ID FEDORA_2019-9EF30A3636.NASL Type nessus Reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
This release fixes a buffer overflow when processing RIFF/WAV files
with in invalid MS ADPCM predictor.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2019-9ef30a3636.
#
include("compat.inc");
if (description)
{
script_id(124521);
script_version("1.3");
script_cvs_date("Date: 2020/01/21");
script_cve_id("CVE-2019-7577");
script_xref(name:"FEDORA", value:"2019-9ef30a3636");
script_name(english:"Fedora 30 : SDL (2019-9ef30a3636)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"This release fixes a buffer overflow when processing RIFF/WAV files
with in invalid MS ADPCM predictor.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-9ef30a3636"
);
script_set_attribute(attribute:"solution", value:"Update the affected SDL package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:SDL");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:30");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/07");
script_set_attribute(attribute:"patch_publication_date", value:"2019/03/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/02");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^30([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 30", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC30", reference:"SDL-1.2.15-38.fc30")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "SDL");
}
{"id": "FEDORA_2019-9EF30A3636.NASL", "bulletinFamily": "scanner", "title": "Fedora 30 : SDL (2019-9ef30a3636)", "description": "This release fixes a buffer overflow when processing RIFF/WAV files\nwith in invalid MS ADPCM predictor.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "published": "2019-05-02T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/124521", "reporter": "This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://bodhi.fedoraproject.org/updates/FEDORA-2019-9ef30a3636"], "cvelist": ["CVE-2019-7577"], "type": "nessus", "lastseen": "2021-01-01T02:26:41", "edition": 17, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2019-7577"]}, {"type": "fedora", "idList": ["FEDORA:EC037608A21F", "FEDORA:BAC2A603B290", "FEDORA:BDEE460C2503", "FEDORA:83AED60603E6", "FEDORA:6490D6085907", "FEDORA:226326071258", "FEDORA:19A176082DBB"]}, {"type": "nessus", "idList": ["FEDORA_2019-BF531902C8.NASL", "DEBIAN_DLA-1714.NASL", "EULEROS_SA-2019-1469.NASL", "AL2_ALAS-2020-1500.NASL", "EULEROS_SA-2019-1126.NASL", "ORACLELINUX_ELSA-2020-3868.NASL", "FEDORA_2019-918AAD6BD5.NASL", "EULEROS_SA-2019-1343.NASL", "DEBIAN_DLA-1713.NASL", "EULEROS_SA-2019-1151.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310891714", "OPENVAS:1361412562310852443", "OPENVAS:1361412562311220191343", "OPENVAS:1361412562311220191126", "OPENVAS:1361412562310875488", "OPENVAS:1361412562310875515", "OPENVAS:1361412562310891713", "OPENVAS:1361412562310875696", "OPENVAS:1361412562311220191469", "OPENVAS:1361412562311220191151"]}, {"type": "archlinux", "idList": ["ASA-201910-8", "ASA-201908-5"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1213-1", "OPENSUSE-SU-2019:1223-1", "OPENSUSE-SU-2019:1261-1"]}, {"type": "gentoo", "idList": ["GLSA-201909-07"]}, {"type": "centos", "idList": ["CESA-2020:3868"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1713-2:CAA4F", "DEBIAN:DLA-1714-2:98CFC", "DEBIAN:DLA-1714-1:580CA", "DEBIAN:DLA-1713-1:F4DFB"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-4627", "ELSA-2020-3868"]}, {"type": "redhat", "idList": ["RHSA-2020:4627", "RHSA-2020:3868"]}, {"type": "amazon", "idList": ["ALAS2-2020-1500"]}, {"type": "ubuntu", "idList": ["USN-4156-1", "USN-4156-2"]}], "modified": "2021-01-01T02:26:41", "rev": 2}, "score": {"value": 7.4, "vector": "NONE", "modified": "2021-01-01T02:26:41", "rev": 2}, "vulnersScore": 7.4}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-9ef30a3636.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124521);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/21\");\n\n script_cve_id(\"CVE-2019-7577\");\n script_xref(name:\"FEDORA\", value:\"2019-9ef30a3636\");\n\n script_name(english:\"Fedora 30 : SDL (2019-9ef30a3636)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This release fixes a buffer overflow when processing RIFF/WAV files\nwith in invalid MS ADPCM predictor.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-9ef30a3636\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected SDL package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:30\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^30([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 30\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC30\", reference:\"SDL-1.2.15-38.fc30\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "124521", "cpe": ["cpe:/o:fedoraproject:fedora:30", "p-cpe:/a:fedoraproject:fedora:SDL"], "scheme": null, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}}
{"cve": [{"lastseen": "2020-12-09T21:41:57", "description": "SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.", "edition": 10, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2019-02-07T07:29:00", "title": "CVE-2019-7577", "type": "cve", "cwe": ["CWE-125"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-7577"], "modified": "2019-09-10T03:15:00", "cpe": ["cpe:/o:opensuse:leap:15.0", "cpe:/o:fedoraproject:fedora:29", "cpe:/a:libsdl:simple_directmedia_layer:1.2.15", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:opensuse:leap:42.3", "cpe:/a:libsdl:simple_directmedia_layer:2.0.9", "cpe:/o:fedoraproject:fedora:28"], "id": "CVE-2019-7577", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-7577", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:a:libsdl:simple_directmedia_layer:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:libsdl:simple_directmedia_layer:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7577"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library desig ned to provide fast access to the graphics frame buffer and audio device. ", "modified": "2019-03-29T19:35:38", "published": "2019-03-29T19:35:38", "id": "FEDORA:BDEE460C2503", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 30 Update: SDL-1.2.15-38.fc30", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library desig ned to provide fast access to the graphics frame buffer and audio device. ", "modified": "2019-02-26T03:08:51", "published": "2019-02-26T03:08:51", "id": "FEDORA:EC037608A21F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: SDL-1.2.15-36.fc29", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library desig ned to provide fast access to the graphics frame buffer and audio device. ", "modified": "2019-03-19T05:16:59", "published": "2019-03-19T05:16:59", "id": "FEDORA:19A176082DBB", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: SDL-1.2.15-37.fc29", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library desig ned to provide fast access to the graphics frame buffer and audio device. ", "modified": "2019-03-20T21:18:35", "published": "2019-03-20T21:18:35", "id": "FEDORA:BAC2A603B290", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: SDL-1.2.15-32.