The remote Fedora host is missing a security update. Fixed CVE-2014-1934
Reporter | Title | Published | Views | Family All 19 |
---|---|---|---|---|
![]() | Fedora 21 : python-eyed3-0.7.4-4.fc21 (2014-15450) | 7 Dec 201400:00 | – | nessus |
![]() | openSUSE Security Update : python-eyeD3 (openSUSE-SU-2014:0620-1) | 13 Jun 201400:00 | – | nessus |
![]() | openSUSE Security Update : python-eyeD3 (openSUSE-SU-2014:0619-1) | 13 Jun 201400:00 | – | nessus |
![]() | Fedora 20 : python-eyed3-0.7.4-4.fc20 (2014-15464) | 2 Dec 201400:00 | – | nessus |
![]() | CVE-2014-1934 | 8 May 201414:29 | – | nvd |
![]() | Fedora Update for python-eyed3 FEDORA-2014-15464 | 2 Dec 201400:00 | – | openvas |
![]() | Fedora Update for python-eyed3 FEDORA-2014-15450 | 5 Jan 201500:00 | – | openvas |
![]() | Fedora Update for python-eyed3 FEDORA-2014-15477 | 2 Dec 201400:00 | – | openvas |
![]() | python-eyeD3-0.7.4-3.3 on GA media | 15 Jun 202400:00 | – | osv |
![]() | eyeD3 is vulnerable to arbitrary file modification via symlink attack | 14 May 202202:09 | – | osv |
Source | Link |
---|---|
nessus | www.nessus.org/u |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2014-15477.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(79650);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2014-1934");
script_bugtraq_id(65480);
script_xref(name:"FEDORA", value:"2014-15477");
script_name(english:"Fedora 19 : python-eyed3-0.7.4-4.fc19 (2014-15477)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Fixed CVE-2014-1934.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1063671"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145070.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?bbd2e19f"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected python-eyed3 package."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:ND");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:python-eyed3");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
script_set_attribute(attribute:"patch_publication_date", value:"2014/11/20");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/02");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC19", reference:"python-eyed3-0.7.4-4.fc19")) flag++;
if (flag)
{
if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
else security_note(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-eyed3");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo