlibreport-plugin-logger\nlibreport-plugin-mailx\nlibreport-plugin-reportuploader\nlibreport-plugin-rhtsupport\nlibreport-python\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2012-0841.html", "edition": 4, "modified": "2012-07-10T17:16:48", "published": "2012-07-10T17:16:48", "href": "http://lists.centos.org/pipermail/centos-announce/2012-July/030746.html", "id": "CESA-2012:0841", "title": "abrt, btparser, libreport security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "oraclelinux": [{"lastseen": "2020-02-06T14:39:11", "bulletinFamily": "unix", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "description": "abrt\n[2.0.8-6.0.1.el6]\n- Add abrt-oracle-enterprise.patch to be product neutral\n- Remove abrt-plugin-rhtsupport dependency for cli and desktop\n- Make abrt Obsoletes/Provides abrt-plugin-rhtsupprot\n[2.0.8-6]\n- enable plugin services after install rhbz#820515\n- Resolves: #820515\n[2.0.8-5]\n- removed the 'report problem with ABRT btn' rhbz#809587\n- fixed double free\n- fixed ccpp-install man page\n- Resolves: #809587, #796216, #799027\n[2.0.8-4]\n- dont mark reports reported in post-create by mailx as reported\n- Resolves: #803618\n[2.0.8-3]\n- fixed remote crash handling rhbz#800828\n- Resolves: #800828\n[2.0.8-2]\n- updated translation\n- added man page for a-a-analyze-vmcore\n- minor fixes in kernel oops parser\n- Related: #759375\n[2.0.8-1]\n- rebase to the latest upstream\n- partly fixed probles with suided cores\n- fixed confusing message about 'moved copy'\n- properly enable daemons on update from previous version\n- added default config file for mailx\n- cli doesnt depend on python plugin\n- properly init i18n all plugins\n- added missing man page to abrt-cli\n- added warning when user tries to report already reported problem again\n- added vmcores plugin\n- Resolves: #759375, #783450, #773242, #771597, #770357, #751068, #749100, #747624, #727494\nbtparser\n[0.16-3]\n- Report correct crash_function in the crash sumary\n Resolves: rhbz#811147\n[0.16-1]\n- New upstream release\n Resolves: #768377\nlibreport\n[2.0.9-5.0.1.el6]\n- Add oracle-enterprise.patch\n- Remove libreport-plugin-rhtsupport pkg\n[2.0.9-5]\n- rebuild due to rpmdiff\n- Resolves: #823411\n[2.0.9-4]\n- fixed compatibility with bugzilla 4.2\n- Resolves: #823411\n[2.0.9-3]\n- added notify-only option to mailx rhbz#803618\n- Resolves: #803618\n[2.0.9-2]\n- minor fix in debuginfo downloader\n- updated translations\n- Related: #759377\n[2.0.9-1]\n- new upstream release\n- fixed typos in man\n- fixed handling of anaconda-tb file\n- generate valid xml file\n- Resolves: #759377, #758366, #746727\npython-meh\n[0.12.1-3]\n- Add dbus-python and libreport to BuildRequires (vpodzime).\n Related: rhbz#796176\n[0.12.1-2]\n- Add %check\nunset DISPLAY\n section to spec file (vpodzime).\n Resolves: rhbz#796176\n[0.12.1-1]\n- Adapt to new libreport API (vpodzime).\n Resolves: rhbz#769821\n- Add info about environment variables (vpodzime).\n Resolves: rhbz#788577\n[0.11-3]\n- Move 'import rpm' to where its needed to avoid nameserver problems.\n Resolves: rhbz#749330\n[0.11-2]\n- Change dependency to libreport-* (mtoman)\n Resolves: rhbz#730924\n- Add abrt-like information to bug reports (vpodzime).\n Resolves: rhbz#728871", "edition": 5, "modified": "2012-06-27T00:00:00", "published": "2012-06-27T00:00:00", "id": "ELSA-2012-0841", "href": "http://linux.oracle.com/errata/ELSA-2012-0841.html", "title": "abrt, libreport, btparser, and python-meh security and bug fix update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-17T13:46:41", "description": "ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. (CVE-2011-4088)\n\nThese updated packages include numerous bug fixes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.", "edition": 18, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : abrt, libreport, btparser, and python-meh on SL6.x i386/x86_64 (20120620)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "modified": "2012-08-01T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:libreport-python", "p-cpe:/a:fermilab:scientific_linux:btparser-debuginfo", "p-cpe:/a:fermilab:scientific_linux:libreport-plugin-logger", "p-cpe:/a:fermilab:scientific_linux:libreport-cli", "p-cpe:/a:fermilab:scientific_linux:libreport-gtk", "p-cpe:/a:fermilab:scientific_linux:abrt-libs", "p-cpe:/a:fermilab:scientific_linux:libreport-plugin-reportuploader", "p-cpe:/a:fermilab:scientific_linux:abrt-tui", "p-cpe:/a:fermilab:scientific_linux:libreport-plugin-rhtsupport", "p-cpe:/a:fermilab:scientific_linux:libreport-plugin-kerneloops", "p-cpe:/a:fermilab:scientific_linux:btparser-devel", "p-cpe:/a:fermilab:scientific_linux:abrt-debuginfo", "p-cpe:/a:fermilab:scientific_linux:btparser-python", "p-cpe:/a:fermilab:scientific_linux:python-meh", "p-cpe:/a:fermilab:scientific_linux:abrt-devel", "p-cpe:/a:fermilab:scientific_linux:libreport", "p-cpe:/a:fermilab:scientific_linux:abrt-addon-ccpp", "p-cpe:/a:fermilab:scientific_linux:libreport-plugin-bugzilla", "p-cpe:/a:fermilab:scientific_linux:libreport-devel", "p-cpe:/a:fermilab:scientific_linux:libreport-gtk-devel", "p-cpe:/a:fermilab:scientific_linux:abrt-desktop", "p-cpe:/a:fermilab:scientific_linux:abrt-cli", "p-cpe:/a:fermilab:scientific_linux:abrt-addon-kerneloops", "p-cpe:/a:fermilab:scientific_linux:libreport-plugin-mailx", "p-cpe:/a:fermilab:scientific_linux:btparser", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:abrt-addon-python", "p-cpe:/a:fermilab:scientific_linux:libreport-newt", "p-cpe:/a:fermilab:scientific_linux:abrt", "p-cpe:/a:fermilab:scientific_linux:abrt-gui", "p-cpe:/a:fermilab:scientific_linux:abrt-addon-vmcore", "p-cpe:/a:fermilab:scientific_linux:libreport-debuginfo"], "id": "SL_20120620_ABRT__LIBREPORT__BTPARSER__AND_PYTHON_MEH_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/61336", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61336);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n\n