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library desig ned to provide fast access to the graphics frame buffer and audio device. ", "modified": "2019-03-02T01:21:33", "published": "2019-03-02T01:21:33", "id": "FEDORA:226326071258", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: SDL-1.2.15-31.fc28", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-13616", "CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library desig ned to provide fast access to the graphics frame buffer and audio device. ", "modified": "2019-09-08T03:09:31", "published": "2019-09-08T03:09:31", "id": "FEDORA:6490D6085907", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: SDL-1.2.15-40.fc29", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-13616", "CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. ", "modified": "2020-02-23T01:23:25", "published": "2020-02-23T01:23:25", "id": "FEDORA:83AED60603E6", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 31 Update: mingw-SDL-1.2.15-14.fc31", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-01T02:26:04", "description": "This release fixes a buffer overflow when processing RIFF/WAV files\nwith in invalid MS ADPCM predictor.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-03-21T00:00:00", "title": "Fedora 28 : SDL (2019-918aad6bd5)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7577"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:SDL", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2019-918AAD6BD5.NASL", "href": "https://www.tenable.com/plugins/nessus/122983", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-918aad6bd5.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122983);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/02/03\");\n\n script_cve_id(\"CVE-2019-7577\");\n script_xref(name:\"FEDORA\", value:\"2019-918aad6bd5\");\n\n script_name(english:\"Fedora 28 : SDL (2019-918aad6bd5)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This release fixes a buffer overflow when processing RIFF/WAV files\nwith in invalid MS ADPCM predictor.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-918aad6bd5\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected SDL package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"SDL-1.2.15-32.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T02:27:24", "description": "This release fixes a buffer overflow when processing RIFF/WAV files\nwith in invalid MS ADPCM predictor.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-03-19T00:00:00", "title": "Fedora 29 : SDL (2019-bf531902c8)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7577"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:29", "p-cpe:/a:fedoraproject:fedora:SDL"], "id": "FEDORA_2019-BF531902C8.NASL", "href": "https://www.tenable.com/plugins/nessus/122934", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-bf531902c8.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122934);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/02/05\");\n\n script_cve_id(\"CVE-2019-7577\");\n script_xref(name:\"FEDORA\", value:\"2019-bf531902c8\");\n\n script_name(english:\"Fedora 29 : SDL (2019-bf531902c8)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This release fixes a buffer overflow when processing RIFF/WAV files\nwith in invalid MS ADPCM predictor.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-bf531902c8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected SDL package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"SDL-1.2.15-37.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:55:52", "description": "According to the versions of the SDL package installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-05-13T00:00:00", "title": "EulerOS Virtualization 3.0.1.0 : SDL (EulerOS-SA-2019-1469)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2019-05-13T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:SDL", "cpe:/o:huawei:euleros:uvp:3.0.1.0"], "id": "EULEROS_SA-2019-1469.NASL", "href": "https://www.tenable.com/plugins/nessus/124793", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124793);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-7573\",\n \"CVE-2019-7576\",\n \"CVE-2019-7577\",\n \"CVE-2019-7578\",\n \"CVE-2019-7635\",\n \"CVE-2019-7636\",\n \"CVE-2019-7637\",\n \"CVE-2019-7638\"\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.1.0 : SDL (EulerOS-SA-2019-1469)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the SDL package installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1469\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c0943461\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected SDL packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.1.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.1.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.1.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"SDL-1.2.15-14.h1\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:55:33", "description": "According to the versions of the SDL packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-05-06T00:00:00", "title": "EulerOS 2.0 SP3 : SDL (EulerOS-SA-2019-1343)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2019-05-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:SDL", "p-cpe:/a:huawei:euleros:SDL-devel", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1343.NASL", "href": "https://www.tenable.com/plugins/nessus/124629", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(124629);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-7573\",\n \"CVE-2019-7576\",\n \"CVE-2019-7577\",\n \"CVE-2019-7578\",\n \"CVE-2019-7635\",\n \"CVE-2019-7636\",\n \"CVE-2019-7637\",\n \"CVE-2019-7638\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : SDL (EulerOS-SA-2019-1343)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the SDL packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1343\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a027c454\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected SDL packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"SDL-1.2.15-14.h1\",\n \"SDL-devel-1.2.15-14.h1\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:54:56", "description": "According to the versions of the SDL packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-04-02T00:00:00", "title": "EulerOS 2.0 SP2 : SDL (EulerOS-SA-2019-1126)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2019-04-02T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:SDL", "p-cpe:/a:huawei:euleros:SDL-devel", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1126.NASL", "href": "https://www.tenable.com/plugins/nessus/123600", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123600);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-7573\",\n \"CVE-2019-7576\",\n \"CVE-2019-7577\",\n \"CVE-2019-7578\",\n \"CVE-2019-7635\",\n \"CVE-2019-7636\",\n \"CVE-2019-7637\",\n \"CVE-2019-7638\"\n );\n\n script_name(english:\"EulerOS 2.0 SP2 : SDL (EulerOS-SA-2019-1126)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the SDL packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1126\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5684e8a6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected SDL packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(2)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP2\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"SDL-1.2.15-14.h1\",\n \"SDL-devel-1.2.15-14.h1\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"2\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:54:58", "description": "According to the versions of the SDL packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-04-02T00:00:00", "title": "EulerOS 2.0 SP5 : SDL (EulerOS-SA-2019-1151)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2019-04-02T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:SDL", "p-cpe:/a:huawei:euleros:SDL-devel", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1151.NASL", "href": "https://www.tenable.com/plugins/nessus/123625", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123625);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-7573\",\n \"CVE-2019-7576\",\n \"CVE-2019-7577\",\n \"CVE-2019-7578\",\n \"CVE-2019-7635\",\n \"CVE-2019-7636\",\n \"CVE-2019-7637\",\n \"CVE-2019-7638\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : SDL (EulerOS-SA-2019-1151)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the SDL packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef\n loop).(CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW\n in audio/SDL_wave.c.(CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x\n through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef\n loop).(CVE-2019-7573)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1151\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7ddef3c2\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected SDL packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:SDL-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"SDL-1.2.15-14.h1.eulerosv2r7\",\n \"SDL-devel-1.2.15-14.h1.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T02:57:48", "description": "The remote host is affected by the vulnerability described in GLSA-201909-07\n(Simple DirectMedia Layer: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Simple DirectMedia\n Layer. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to process a specially crafted\n audio or video, possibly resulting in execution of arbitrary code with\n the privileges of the process or a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 16, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-09-09T00:00:00", "title": "GLSA-201909-07 : Simple DirectMedia Layer: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-13626", "CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:libsdl2"], "id": "GENTOO_GLSA-201909-07.NASL", "href": "https://www.tenable.com/plugins/nessus/128596", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201909-07.\n#\n# The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(128596);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/31\");\n\n script_cve_id(\"CVE-2019-13626\", \"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7574\", \"CVE-2019-7575\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7638\");\n script_xref(name:\"GLSA\", value:\"201909-07\");\n\n script_name(english:\"GLSA-201909-07 : Simple DirectMedia Layer: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201909-07\n(Simple DirectMedia Layer: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Simple DirectMedia\n Layer. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could entice a user to process a specially crafted\n audio or video, possibly resulting in execution of arbitrary code with\n the privileges of the process or a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201909-07\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Simple DirectMedia Layer users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-libs/libsdl2-2.0.10'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:libsdl2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/09/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/09/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-libs/libsdl2\", unaffected:make_list(\"ge 2.0.10\"), vulnerable:make_list(\"lt 2.0.10\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Simple DirectMedia Layer\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T06:16:38", "description": "This update for SDL2 fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\naudio/SDL_wave.c.(bsc#1124806).\n\nCVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\naudio/SDL_wave.c (bsc#1125099).\n\nCVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124799).\n\nCVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124805).\n\nCVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\nvideo/SDL_blit_1.c. (bsc#1124827).\n\nCVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\nvideo/SDL_pixels.c (bsc#1124826).\n\nCVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\nvideo/SDL_pixels.c (bsc#1124824).\n\nCVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124803).\n\nCVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124802).\n\nCVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\nfunction in SDL_surface.c (bsc#1124825).\n\nCVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\naudio/SDL_wave.c (bsc#1124800).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-04-16T00:00:00", "title": "SUSE SLED15 / SLES15 Security Update : SDL2 (SUSE-SU-2019:0950-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:libSDL2-2_0", "p-cpe:/a:novell:suse_linux:libSDL2-devel", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:libSDL2-2_0-0-debuginfo", "p-cpe:/a:novell:suse_linux:SDL2-debugsource"], "id": "SUSE_SU-2019-0950-1.NASL", "href": "https://www.tenable.com/plugins/nessus/124083", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:0950-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124083);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/23\");\n\n script_cve_id(\"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7574\", \"CVE-2019-7575\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : SDL2 (SUSE-SU-2019:0950-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for SDL2 fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\naudio/SDL_wave.c.