Security fixes for :
CVE-2015-3315
CVE-2015-3142
CVE-2015-1869
CVE-2015-1870
CVE-2015-3151
CVE-2015-3150
CVE-2015-3159
abrt: =====
Move the default dump location from /var/tmp/abrt to /var/spool/abrt
Use root for owner of all dump directories
Stop reading hs_error.log from /tmp
Don not save the system logs by default
Don not save dmesg if kernel.dmesg_restrict=1
libreport: ==========
Harden the code against directory traversal, symbolic and hard link attacks
Fix a bug causing that the first value of AlwaysExcludedElements was ignored
Fix missing icon for the ‘Stop’ button icon name
Improve development documentation
Translations updates
gnome-abrt: ===========
Use DBus to get problem data for detail dialog
Fix an error introduced with the details on System page
Enabled the Details also for the System problems
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2015-10193.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(84475);
script_version("2.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2015-1869", "CVE-2015-1870", "CVE-2015-3142", "CVE-2015-3150", "CVE-2015-3151", "CVE-2015-3159", "CVE-2015-3315");
script_xref(name:"FEDORA", value:"2015-10193");
script_name(english:"Fedora 21 : abrt-2.3.0-7.fc21 / gnome-abrt-1.0.0-3.fc21 / libreport-2.3.0-8.fc21 (2015-10193)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Security fixes for :
- CVE-2015-3315
- CVE-2015-3142
- CVE-2015-1869
- CVE-2015-1870
- CVE-2015-3151
- CVE-2015-3150
- CVE-2015-3159
abrt: =====
- Move the default dump location from /var/tmp/abrt to
/var/spool/abrt
- Use root for owner of all dump directories
- Stop reading hs_error.log from /tmp
- Don not save the system logs by default
- Don not save dmesg if kernel.dmesg_restrict=1
libreport: ==========
- Harden the code against directory traversal, symbolic
and hard link attacks
- Fix a bug causing that the first value of
AlwaysExcludedElements was ignored
- Fix missing icon for the 'Stop' button icon name
- Improve development documentation
- Translations updates
gnome-abrt: ===========
- Use DBus to get problem data for detail dialog
- Fix an error introduced with the details on System
page
- Enabled the Details also for the System problems
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1169774"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1179752"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1193656"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1212821"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1212865"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1212871"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1213485"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1214452"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1214609"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1216975"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1218239"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=986876"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-June/161245.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?9e916c0f"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-June/161246.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d3b69026"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-June/161247.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d7b58c5a"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected abrt, gnome-abrt and / or libreport packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'ABRT raceabrt Privilege Escalation');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:abrt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gnome-abrt");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libreport");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:21");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/26");
script_set_attribute(attribute:"patch_publication_date", value:"2015/06/20");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/01");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^21([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 21.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC21", reference:"abrt-2.3.0-7.fc21")) flag++;
if (rpm_check(release:"FC21", reference:"gnome-abrt-1.0.0-3.fc21")) flag++;
if (rpm_check(release:"FC21", reference:"libreport-2.3.0-8.fc21")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "abrt / gnome-abrt / libreport");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3150
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3151
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3159
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3315
www.nessus.org/u?9e916c0f
www.nessus.org/u?d3b69026
www.nessus.org/u?d7b58c5a
bugzilla.redhat.com/show_bug.cgi?id=1169774
bugzilla.redhat.com/show_bug.cgi?id=1179752
bugzilla.redhat.com/show_bug.cgi?id=1193656
bugzilla.redhat.com/show_bug.cgi?id=1212821
bugzilla.redhat.com/show_bug.cgi?id=1212865
bugzilla.redhat.com/show_bug.cgi?id=1212871
bugzilla.redhat.com/show_bug.cgi?id=1213485
bugzilla.redhat.com/show_bug.cgi?id=1214452
bugzilla.redhat.com/show_bug.cgi?id=1214609
bugzilla.redhat.com/show_bug.cgi?id=1216975
bugzilla.redhat.com/show_bug.cgi?id=1218239
bugzilla.redhat.com/show_bug.cgi?id=986876