Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2015-13945.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(86313);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2015-6241", "CVE-2015-6242", "CVE-2015-6243", "CVE-2015-6244", "CVE-2015-6245", "CVE-2015-6246", "CVE-2015-6247", "CVE-2015-6248", "CVE-2015-6249");
script_xref(name:"FEDORA", value:"2015-13945");
script_name(english:"Fedora 22 : wireshark-1.12.7-2.fc22 (2015-13945)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Enable libnl3 (see rhbz#1207386, rhbz#1247566) - Remove
airpcap switch (doesn't have any effect on Linux) -
Backport patch no. 11 - Fixed building with F24+ * Ver.
1.12.7
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253352"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253353"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253354"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253355"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253356"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253357"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253359"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253360"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1253361"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?644db824"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected wireshark package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:wireshark");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:22");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/08/24");
script_set_attribute(attribute:"patch_publication_date", value:"2015/10/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/08");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^22([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 22.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC22", reference:"wireshark-1.12.7-2.fc22")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "wireshark");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | wireshark | p-cpe:/a:fedoraproject:fedora:wireshark |
fedoraproject | fedora | 22 | cpe:/o:fedoraproject:fedora:22 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6241
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6242
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6249
www.nessus.org/u?644db824
bugzilla.redhat.com/show_bug.cgi?id=1253352
bugzilla.redhat.com/show_bug.cgi?id=1253353
bugzilla.redhat.com/show_bug.cgi?id=1253354
bugzilla.redhat.com/show_bug.cgi?id=1253355
bugzilla.redhat.com/show_bug.cgi?id=1253356
bugzilla.redhat.com/show_bug.cgi?id=1253357
bugzilla.redhat.com/show_bug.cgi?id=1253359
bugzilla.redhat.com/show_bug.cgi?id=1253360
bugzilla.redhat.com/show_bug.cgi?id=1253361