ID FEDORA_2017-F0D48EABE6.NASL Type nessus Reporter Tenable Modified 2018-02-02T00:00:00
Description
Update to upstream 3.5.13 release
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2017-f0d48eabe6.
#
include("compat.inc");
if (description)
{
script_id(101746);
script_version("$Revision: 3.2 $");
script_cvs_date("$Date: 2018/02/02 14:59:06 $");
script_cve_id("CVE-2017-7507");
script_xref(name:"FEDORA", value:"2017-f0d48eabe6");
script_name(english:"Fedora 26 : gnutls (2017-f0d48eabe6)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Update to upstream 3.5.13 release
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected gnutls package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:gnutls");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:26");
script_set_attribute(attribute:"patch_publication_date", value:"2017/06/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/17");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^26([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 26", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC26", reference:"gnutls-3.5.13-1.fc26")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gnutls");
}
{"id": "FEDORA_2017-F0D48EABE6.NASL", "bulletinFamily": "scanner", "title": "Fedora 26 : gnutls (2017-f0d48eabe6)", "description": "- Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2017-07-17T00:00:00", "modified": "2018-02-02T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=101746", "reporter": "Tenable", "references": ["https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6"], "cvelist": ["CVE-2017-7507"], "type": "nessus", "lastseen": "2018-02-04T10:56:27", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:gnutls", "cpe:/o:fedoraproject:fedora:26"], "cvelist": ["CVE-2017-7507"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "- Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 2, "enchantments": {"score": {"modified": "2017-10-29T13:34:12", "value": 5.0}}, "hash": "07f69ab7325b11db0d89d2e05e19bdad80b148fb73897f607b27eae896b679e9", "hashmap": [{"hash": "d7c4629831d41e9f9706cc497d88ae13", "key": "description"}, {"hash": "284092abb25dc6a4ca09421a28bf0896", "key": "title"}, {"hash": "0b1120cd0b8a3af6d2e08104fa0e9872", "key": "modified"}, {"hash": "4db7decfde5a346ab9429b16631815dc", "key": "cvelist"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "0b1120cd0b8a3af6d2e08104fa0e9872", "key": "published"}, {"hash": "e2a00ce028b375eb0a00f54bd0bc2637", "key": "references"}, {"hash": "af58fe0ed0e11a94a9fc52651bc4c3e7", "key": "sourceData"}, {"hash": "addc47d365a7b8b91284a88b08efca5c", "key": "cpe"}, {"hash": "ea00442a9942febfaf2d3384eff7c064", "key": "pluginID"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "871055efd3f36ff00ab93e71e6ce34bb", "key": "href"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=101746", "id": "FEDORA_2017-F0D48EABE6.NASL", "lastseen": "2017-10-29T13:34:12", "modified": "2017-07-17T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "101746", "published": "2017-07-17T00:00:00", "references": ["https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-f0d48eabe6.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101746);\n script_version(\"$Revision: 3.1 $\");\n script_cvs_date(\"$Date: 2017/07/17 13:47:17 $\");\n\n script_cve_id(\"CVE-2017-7507\");\n script_xref(name:\"FEDORA\", value:\"2017-f0d48eabe6\");\n\n script_name(english:\"Fedora 26 : gnutls (2017-f0d48eabe6)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gnutls package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnutls\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"gnutls-3.5.13-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gnutls\");\n}\n", "title": "Fedora 26 : gnutls (2017-f0d48eabe6)", "type": "nessus", "viewCount": 5}, "differentElements": ["modified", "sourceData"], "edition": 2, "lastseen": "2017-10-29T13:34:12"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": ["CVE-2017-7507"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "- Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 1, "enchantments": {}, "hash": "a7a839b2961ceb0c5f82ff2335a3d2a739be410f86a15f3bde50b84170a56212", "hashmap": [{"hash": "d7c4629831d41e9f9706cc497d88ae13", "key": "description"}, {"hash": "284092abb25dc6a4ca09421a28bf0896", "key": "title"}, {"hash": "0b1120cd0b8a3af6d2e08104fa0e9872", "key": "modified"}, {"hash": "4db7decfde5a346ab9429b16631815dc", "key": "cvelist"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "0b1120cd0b8a3af6d2e08104fa0e9872", "key": "published"}, {"hash": "e2a00ce028b375eb0a00f54bd0bc2637", "key": "references"}, {"hash": "af58fe0ed0e11a94a9fc52651bc4c3e7", "key": "sourceData"}, {"hash": "ea00442a9942febfaf2d3384eff7c064", "key": "pluginID"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "871055efd3f36ff00ab93e71e6ce34bb", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=101746", "id": "FEDORA_2017-F0D48EABE6.NASL", "lastseen": "2017-07-17T22:22:56", "modified": "2017-07-17T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "101746", "published": "2017-07-17T00:00:00", "references": ["https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-f0d48eabe6.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101746);\n script_version(\"$Revision: 3.1 $\");\n script_cvs_date(\"$Date: 2017/07/17 13:47:17 $\");\n\n script_cve_id(\"CVE-2017-7507\");\n script_xref(name:\"FEDORA\", value:\"2017-f0d48eabe6\");\n\n script_name(english:\"Fedora 26 : gnutls (2017-f0d48eabe6)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gnutls package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnutls\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"gnutls-3.5.13-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gnutls\");\n}\n", "title": "Fedora 26 : gnutls (2017-f0d48eabe6)", "type": "nessus", "viewCount": 5}, "differentElements": ["cpe"], "edition": 1, "lastseen": "2017-07-17T22:22:56"}], "edition": 3, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "addc47d365a7b8b91284a88b08efca5c"}, {"key": "cvelist", "hash": "4db7decfde5a346ab9429b16631815dc"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "d7c4629831d41e9f9706cc497d88ae13"}, {"key": "href", "hash": "871055efd3f36ff00ab93e71e6ce34bb"}, {"key": "modified", "hash": "e5ea4e133fdd22d0dad25dd00662de7f"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "ea00442a9942febfaf2d3384eff7c064"}, {"key": "published", "hash": "0b1120cd0b8a3af6d2e08104fa0e9872"}, {"key": "references", "hash": "e2a00ce028b375eb0a00f54bd0bc2637"}, {"key": "reporter", "hash": "9cf00d658b687f030ebe173a0528c567"}, {"key": "sourceData", "hash": "85e42127dee0270f9020e3712283094e"}, {"key": "title", "hash": "284092abb25dc6a4ca09421a28bf0896"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "3dc18c07d44dbb5597af55696997b2af3da78c0b132c1da88d2d555f55bbcaa7", "viewCount": 5, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-f0d48eabe6.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101746);\n script_version(\"$Revision: 3.2 $\");\n script_cvs_date(\"$Date: 2018/02/02 14:59:06 $\");\n\n script_cve_id(\"CVE-2017-7507\");\n script_xref(name:\"FEDORA\", value:\"2017-f0d48eabe6\");\n\n script_name(english:\"Fedora 26 : gnutls (2017-f0d48eabe6)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-f0d48eabe6\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected gnutls package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnutls\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"gnutls-3.5.13-1.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gnutls\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "101746", "cpe": ["p-cpe:/a:fedoraproject:fedora:gnutls", "cpe:/o:fedoraproject:fedora:26"]}
{"result": {"f5": [{"id": "F5:K37830055", "type": "f5", "title": "GnuTLS vulnerability CVE-2017-7507", "description": "\nF5 Product Development has assigned ID 454906 (ARX) to this vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP AAM| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP AFM| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP Analytics| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP APM| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP ASM| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP DNS| None| 13.0.0 \n12.0.0 - 12.1.2| Not vulnerable| None \nBIG-IP Edge Gateway| None| 11.2.1| Not vulnerable| None \nBIG-IP GTM| None| 11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP Link Controller| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP PEM| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP PSM| None| 11.4.0 - 11.4.1| Not vulnerable| None \nBIG-IP WebAccelerator| None| 11.2.1| Not vulnerable| None \nBIG-IP WebSafe| None| 13.0.0 \n12.0.0 - 12.1.2 \n11.6.0 - 11.6.1| Not vulnerable| None \nARX| 6.2.0 - 6.4.0| None| High| ARX GUI \nEnterprise Manager| None| 3.1.1| Not vulnerable| None \nBIG-IQ Cloud| None| 4.4.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Device| None| 4.4.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Security| None| 4.4.0 - 4.5.0| Not vulnerable| None \nBIG-IQ ADC| None| 4.5.0| Not vulnerable| None \nBIG-IQ Centralized Management| None| 5.0.0 - 5.2.0 \n4.6.0| Not vulnerable| None \nBIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None \nF5 iWorkflow| None| 2.0.0 - 2.2.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.2| Not vulnerable| None \nTraffix SDC| None| 5.0.0 - 5.1.0 \n4.0.0 - 4.4.0| Not vulnerable| None\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nTo mitigate this vulnerability, you can limit access to the ARX GUI to only those connecting from secured networks.\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n", "published": "2017-07-01T01:30:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://support.f5.com/csp/article/K37830055", "cvelist": ["CVE-2017-7507"], "lastseen": "2017-07-03T23:58:28"}], "cve": [{"id": "CVE-2017-7507", "type": "cve", "title": "CVE-2017-7507", "description": "GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.", "published": "2017-06-16T15:29:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7507", "cvelist": ["CVE-2017-7507"], "lastseen": "2018-01-05T11:53:19"}], "nessus": [{"id": "DEBIAN_DSA-3884.NASL", "type": "nessus", "title": "Debian DSA-3884-1 : gnutls28 - security update", "description": "Hubert Kario discovered that GnuTLS, a library implementing the TLS and SSL protocols, does not properly decode a status response TLS extension, allowing a remote attacker to cause an application using the GnuTLS library to crash (denial of service).", "published": "2017-06-19T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=100852", "cvelist": ["CVE-2017-7507"], "lastseen": "2018-01-30T00:53:52"}, {"id": "FEDORA_2017-7936341C80.NASL", "type": "nessus", "title": "Fedora 26 : mingw-gnutls (2017-7936341c80)", "description": "https://lists.gnupg.org/pipermail/gnutls-devel/2017-June/008446.html\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2017-07-17T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=101660", "cvelist": ["CVE-2017-7507"], "lastseen": "2018-02-04T11:08:09"}, {"id": "FEDORA_2017-F646217583.NASL", "type": "nessus", "title": "Fedora 25 : gnutls (2017-f646217583)", "description": "- Update to upstream 3.5.13 release\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2017-06-12T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=100736", "cvelist": ["CVE-2017-7507"], "lastseen": "2018-02-04T11:04:55"}, {"id": "SUSE_SU-2017-1838-1.NASL", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : gnutls (SUSE-SU-2017:1838-1)", "description": "This update for gnutls fixes the following issues :\n\n - GNUTLS-SA-2017-4 / CVE-2017-7507: Fix crash in status response TLS extension decoding (bsc#1043398)\n\n - GNUTLS-SA-2017-3 / CVE-2017-7869: Fix out-of-bounds write in OpenPGP certificate decoding (bsc#1034173)\n\n - Address read of 4 bytes past the end of buffer in OpenPGP certificate parsing (bsc#1038337)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2017-07-12T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=101393", "cvelist": ["CVE-2017-7869", "CVE-2017-7507"], "lastseen": "2018-02-01T03:15:32"}, {"id": "OPENSUSE-2017-824.NASL", "type": "nessus", "title": "openSUSE Security Update : gnutls (openSUSE-2017-824)", "description": "This update for gnutls fixes the following issues :\n\n - GNUTLS-SA-2017-4 / CVE-2017-7507: Fix crash in status response TLS extension decoding (bsc#1043398)\n\n - GNUTLS-SA-2017-3 / CVE-2017-7869: Fix out-of-bounds write in OpenPGP certificate decoding (bsc#1034173)\n\n - Address read of 4 bytes past the end of buffer in OpenPGP certificate parsing (bsc#1038337)\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "published": "2017-07-17T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=101759", "cvelist": ["CVE-2017-7869", "CVE-2017-7507"], "lastseen": "2018-01-27T03:03:28"}, {"id": "UBUNTU_USN-3318-1.NASL", "type": "nessus", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : gnutls26, gnutls28 vulnerabilities (USN-3318-1)", "description": "Hubert Kario discovered that GnuTLS incorrectly handled decoding a status response TLS extension. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service.\nThis issue only applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-7507)\n\nIt was discovered that GnuTLS incorrectly handled decoding certain OpenPGP certificates. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-7869).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2017-06-14T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=100781", "cvelist": ["CVE-2017-7869", "CVE-2017-7507"], "lastseen": "2018-01-31T07:00:30"}, {"id": "EULEROS_SA-2017-1204.NASL", "type": "nessus", "title": "EulerOS 2.0 SP2 : gnutls (EulerOS-SA-2017-1204)", "description": "According to the versions of the gnutls packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially-crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334)\n\n - Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash.\n (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)\n\n - A null pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507)\n\n - A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2017-09-11T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=103062", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2018-01-31T07:03:25"}, {"id": "REDHAT-RHSA-2017-2292.NASL", "type": "nessus", "title": "RHEL 7 : gnutls (RHSA-2017:2292)", "description": "An update for gnutls is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nThe following packages have been upgraded to a later upstream version:\ngnutls (3.3.26). (BZ#1378373)\n\nSecurity Fix(es) :\n\n* A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334)\n\n* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash.\n(CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)\n\n* A NULL pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507)\n\n* A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)\n\nThe CVE-2017-7507 issue was discovered by Hubert Kario (Red Hat QE BaseOS Security team).\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.", "published": "2017-08-02T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=102116", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2018-01-26T13:10:06"}, {"id": "ORACLELINUX_ELSA-2017-2292.NASL", "type": "nessus", "title": "Oracle Linux 7 : gnutls (ELSA-2017-2292)", "description": "From Red Hat Security Advisory 2017:2292 :\n\nAn update for gnutls is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nThe following packages have been upgraded to a later upstream version:\ngnutls (3.3.26). (BZ#1378373)\n\nSecurity Fix(es) :\n\n* A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334)\n\n* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash.\n(CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)\n\n* A NULL pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507)\n\n* A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)\n\nThe CVE-2017-7507 issue was discovered by Hubert Kario (Red Hat QE BaseOS Security team).\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.", "published": "2017-08-09T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=102303", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2018-02-02T05:26:09"}, {"id": "SL_20170801_GNUTLS_ON_SL7_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : gnutls on SL7.x x86_64", "description": "The following packages have been upgraded to a later upstream version:\ngnutls (3.3.26).\n\nSecurity Fix(es) :\n\n - A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334)\n\n - Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)\n\n - A NULL pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507)\n\n - A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)", "published": "2017-08-22T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=102642", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2018-01-27T03:10:23"}], "gentoo": [{"id": "GLSA-201710-15", "type": "gentoo", "title": "GnuTLS: Denial of Service", "description": "### Background\n\nGnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. \n\n### Description\n\nA null pointer dereference while decoding a status response TLS extension with valid contents was discovered in GnuTLS. \n\n### Impact\n\nA remote attacker could possibly cause a Denial of Service condition.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll GnuTLS users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-libs/gnutls-3.5.13\"\n \n\nPackages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.", "published": "2017-10-15T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://security.gentoo.org/glsa/201710-15", "cvelist": ["CVE-2017-7507"], "lastseen": "2017-10-15T08:23:04"}], "debian": [{"id": "DSA-3884", "type": "debian", "title": "gnutls28 -- security update", "description": "Hubert Kario discovered that GnuTLS, a library implementing the TLS and SSL protocols, does not properly decode a status response TLS extension, allowing a remote attacker to cause an application using the GnuTLS library to crash (denial of service).\n\nFor the stable distribution (jessie), this problem has been fixed in version 3.3.8-6+deb8u6.\n\nFor the upcoming stable distribution (stretch), this problem has been fixed in version 3.5.8-5+deb9u1.\n\nFor the unstable distribution (sid), this problem has been fixed in version 3.5.8-6.\n\nWe recommend that you upgrade your gnutls28 packages.", "published": "2017-06-16T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://www.debian.org/security/dsa-3884", "cvelist": ["CVE-2017-7507"], "lastseen": "2017-10-05T13:09:40"}], "openvas": [{"id": "OPENVAS:1361412562310703884", "type": "openvas", "title": "Debian Security Advisory DSA 3884-1 (gnutls28 - security update)", "description": "Hubert Kario discovered that GnuTLS, a library implementing the TLS and\nSSL protocols, does not properly decode a status response TLS extension,\nallowing a remote attacker to cause an application using the GnuTLS\nlibrary to crash (denial of service).", "published": "2017-06-16T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703884", "cvelist": ["CVE-2017-7507"], "lastseen": "2018-04-06T11:44:15"}, {"id": "OPENVAS:703884", "type": "openvas", "title": "Debian Security Advisory DSA 3884-1 (gnutls28 - security update)", "description": "Hubert Kario discovered that GnuTLS, a library implementing the TLS and\nSSL protocols, does not properly decode a status response TLS extension,\nallowing a remote attacker to cause an application using the GnuTLS\nlibrary to crash (denial of service).", "published": "2017-06-16T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=703884", "cvelist": ["CVE-2017-7507"], "lastseen": "2017-07-24T12:57:56"}, {"id": "OPENVAS:1361412562310872751", "type": "openvas", "title": "Fedora Update for gnutls FEDORA-2017-f646217583", "description": "Check the version of gnutls", "published": "2017-06-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872751", "cvelist": ["CVE-2017-7507"], "lastseen": "2017-07-25T10:57:52"}, {"id": "OPENVAS:1361412562310843205", "type": "openvas", "title": "Ubuntu Update for gnutls28 USN-3318-1", "description": "Check the version of gnutls28", "published": "2017-06-14T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843205", "cvelist": ["CVE-2017-7869", "CVE-2017-7507"], "lastseen": "2017-07-25T10:57:38"}, {"id": "OPENVAS:1361412562310871850", "type": "openvas", "title": "RedHat Update for gnutls RHSA-2017:2292-01", "description": "Check the version of gnutls", "published": "2017-08-04T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871850", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2017-08-21T11:27:22"}], "ubuntu": [{"id": "USN-3318-1", "type": "ubuntu", "title": "GnuTLS vulnerabilities", "description": "Hubert Kario discovered that GnuTLS incorrectly handled decoding a status response TLS extension. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-7507)\n\nIt was discovered that GnuTLS incorrectly handled decoding certain OpenPGP certificates. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-7869)", "published": "2017-06-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://usn.ubuntu.com/3318-1/", "cvelist": ["CVE-2017-7869", "CVE-2017-7507"], "lastseen": "2018-03-29T18:21:22"}], "cloudfoundry": [{"id": "CFOUNDRY:BCA839343D507E24469E4140C3427365", "type": "cloudfoundry", "title": "USN-3318-1: GnuTLS vulnerabilities - Cloud Foundry", "description": "# \n\n# Severity\n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 14.04\n\n# Description\n\nHubert Kario discovered that GnuTLS incorrectly handled decoding a status response TLS extension. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. ([CVE-2017-7507](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-7507>))\n\nIt was discovered that GnuTLS incorrectly handled decoding certain OpenPGP certificates. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. ([CVE-2017-7869](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-7869>))\n\n# Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH stemcells are vulnerable, including: \n * 3263.x versions prior to 3263.28\n * 3312.x versions prior to 3312.29\n * 3363.x versions prior to 3363.26\n * 3421.x versions prior to 3421.9\n * All other stemcells not listed.