script_name(english:\"Scientific Linux Security Update : abrt, libreport, btparser, and python-meh on SL6.x i386/x86_64 (20120620)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. (CVE-2011-4088)\n\nThese updated packages include numerous bug fixes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1207&L=scientific-linux-errata&T=0&P=2933\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?416034de\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-addon-ccpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-addon-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-addon-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-addon-vmcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:abrt-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:btparser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:btparser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:btparser-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:btparser-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-gtk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-newt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-plugin-bugzilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-plugin-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-plugin-logger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-plugin-mailx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-plugin-reportuploader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-plugin-rhtsupport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:libreport-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:python-meh\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-addon-ccpp-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-addon-kerneloops-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-addon-python-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"abrt-addon-vmcore-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-cli-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"abrt-debuginfo-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-desktop-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"abrt-devel-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"abrt-gui-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-libs-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", cpu:\"x86_64\", reference:\"abrt-tui-2.0.8-6.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"btparser-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"btparser-debuginfo-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"btparser-devel-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"btparser-python-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-cli-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-debuginfo-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-devel-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-gtk-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-gtk-devel-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-newt-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-plugin-bugzilla-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-plugin-kerneloops-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-plugin-logger-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-plugin-mailx-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-plugin-reportuploader-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-plugin-rhtsupport-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"libreport-python-2.0.9-5.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"python-meh-0.12.1-3.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrt / abrt-addon-ccpp / abrt-addon-kerneloops / abrt-addon-python / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T13:10:54", "description": "Updated abrt, libreport, btparser, and python-meh packages that fix\ntwo security issues and several bugs are now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. Note that this fix does not apply to\nthe default configuration, where reports are sent to Red Hat Customer\nSupport. It only takes effect for users sending information to Red Hat\nBugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed\nto the Red Hat Enterprise Linux 6.3 Technical Notes for information on\nthe most significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.", "edition": 27, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2012-06-20T00:00:00", "title": "RHEL 6 : abrt, libreport, btparser, and python-meh (RHSA-2012:0841)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "modified": "2012-06-20T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:btparser-devel", "p-cpe:/a:redhat:enterprise_linux:abrt-libs", "p-cpe:/a:redhat:enterprise_linux:libreport", "p-cpe:/a:redhat:enterprise_linux:libreport-python", "p-cpe:/a:redhat:enterprise_linux:libreport-newt", "p-cpe:/a:redhat:enterprise_linux:abrt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:libreport-cli", "p-cpe:/a:redhat:enterprise_linux:libreport-gtk-devel", "p-cpe:/a:redhat:enterprise_linux:abrt-desktop", "p-cpe:/a:redhat:enterprise_linux:libreport-plugin-logger", "p-cpe:/a:redhat:enterprise_linux:abrt-cli", "p-cpe:/a:redhat:enterprise_linux:btparser", "p-cpe:/a:redhat:enterprise_linux:abrt-devel", "p-cpe:/a:redhat:enterprise_linux:btparser-python", "p-cpe:/a:redhat:enterprise_linux:abrt-addon-python", "p-cpe:/a:redhat:enterprise_linux:btparser-debuginfo", "p-cpe:/a:redhat:enterprise_linux:abrt", "p-cpe:/a:redhat:enterprise_linux:libreport-devel", "p-cpe:/a:redhat:enterprise_linux:abrt-addon-ccpp", "p-cpe:/a:redhat:enterprise_linux:libreport-plugin-bugzilla", "p-cpe:/a:redhat:enterprise_linux:libreport-plugin-reportuploader", "p-cpe:/a:redhat:enterprise_linux:python-meh", "p-cpe:/a:redhat:enterprise_linux:libreport-plugin-kerneloops", "p-cpe:/a:redhat:enterprise_linux:abrt-tui", "p-cpe:/a:redhat:enterprise_linux:libreport-gtk", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:libreport-debuginfo", "p-cpe:/a:redhat:enterprise_linux:abrt-addon-kerneloops", "p-cpe:/a:redhat:enterprise_linux:libreport-plugin-mailx", "p-cpe:/a:redhat:enterprise_linux:libreport-plugin-rhtsupport", "p-cpe:/a:redhat:enterprise_linux:abrt-addon-vmcore", "p-cpe:/a:redhat:enterprise_linux:abrt-gui"], "id": "REDHAT-RHSA-2012-0841.NASL", "href": "https://www.tenable.com/plugins/nessus/59589", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:0841. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(59589);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_xref(name:\"RHSA\", value:\"2012:0841\");\n\n script_name(english:\"RHEL 6 : abrt, libreport, btparser, and python-meh (RHSA-2012:0841)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated abrt, libreport, btparser, and python-meh packages that fix\ntwo security issues and several bugs are now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. Note that this fix does not apply to\nthe default configuration, where reports are sent to Red Hat Customer\nSupport. It only takes effect for users sending information to Red Hat\nBugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed\nto the Red Hat Enterprise Linux 6.3 Technical Notes for information on\nthe most significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.\"\n );\n # https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?056c0c27\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:0841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-4088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-1106\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-addon-ccpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-addon-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-addon-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-addon-vmcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:abrt-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:btparser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:btparser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:btparser-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:btparser-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-gtk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-newt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-plugin-bugzilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-plugin-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-plugin-logger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-plugin-mailx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-plugin-reportuploader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-plugin-rhtsupport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libreport-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-meh\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/06/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/06/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:0841\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-addon-ccpp-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-addon-ccpp-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-addon-ccpp-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-addon-kerneloops-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-addon-kerneloops-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-addon-kerneloops-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-addon-python-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-addon-python-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-addon-python-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-addon-vmcore-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-addon-vmcore-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-addon-vmcore-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-cli-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-cli-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-cli-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"abrt-debuginfo-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-desktop-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-desktop-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-desktop-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"abrt-devel-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-gui-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-gui-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-gui-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"abrt-libs-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"abrt-tui-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"abrt-tui-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"abrt-tui-2.0.8-6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"btparser-0.16-3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"btparser-debuginfo-0.16-3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"btparser-devel-0.16-3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"btparser-python-0.16-3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