Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427 CVE-2017-15429
Security fix for CVE-2017-15398, CVE-2017-15399
Security fix for CVE-2017-15386 CVE-2017-15387 CVE-2017-15388 CVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392 CVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-5124 CVE-2017-5125 CVE-2017-5126 CVE-2017-5127.
Build switched to use gtk3.
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2017-ea44f172e3.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(105501);
script_version("3.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2017-15386", "CVE-2017-15387", "CVE-2017-15388", "CVE-2017-15389", "CVE-2017-15390", "CVE-2017-15391", "CVE-2017-15392", "CVE-2017-15393", "CVE-2017-15394", "CVE-2017-15395", "CVE-2017-15398", "CVE-2017-15399", "CVE-2017-15407", "CVE-2017-15408", "CVE-2017-15409", "CVE-2017-15410", "CVE-2017-15411", "CVE-2017-15412", "CVE-2017-15413", "CVE-2017-15415", "CVE-2017-15416", "CVE-2017-15417", "CVE-2017-15418", "CVE-2017-15419", "CVE-2017-15420", "CVE-2017-15422", "CVE-2017-15423", "CVE-2017-15424", "CVE-2017-15425", "CVE-2017-15426", "CVE-2017-15427", "CVE-2017-15429", "CVE-2017-5124", "CVE-2017-5125", "CVE-2017-5126", "CVE-2017-5127", "CVE-2017-5128", "CVE-2017-5129", "CVE-2017-5130", "CVE-2017-5131", "CVE-2017-5132", "CVE-2017-5133");
script_xref(name:"FEDORA", value:"2017-ea44f172e3");
script_name(english:"Fedora 26 : chromium (2017-ea44f172e3)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Security fix for CVE-2017-15412 CVE-2017-15422 CVE-2017-15407
CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411
CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417
CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15423
CVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427
CVE-2017-15429
----
Security fix for CVE-2017-15398, CVE-2017-15399
----
Security fix for CVE-2017-15386 CVE-2017-15387 CVE-2017-15388
CVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392
CVE-2017-15393 CVE-2017-15394 CVE-2017-15395 CVE-2017-5124
CVE-2017-5125 CVE-2017-5126 CVE-2017-5127.
Build switched to use gtk3.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2017-ea44f172e3"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected chromium package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:chromium");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:26");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/02/07");
script_set_attribute(attribute:"patch_publication_date", value:"2018/01/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/02");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^26([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 26", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC26", reference:"chromium-63.0.3239.108-1.fc26")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chromium");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | chromium | p-cpe:/a:fedoraproject:fedora:chromium |
fedoraproject | fedora | 26 | cpe:/o:fedoraproject:fedora:26 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15386
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15387
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15389
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15390
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15391
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15394
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15407
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15408
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15410
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15411
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15413
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15419
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15420
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15422
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15423
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15424
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15426
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5124
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5125
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5126
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5127
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5128
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5129
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5132
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5133
bodhi.fedoraproject.org/updates/FEDORA-2017-ea44f172e3