Fedora 27 : httpd (2018-c3dc008c54)

2018-07-30T00:00:00
ID FEDORA_2018-C3DC008C54.NASL
Type nessus
Reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2020-05-02T00:00:00

Description

This update includes the latest upstream release,

httpd 2.4.34, with multiple bug fixes and enhancements. See http://www.apache.org/dist/httpd/CHANGES_2.4.34 for more information on the changes in this version.

A security vulnerability is addressed in this update :

  • mod_md: DoS via Coredumps on specially crafted requests (CVE-2018-8011) The following changes are also included in this update :

  • The post-transaction scriptlet to restart httpd.service no longer blocks waiting for the restart to complete.

  • mod_ssl now supports loading private keys (and associated certificates) from a PKCS#11 provider. Use a pkcs11: URI in the SSLCertificateKeyFile (and optionally SSLCertificateFile) directive(s).

  • An example Lua-based server-status.conf is packaged in the docdir

  • httpd now Obsoletes mod_proxy_uwsgi (RHBZ#1599113)

  • mod_systemd now logs listening ports at startup

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory FEDORA-2018-c3dc008c54.
#

include("compat.inc");

if (description)
{
  script_id(111401);
  script_version("1.3");
  script_cvs_date("Date: 2019/09/23 11:21:08");

  script_cve_id("CVE-2018-8011");
  script_xref(name:"FEDORA", value:"2018-c3dc008c54");

  script_name(english:"Fedora 27 : httpd (2018-c3dc008c54)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This update includes the latest upstream release, 

**httpd 2.4.34**, with multiple bug fixes and enhancements. See
http://www.apache.org/dist/httpd/CHANGES_2.4.34 for more information
on the changes in this version.

A security vulnerability is addressed in this update :

  - `mod_md`: DoS via Coredumps on specially crafted
    requests (CVE-2018-8011) The following changes are also
    included in this update :

  - The post-transaction scriptlet to restart
    `httpd.service` no longer blocks waiting for the restart
    to complete.

  - `mod_ssl` now supports loading private keys (and
    associated certificates) from a PKCS#11 provider. Use a
    `pkcs11:` URI in the `SSLCertificateKeyFile` (and
    optionally `SSLCertificateFile`) directive(s).

  - An example Lua-based `server-status.conf` is packaged in
    the docdir 

  - `httpd` now Obsoletes `mod_proxy_uwsgi` (RHBZ#1599113)

  - `mod_systemd` now logs listening ports at startup

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.apache.org/dist/httpd/CHANGES_2.4.34"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-c3dc008c54"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected httpd package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:httpd");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:27");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/07/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/07/30");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^27([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 27", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);


flag = 0;
if (rpm_check(release:"FC27", reference:"httpd-2.4.34-3.fc27")) flag++;


if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpd");
}