"btparser-python-0.16-3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"btparser-python-0.16-3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"libreport-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-cli-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-cli-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-cli-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"libreport-debuginfo-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"libreport-devel-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"libreport-gtk-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"libreport-gtk-devel-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-newt-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-newt-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-newt-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-plugin-bugzilla-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-plugin-bugzilla-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-plugin-bugzilla-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-plugin-kerneloops-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-plugin-kerneloops-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-plugin-kerneloops-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-plugin-logger-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-plugin-logger-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-plugin-logger-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-plugin-mailx-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-plugin-mailx-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-plugin-mailx-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-plugin-reportuploader-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-plugin-reportuploader-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-plugin-reportuploader-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-plugin-rhtsupport-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-plugin-rhtsupport-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-plugin-rhtsupport-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"libreport-python-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"libreport-python-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"libreport-python-2.0.9-5.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"python-meh-0.12.1-3.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrt / abrt-addon-ccpp / abrt-addon-kerneloops / abrt-addon-python / etc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-17T12:47:01", "description": "From Red Hat Security Advisory 2012:0841 :\n\nUpdated abrt, libreport, btparser, and python-meh packages that fix\ntwo security issues and several bugs are now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. Note that this fix does not apply to\nthe default configuration, where reports are sent to Red Hat Customer\nSupport. It only takes effect for users sending information to Red Hat\nBugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed\nto the Red Hat Enterprise Linux 6.3 Technical Notes for information on\nthe most significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.", "edition": 23, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 6 : abrt / btparser / libreport / python-meh (ELSA-2012-0841)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "modified": "2013-07-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:abrt-tui", "p-cpe:/a:oracle:linux:btparser-python", "p-cpe:/a:oracle:linux:libreport-plugin-reportuploader", "p-cpe:/a:oracle:linux:abrt-libs", "p-cpe:/a:oracle:linux:libreport-newt", "p-cpe:/a:oracle:linux:libreport-plugin-mailx", "p-cpe:/a:oracle:linux:libreport-gtk-devel", "p-cpe:/a:oracle:linux:btparser-devel", "p-cpe:/a:oracle:linux:abrt", "p-cpe:/a:oracle:linux:python-meh", "p-cpe:/a:oracle:linux:abrt-addon-python", "p-cpe:/a:oracle:linux:libreport-plugin-bugzilla", "p-cpe:/a:oracle:linux:abrt-addon-kerneloops", "p-cpe:/a:oracle:linux:libreport-gtk", "p-cpe:/a:oracle:linux:abrt-gui", "p-cpe:/a:oracle:linux:libreport-plugin-logger", "p-cpe:/a:oracle:linux:libreport-plugin-kerneloops", "p-cpe:/a:oracle:linux:abrt-devel", "p-cpe:/a:oracle:linux:abrt-addon-ccpp", "p-cpe:/a:oracle:linux:libreport-python", "p-cpe:/a:oracle:linux:abrt-desktop", "p-cpe:/a:oracle:linux:btparser", "p-cpe:/a:oracle:linux:libreport-cli", "p-cpe:/a:oracle:linux:abrt-addon-vmcore", "p-cpe:/a:oracle:linux:libreport", "p-cpe:/a:oracle:linux:libreport-devel", "p-cpe:/a:oracle:linux:abrt-cli"], "id": "ORACLELINUX_ELSA-2012-0841.NASL", "href": "https://www.tenable.com/plugins/nessus/68553", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:0841 and \n# Oracle Linux Security Advisory ELSA-2012-0841 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68553);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_bugtraq_id(51100, 54121);\n script_xref(name:\"RHSA\", value:\"2012:0841\");\n\n script_name(english:\"Oracle Linux 6 : abrt / btparser / libreport / python-meh (ELSA-2012-0841)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:0841 :\n\nUpdated abrt, libreport, btparser, and python-meh packages that fix\ntwo security issues and several bugs are now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. Note that this fix does not apply to\nthe default configuration, where reports are sent to Red Hat Customer\nSupport. It only takes effect for users sending information to Red Hat\nBugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed\nto the Red Hat Enterprise Linux 6.3 Technical Notes for information on\nthe most significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-July/002905.