(bsc#1124806).\n\nCVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\naudio/SDL_wave.c (bsc#1125099).\n\nCVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124799).\n\nCVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124805).\n\nCVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\nvideo/SDL_blit_1.c. (bsc#1124827).\n\nCVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\nvideo/SDL_pixels.c (bsc#1124826).\n\nCVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\nvideo/SDL_pixels.c (bsc#1124824).\n\nCVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124803).\n\nCVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124802).\n\nCVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\nfunction in SDL_surface.c (bsc#1124825).\n\nCVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\naudio/SDL_wave.c (bsc#1124800).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124799\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124827\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1125099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7572/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7573/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7574/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7575/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7576/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7577/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7578/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7635/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7636/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7637/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7638/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20190950-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2148cf91\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t\npatch SUSE-SLE-Module-Desktop-Applications-15-2019-950=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:SDL2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libSDL2-2_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libSDL2-2_0-0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libSDL2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"SDL2-debugsource-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libSDL2-2_0-0-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libSDL2-2_0-0-debuginfo-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libSDL2-devel-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"SDL2-debugsource-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libSDL2-2_0-0-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libSDL2-2_0-0-debuginfo-2.0.8-3.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libSDL2-devel-2.0.8-3.9.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL2\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-28T21:08:04", "description": "The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by\nmultiple vulnerabilities as referenced in the ALAS2-2020-1500 advisory.\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in\n IMA_ADPCM_nibble in audio/SDL_wave.c. (CVE-2019-7572)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop). (CVE-2019-7573)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n IMA_ADPCM_decode in audio/SDL_wave.c. (CVE-2019-7574)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in\n MS_ADPCM_decode in audio/SDL_wave.c. (CVE-2019-7575)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop). (CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in\n SDL_LoadWAV_RW in audio/SDL_wave.c. (CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c. (CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c. (CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c. (CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c. (CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c. (CVE-2019-7638)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 1, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2020-10-28T00:00:00", "title": "Amazon Linux 2 : SDL (ALAS-2020-1500)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2020-10-28T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:SDL", "cpe:/o:amazon:linux:2", "p-cpe:/a:amazon:linux:SDL-debuginfo", "p-cpe:/a:amazon:linux:SDL-devel", "p-cpe:/a:amazon:linux:SDL-static"], "id": "AL2_ALAS-2020-1500.NASL", "href": "https://www.tenable.com/plugins/nessus/141985", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n# \n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2020-1500.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141985);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/10/28\");\n\n script_cve_id(\n \"CVE-2019-7572\",\n \"CVE-2019-7573\",\n \"CVE-2019-7574\",\n \"CVE-2019-7575\",\n \"CVE-2019-7576\",\n \"CVE-2019-7577\",\n \"CVE-2019-7578\",\n \"CVE-2019-7635\",\n \"CVE-2019-7636\",\n \"CVE-2019-7637\",\n \"CVE-2019-7638\"\n );\n script_xref(name:\"ALAS\", value:\"2020-1500\");\n\n script_name(english:\"Amazon Linux 2 : SDL (ALAS-2020-1500)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Amazon Linux 2 host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by\nmultiple vulnerabilities as referenced in the ALAS2-2020-1500 advisory.\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in\n IMA_ADPCM_nibble in audio/SDL_wave.c. (CVE-2019-7572)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop). (CVE-2019-7573)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n IMA_ADPCM_decode in audio/SDL_wave.c. (CVE-2019-7574)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in\n MS_ADPCM_decode in audio/SDL_wave.c. (CVE-2019-7575)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop). (CVE-2019-7576)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in\n SDL_LoadWAV_RW in audio/SDL_wave.c. (CVE-2019-7577)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n InitIMA_ADPCM in audio/SDL_wave.c. (CVE-2019-7578)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n Blit1to4 in video/SDL_blit_1.c. (CVE-2019-7635)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n SDL_GetRGB in video/SDL_pixels.c. (CVE-2019-7636)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in\n SDL_FillRect in video/SDL_surface.c. (CVE-2019-7637)\n\n - SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in\n Map1toN in video/SDL_pixels.c. (CVE-2019-7638)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/AL2/ALAS-2020-1500.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7572\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7574\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7575\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7576\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7577\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7578\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7635\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7636\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7637\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-7638\");\n script_set_attribute(attribute:\"solution\", value:\n\"Run 'yum update SDL' to update your system.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-7638\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:SDL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:SDL-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:SDL-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:SDL-static\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\npkgs = [\n {'reference':'SDL-1.2.15-17.amzn2', 'cpu':'aarch64', 'release':'AL2'},\n {'reference':'SDL-1.2.15-17.amzn2', 'cpu':'i686', 'release':'AL2'},\n {'reference':'SDL-1.2.15-17.amzn2', 'cpu':'x86_64', 'release':'AL2'},\n {'reference':'SDL-debuginfo-1.2.15-17.amzn2', 'cpu':'aarch64', 'release':'AL2'},\n {'reference':'SDL-debuginfo-1.2.15-17.amzn2', 'cpu':'i686', 'release':'AL2'},\n {'reference':'SDL-debuginfo-1.2.15-17.amzn2', 'cpu':'x86_64', 'release':'AL2'},\n {'reference':'SDL-devel-1.2.15-17.amzn2', 'cpu':'aarch64', 'release':'AL2'},\n {'reference':'SDL-devel-1.2.15-17.amzn2', 'cpu':'i686', 'release':'AL2'},\n {'reference':'SDL-devel-1.2.15-17.amzn2', 'cpu':'x86_64', 'release':'AL2'},\n {'reference':'SDL-static-1.2.15-17.amzn2', 'cpu':'aarch64', 'release':'AL2'},\n {'reference':'SDL-static-1.2.15-17.amzn2', 'cpu':'i686', 'release':'AL2'},\n {'reference':'SDL-static-1.2.15-17.amzn2', 'cpu':'x86_64', 'release':'AL2'}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n if (rpm_check(release:release, cpu:cpu, reference:reference, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL / SDL-debuginfo / SDL-devel / etc\");\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-14T06:17:47", "description": "This update for SDL fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\naudio/SDL_wave.c.(bsc#1124806).\n\nCVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\naudio/SDL_wave.c (bsc#1125099).\n\nCVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124799).\n\nCVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124805).\n\nCVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\nvideo/SDL_blit_1.c. (bsc#1124827).\n\nCVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\nvideo/SDL_pixels.c (bsc#1124826).\n\nCVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\nvideo/SDL_pixels.c (bsc#1124824).\n\nCVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124803).\n\nCVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124802).\n\nCVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\nfunction in SDL_surface.c (bsc#1124825).\n\nCVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\naudio/SDL_wave.c (bsc#1124800).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 18, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-04-09T00:00:00", "title": "SUSE SLED12 / SLES12 Security Update : SDL (SUSE-SU-2019:0899-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "modified": "2019-04-09T00:00:00", "cpe": ["cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:libSDL-1_2-0", "p-cpe:/a:novell:suse_linux:libSDL-1_2", "p-cpe:/a:novell:suse_linux:SDL-debugsource", "p-cpe:/a:novell:suse_linux:libSDL-1_2-0-debuginfo"], "id": "SUSE_SU-2019-0899-1.NASL", "href": "https://www.tenable.com/plugins/nessus/123925", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:0899-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(123925);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7574\", \"CVE-2019-7575\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : SDL (SUSE-SU-2019:0899-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for SDL fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\naudio/SDL_wave.c.(bsc#1124806).\n\nCVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\naudio/SDL_wave.c (bsc#1125099).\n\nCVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124799).\n\nCVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\naudio/SDL_wave.c (bsc#1124805).\n\nCVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\nvideo/SDL_blit_1.c. (bsc#1124827).\n\nCVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\nvideo/SDL_pixels.c (bsc#1124826).\n\nCVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\nvideo/SDL_pixels.c (bsc#1124824).\n\nCVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124803).\n\nCVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode\nin audio/SDL_wave.c (bsc#1124802).\n\nCVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\nfunction in SDL_surface.c (bsc#1124825).\n\nCVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\naudio/SDL_wave.c (bsc#1124800).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124799\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1124827\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1125099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7572/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7573/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7574/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7575/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7576/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7577/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7578/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7635/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7636/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7637/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-7638/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20190899-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?82eb6f48\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP4:zypper in -t\npatch SUSE-SLE-SDK-12-SP4-2019-899=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t\npatch SUSE-SLE-SDK-12-SP3-2019-899=1\n\nSUSE Linux Enterprise Server 12-SP4:zypper in -t patch\nSUSE-SLE-SERVER-12-SP4-2019-899=1\n\nSUSE Linux Enterprise Server 12-SP3:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2019-899=1\n\nSUSE Linux Enterprise Desktop 12-SP4:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP4-2019-899=1\n\nSUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP3-2019-899=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:SDL-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libSDL-1_2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libSDL-1_2-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libSDL-1_2-0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3/4\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP3/4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"SDL-debugsource-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libSDL-1_2-0-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libSDL-1_2-0-32bit-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libSDL-1_2-0-debuginfo-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libSDL-1_2-0-debuginfo-32bit-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"SDL-debugsource-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libSDL-1_2-0-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libSDL-1_2-0-32bit-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libSDL-1_2-0-debuginfo-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libSDL-1_2-0-debuginfo-32bit-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"SDL-debugsource-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"libSDL-1_2-0-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"libSDL-1_2-0-debuginfo-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"SDL-debugsource-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libSDL-1_2-0-1.2.15-15.11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"libSDL-1_2-0-debuginfo-1.2.15-15.11.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"SDL\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2020-01-27T18:38:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191151", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191151", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1151)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1151\");\n script_version(\"2020-01-23T11:32:58+0000\");\n script_cve_id(\"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:32:58 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:32:58 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1151)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1151\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1151\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'SDL' package(s) announced via the EulerOS-SA-2019-1151 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).(CVE-2019-7576)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.(CVE-2019-7577)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).(CVE-2019-7573)\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~14.h1.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL-devel\", rpm:\"SDL-devel~1.2.15~14.h1.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:36:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191469", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191469", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1469)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1469\");\n script_version(\"2020-01-23T11:48:18+0000\");\n script_cve_id(\"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:48:18 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:48:18 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1469)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.1\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1469\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1469\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'SDL' package(s) announced via the EulerOS-SA-2019-1469 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).(CVE-2019-7573)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).(CVE-2019-7576)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.(CVE-2019-7577)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on Huawei EulerOS Virtualization 3.0.1.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.1.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~14.h1\", rls:\"EULEROSVIRT-3.0.1.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:36:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191126", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191126", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1126)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1126\");\n script_version(\"2020-01-23T11:32:10+0000\");\n script_cve_id(\"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:32:10 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:32:10 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1126)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1126\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1126\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'SDL' package(s) announced via the EulerOS-SA-2019-1126 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).(CVE-2019-7576)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.(CVE-2019-7577)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).(CVE-2019-7573)\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~14.h1\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL-devel\", rpm:\"SDL-devel~1.2.15~14.h1\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:37:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191343", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191343", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1343)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1343\");\n script_version(\"2020-01-23T15:42:05+0000\");\n script_cve_id(\"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:42:05 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:39:58 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for SDL (EulerOS-SA-2019-1343)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1343\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1343\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'SDL' package(s) announced via the EulerOS-SA-2019-1343 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).(CVE-2019-7573)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).(CVE-2019-7576)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.(CVE-2019-7577)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.(CVE-2019-7578)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.(CVE-2019-7635)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.(CVE-2019-7636)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.(CVE-2019-7637)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.(CVE-2019-7638)\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~14.h1\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL-devel\", rpm:\"SDL-devel~1.2.15~14.h1\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-29T19:29:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "Multiple buffer overflow security issues have been found in libsdl1.2,\na library that allows low level access to a video frame buffer, audio\noutput, mouse, and keyboard.", "modified": "2020-01-29T00:00:00", "published": "2019-03-14T00:00:00", "id": "OPENVAS:1361412562310891713", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891713", "type": "openvas", "title": "Debian LTS: Security Advisory for libsdl1.2 (DLA-1713-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891713\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7574\", \"CVE-2019-7575\", \"CVE-2019-7576\",\n \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\", \"CVE-2019-7636\", \"CVE-2019-7637\",\n \"CVE-2019-7638\");\n script_name(\"Debian LTS: Security Advisory for libsdl1.2 (DLA-1713-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-03-14 00:00:00 +0100 (Thu, 14 Mar 2019)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_tag(name:\"affected\", value:\"libsdl1.2 on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n1.2.15-10+deb8u1.\n\nWe recommend that you upgrade your libsdl1.2 packages.\");\n\n script_tag(name:\"summary\", value:\"Multiple buffer overflow security issues have been found in libsdl1.2,\na library that allows low level access to a video frame buffer, audio\noutput, mouse, and keyboard.\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libsdl1.2-dbg\", ver:\"1.2.15-10+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libsdl1.2-dev\", ver:\"1.2.15-10+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libsdl1.2debian\", ver:\"1.2.15-10+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:48:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-04-18T00:00:00", "id": "OPENVAS:1361412562310852435", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852435", "type": "openvas", "title": "openSUSE: Security Advisory for SDL (openSUSE-SU-2019:1223-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852435\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7574\", \"CVE-2019-7575\",\n \"CVE-2019-7576\", \"CVE-2019-7577\", \"CVE-2019-7578\", \"CVE-2019-7635\",\n \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7638\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-04-18 02:00:58 +0000 (Thu, 18 Apr 2019)\");\n script_name(\"openSUSE: Security Advisory for SDL (openSUSE-SU-2019:1223-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:1223-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'SDL'\n package(s) announced via the openSUSE-SU-2019:1223-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for SDL fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\n audio/SDL_wave.c.(bsc#1124806).\n\n - CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\n audio/SDL_wave.c (bsc#1125099).\n\n - CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124799).\n\n - CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124805).\n\n - CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\n video/SDL_blit_1.c. (bsc#1124827).\n\n - CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\n video/SDL_pixels.c (bsc#1124826).\n\n - CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\n video/SDL_pixels.c (bsc#1124824).\n\n - CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\n in audio/SDL_wave.c (bsc#1124803).\n\n - CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in\n audio/SDL_wave.c (bsc#1124802).\n\n - CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\n function in SDL_surface.c (bsc#1124825).\n\n - CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\n audio/SDL_wave.c (bsc#1124800).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-1223=1\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL-debugsource\", rpm:\"SDL-debugsource~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libSDL-1_2-0\", rpm:\"libSDL-1_2-0~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libSDL-1_2-0-debuginfo\", rpm:\"libSDL-1_2-0-debuginfo~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libSDL-devel\", rpm:\"libSDL-devel~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libSDL-1_2-0-32bit\", rpm:\"libSDL-1_2-0-32bit~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libSDL-1_2-0-32bit-debuginfo\", rpm:\"libSDL-1_2-0-32bit-debuginfo~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libSDL-devel-32bit\", rpm:\"libSDL-devel-32bit~1.2.15~lp150.2.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2019-03-02T00:00:00", "id": "OPENVAS:1361412562310875488", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875488", "type": "openvas", "title": "Fedora Update for SDL FEDORA-2019-6092f8c0dc", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875488\");\n script_version(\"$Revision: 14223 $\");\n script_cve_id(\"CVE-2019-7577\", \"CVE-2019-7575\", \"CVE-2019-7574\", \"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7578\", \"CVE-2019-7638\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7635\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2019-03-02 04:15:15 +0100 (Sat, 02 Mar 2019)\");\n script_name(\"Fedora Update for SDL FEDORA-2019-6092f8c0dc\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n script_xref(name:\"FEDORA\", value:\"2019-6092f8c0dc\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCZFITTVE3ZPXN25ADFRGNJ5X5ASCPTY\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'SDL'\n package(s) announced via the FEDORA-2019-6092f8c0dc advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"affected\", value:\"SDL on Fedora 28.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~31.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the ", "modified": "2019-05-14T00:00:00", "published": "2019-05-07T00:00:00", "id": "OPENVAS:1361412562310875696", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875696", "type": "openvas", "title": "Fedora Update for SDL FEDORA-2019-bf531902c8", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875696\");\n script_version(\"2019-05-14T05:04:40+0000\");\n script_cve_id(\"CVE-2019-7577\", \"CVE-2019-7575\", \"CVE-2019-7574\", \"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7578\", \"CVE-2019-7638\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7635\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-14 05:04:40 +0000 (Tue, 14 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-07 02:16:46 +0000 (Tue, 07 May 2019)\");\n script_name(\"Fedora Update for SDL FEDORA-2019-bf531902c8\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-bf531902c8\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFYUCO6D5APPM7IOZ5WOCYVY4DKSXFKD\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'SDL'\n package(s) announced via the FEDORA-2019-bf531902c8 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed\nto provide fast access to the graphics frame buffer and audio device.