\n * All versions of Cloud Foundry cflinuxfs2 prior to 1.131.0\n\n# Mitigation\n\nOSS users are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH stemcells: \n * Upgrade 3263.x versions prior to 3263.28\n * Upgrade 3312.x versions prior to 3312.29\n * Upgrade 3363.x versions prior to 3363.26\n * Upgrade 3421.x versions prior to 3421.9\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io>).\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 version 1.131.0 or later.\n\n# References\n\n * [USN-3318-1](<http://www.ubuntu.com/usn/usn-3318-1/>)\n * [CVE-2017-7507](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-7507>)\n * [CVE-2017-7869](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-7869>)\n", "published": "2017-06-22T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://www.cloudfoundry.org/blog/usn-3318-1/", "cvelist": ["CVE-2017-7869", "CVE-2017-7507"], "lastseen": "2018-01-12T14:52:57"}], "redhat": [{"id": "RHSA-2017:2292", "type": "redhat", "title": "(RHSA-2017:2292) Moderate: gnutls security, bug fix, and enhancement update", "description": "The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nThe following packages have been upgraded to a later upstream version: gnutls (3.3.26). (BZ#1378373)\n\nSecurity Fix(es):\n\n* A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially-crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334)\n\n* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)\n\n* A null pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507)\n\n* A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)\n\nThe CVE-2017-7507 issue was discovered by Hubert Kario (Red Hat QE BaseOS Security team).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.", "published": "2017-08-01T07:48:16", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://access.redhat.com/errata/RHSA-2017:2292", "cvelist": ["CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-5336", "CVE-2017-5337", "CVE-2017-7507", "CVE-2017-7869"], "lastseen": "2018-04-15T12:24:03"}], "centos": [{"id": "CESA-2017:2292", "type": "centos", "title": "gnutls security update", "description": "**CentOS Errata and Security Advisory** CESA-2017:2292\n\n\nThe gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nThe following packages have been upgraded to a later upstream version: gnutls (3.3.26). (BZ#1378373)\n\nSecurity Fix(es):\n\n* A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially-crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334)\n\n* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869)\n\n* A null pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507)\n\n* A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)\n\nThe CVE-2017-7507 issue was discovered by Hubert Kario (Red Hat QE BaseOS Security team).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2017-August/004178.html\n\n**Affected packages:**\ngnutls\ngnutls-c++\ngnutls-dane\ngnutls-devel\ngnutls-utils\n\n**Upstream details at:**\n", "published": "2017-08-24T01:37:44", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.centos.org/pipermail/centos-cr-announce/2017-August/004178.html", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2017-10-03T18:25:53"}], "oraclelinux": [{"id": "ELSA-2017-2292", "type": "oraclelinux", "title": "gnutls security, bug fix, and enhancement update", "description": "[3.3.26-9]\n- Address crash in OCSP status request extension, by eliminating the\n unneeded parsing (CVE-2017-7507, #1455828)\n[3.3.26-7]\n- Address interoperability issue with 3.5.x (#1388932)\n- Reject CAs which are both trusted and blacklisted in trust module (#1375303)\n- Added new functions to set issuer and subject ID in certificates (#1378373)\n- Reject connections with less than 1024-bit DH parameters (#1335931)\n- Fix issue that made GnuTLS parse only the first 32 extensions (#1383748)\n- Mention limitations of certtool in manpage (#1375463)\n- Read PKCS#8 files with HMAC-SHA256 -as generated by openssl 1.1 (#1380642)\n- Do not link directly to trousers but instead use dlopen (#1379739)\n- Fix incorrect OCSP validation (#1377569)\n- Added support for pin-value in PKCS#11 URIs (#1379283)\n- Added the --id option to p11tool (#1399232)\n- Improved sanity checks in RSA key generation (#1444780)\n- Addressed CVE-2017-5334, CVE-2017-5335, CVE-2017-5336, CVE-2017-5337,\n CVE-2017-7869", "published": "2017-08-07T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://linux.oracle.com/errata/ELSA-2017-2292.html", "cvelist": ["CVE-2017-5336", "CVE-2017-7869", "CVE-2016-7444", "CVE-2017-5334", "CVE-2017-5335", "CVE-2017-7507", "CVE-2017-5337"], "lastseen": "2017-08-08T04:23:06"}]}}