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-addon-ccpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-addon-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-addon-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-addon-vmcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:abrt-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:btparser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:btparser-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:btparser-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-gtk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-newt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-plugin-bugzilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-plugin-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-plugin-logger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-plugin-mailx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-plugin-reportuploader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libreport-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-meh\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"abrt-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-addon-ccpp-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-addon-kerneloops-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-addon-python-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-addon-vmcore-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-cli-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-desktop-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-devel-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-gui-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-libs-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"abrt-tui-2.0.8-6.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"btparser-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"btparser-devel-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"btparser-python-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-cli-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-devel-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-gtk-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-gtk-devel-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-newt-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-plugin-bugzilla-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-plugin-kerneloops-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-plugin-logger-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-plugin-mailx-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-plugin-reportuploader-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"libreport-python-2.0.9-5.0.1.el6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"python-meh-0.12.1-3.el6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrt / abrt-addon-ccpp / abrt-addon-kerneloops / abrt-addon-python / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-06T09:27:49", "description": "Updated abrt, libreport, btparser, and python-meh packages that fix\ntwo security issues and several bugs are now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. Note that this fix does not apply to\nthe default configuration, where reports are sent to Red Hat Customer\nSupport. It only takes effect for users sending information to Red Hat\nBugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed\nto the Red Hat Enterprise Linux 6.3 Technical Notes for information on\nthe most significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.", "edition": 26, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2012-07-11T00:00:00", "title": "CentOS 6 : abrt (CESA-2012:0841)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-1106", "CVE-2011-4088"], "modified": "2012-07-11T00:00:00", "cpe": ["p-cpe:/a:centos:centos:libreport", "p-cpe:/a:centos:centos:abrt-desktop", "p-cpe:/a:centos:centos:abrt-libs", "p-cpe:/a:centos:centos:libreport-cli", "p-cpe:/a:centos:centos:libreport-plugin-reportuploader", "cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:libreport-gtk", "p-cpe:/a:centos:centos:libreport-plugin-bugzilla", "p-cpe:/a:centos:centos:btparser-devel", "p-cpe:/a:centos:centos:abrt", "p-cpe:/a:centos:centos:abrt-devel", "p-cpe:/a:centos:centos:abrt-cli", "p-cpe:/a:centos:centos:libreport-plugin-mailx", "p-cpe:/a:centos:centos:libreport-devel", "p-cpe:/a:centos:centos:libreport-plugin-rhtsupport", "p-cpe:/a:centos:centos:abrt-addon-vmcore", "p-cpe:/a:centos:centos:libreport-gtk-devel", "p-cpe:/a:centos:centos:libreport-plugin-kerneloops", "p-cpe:/a:centos:centos:btparser-python", "p-cpe:/a:centos:centos:abrt-addon-kerneloops", "p-cpe:/a:centos:centos:libreport-python", "p-cpe:/a:centos:centos:abrt-gui", "p-cpe:/a:centos:centos:libreport-newt", "p-cpe:/a:centos:centos:abrt-addon-python", "p-cpe:/a:centos:centos:abrt-tui", "p-cpe:/a:centos:centos:btparser", "p-cpe:/a:centos:centos:libreport-plugin-logger", "p-cpe:/a:centos:centos:abrt-addon-ccpp"], "id": "CENTOS_RHSA-2012-0841.NASL", "href": "https://www.tenable.com/plugins/nessus/59924", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:0841 and \n# CentOS Errata and Security Advisory 2012:0841 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(59924);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2011-4088\", \"CVE-2012-1106\");\n script_xref(name:\"RHSA\", value:\"2012:0841\");\n\n script_name(english:\"CentOS 6 : abrt (CESA-2012:0841)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated abrt, libreport, btparser, and python-meh packages that fix\ntwo security issues and several bugs are now available for Red Hat\nEnterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nABRT (Automatic Bug Reporting Tool) is a tool to help users to detect\ndefects in applications and to create a bug report with all the\ninformation needed by a maintainer to fix it. It uses a plug-in system\nto extend its functionality. libreport provides an API for reporting\ndifferent problems in applications to different bug targets, such as\nBugzilla, FTP, and Trac.\n\nThe btparser utility is a backtrace parser and analyzer library, which\nworks with backtraces produced by the GNU Project Debugger. It can\nparse a text file with a backtrace to a tree of C structures, allowing\nto analyze the threads and frames of the backtrace and process them.\n\nThe python-meh package provides a python library for handling\nexceptions.\n\nIf the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp\npackage installed and the abrt-ccpp service running), and the sysctl\nfs.suid_dumpable option was set to '2' (it is '0' by default), core\ndumps of set user ID (setuid) programs were created with insecure\ngroup ID permissions. This could allow local, unprivileged users to\nobtain sensitive information from the core dump files of setuid\nprocesses they would otherwise not be able to access. (CVE-2012-1106)\n\nABRT did not allow users to easily search the collected crash\ninformation for sensitive data prior to submitting it. This could lead\nto users unintentionally exposing sensitive information via the\nsubmitted crash reports. This update adds functionality to search\nacross all the collected data. Note that this fix does not apply to\nthe default configuration, where reports are sent to Red Hat Customer\nSupport. It only takes effect for users sending information to Red Hat\nBugzilla. (CVE-2011-4088)\n\nRed Hat would like to thank Jan Iven for reporting CVE-2011-4088.\n\nThese updated packages include numerous bug fixes. Space precludes\ndocumenting all of these changes in this advisory. Users are directed\nto the Red Hat Enterprise Linux 6.3 Technical Notes for information on\nthe most significant of these changes.\n\nAll users of abrt, libreport, btparser, and python-meh are advised to\nupgrade to these updated packages, which correct these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-July/018708.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bd64de9e\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected abrt packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-1106\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-addon-ccpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-addon-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-addon-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-addon-vmcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-gui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:abrt-tui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:btparser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:btparser-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:btparser-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-gtk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-newt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-plugin-bugzilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-plugin-kerneloops\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-plugin-logger\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-plugin-mailx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-plugin-reportuploader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-plugin-rhtsupport\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libreport-python\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/07/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/07/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/07/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-addon-ccpp-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-addon-kerneloops-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-addon-python-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-addon-vmcore-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-cli-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-desktop-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-devel-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-gui-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-libs-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"abrt-tui-2.0.8-6.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"btparser-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"btparser-devel-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"btparser-python-0.16-3.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-cli-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-devel-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-gtk-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-gtk-devel-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-newt-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-plugin-bugzilla-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-plugin-kerneloops-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-plugin-logger-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-plugin-mailx-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-plugin-reportuploader-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-plugin-rhtsupport-2.0.9-5.el6.centos\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"libreport-python-2.0.9-5.el6.centos\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"abrt / abrt-addon-ccpp / abrt-addon-kerneloops / abrt-addon-python / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}