\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~37.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the ", "modified": "2019-05-14T00:00:00", "published": "2019-05-07T00:00:00", "id": "OPENVAS:1361412562310876158", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310876158", "type": "openvas", "title": "Fedora Update for SDL FEDORA-2019-7a554204c1", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.876158\");\n script_version(\"2019-05-14T05:04:40+0000\");\n script_cve_id(\"CVE-2019-7577\", \"CVE-2019-7575\", \"CVE-2019-7574\", \"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7578\", \"CVE-2019-7638\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7635\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-05-14 05:04:40 +0000 (Tue, 14 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-07 02:37:03 +0000 (Tue, 07 May 2019)\");\n script_name(\"Fedora Update for SDL FEDORA-2019-7a554204c1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-7a554204c1\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHEXXGCOKNICFBDMNVYYDTSDLQ42K5G5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'SDL'\n package(s) announced via the FEDORA-2019-7a554204c1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed\nto provide fast access to the graphics frame buffer and audio device.\");\n\n script_tag(name:\"affected\", value:\"'SDL' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~36.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "The remote host is missing an update for the ", "modified": "2019-03-27T00:00:00", "published": "2019-03-21T00:00:00", "id": "OPENVAS:1361412562310875515", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875515", "type": "openvas", "title": "Fedora Update for SDL FEDORA-2019-918aad6bd5", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875515\");\n script_version(\"2019-03-27T07:32:46+0000\");\n script_cve_id(\"CVE-2019-7577\", \"CVE-2019-7575\", \"CVE-2019-7574\", \"CVE-2019-7572\", \"CVE-2019-7573\", \"CVE-2019-7576\", \"CVE-2019-7578\", \"CVE-2019-7638\", \"CVE-2019-7636\", \"CVE-2019-7637\", \"CVE-2019-7635\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-03-27 07:32:46 +0000 (Wed, 27 Mar 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-03-21 09:58:31 +0100 (Thu, 21 Mar 2019)\");\n script_name(\"Fedora Update for SDL FEDORA-2019-918aad6bd5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n script_xref(name:\"FEDORA\", value:\"2019-918aad6bd5\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MD6EIV2CS6QNDU3UN2RVXPQOFQNHXCP7\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'SDL'\n package(s) announced via the FEDORA-2019-918aad6bd5 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed\nto provide fast access to the graphics frame buffer and audio device.\");\n\n script_tag(name:\"affected\", value:\"SDL on Fedora 28.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if((res = isrpmvuln(pkg:\"SDL\", rpm:\"SDL~1.2.15~32.fc28\", rls:\"FC28\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n if(__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2020-09-22T18:36:40", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7638"], "description": "Arch Linux Security Advisory ASA-201908-5\n=========================================\n\nSeverity: High\nDate : 2019-08-05\nCVE-ID : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575\nCVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635\nCVE-2019-7636 CVE-2019-7638\nPackage : sdl2\nType : arbitrary code execution\nRemote : Yes\nLink : https://security.archlinux.org/AVG-891\n\nSummary\n=======\n\nThe package sdl2 before version 2.0.10-1 is vulnerable to arbitrary\ncode execution.\n\nResolution\n==========\n\nUpgrade to 2.0.10-1.\n\n# pacman -Syu \"sdl2>=2.0.10-1\"\n\nThe problems have been fixed upstream in version 2.0.10.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2019-7572 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.\n\n- CVE-2019-7573 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c\n(inside the wNumCoef loop).\n\n- CVE-2019-7574 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.\n\n- CVE-2019-7575 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.\n\n- CVE-2019-7576 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c\n(outside the wNumCoef loop).\n\n- CVE-2019-7577 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.\n\n- CVE-2019-7578 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.\n\n- CVE-2019-7635 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.\n\n- CVE-2019-7636 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.\n\n- CVE-2019-7638 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in Map1toN in video/SDL_pixels.c.\n\nImpact\n======\n\nAn attacker can execute arbitrary code on the affected host via a\ncrafted audio or video file.\n\nReferences\n==========\n\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4495\nhttps://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15-and-sdl2/25720\nhttps://hg.libsdl.org/SDL/rev/e52413f52586\nhttps://hg.libsdl.org/SDL/rev/a8afedbcaea0\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4491\nhttps://hg.libsdl.org/SDL/rev/388987dff7bf\nhttps://hg.libsdl.org/SDL/rev/f9a9d6c76b21\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4496\nhttps://hg.libsdl.org/SDL/rev/a6e3d2f5183e\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4493\nhttps://hg.libsdl.org/SDL/rev/a936f9bd3e38\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4490\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4492\nhttps://hg.libsdl.org/SDL/rev/faf9abbcfb5f\nhttps://hg.libsdl.org/SDL/rev/416136310b88\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4494\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4498\nhttps://hg.libsdl.org/SDL/rev/7c643f1c1887\nhttps://hg.libsdl.org/SDL/rev/f1f5878be5db\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4499\nhttps://hg.libsdl.org/SDL/rev/19d8c3b9c251\nhttps://hg.libsdl.org/SDL/rev/07c39cbbeacf\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4500\nhttps://security.archlinux.org/CVE-2019-7572\nhttps://security.archlinux.org/CVE-2019-7573\nhttps://security.archlinux.org/CVE-2019-7574\nhttps://security.archlinux.org/CVE-2019-7575\nhttps://security.archlinux.org/CVE-2019-7576\nhttps://security.archlinux.org/CVE-2019-7577\nhttps://security.archlinux.org/CVE-2019-7578\nhttps://security.archlinux.org/CVE-2019-7635\nhttps://security.archlinux.org/CVE-2019-7636\nhttps://security.archlinux.org/CVE-2019-7638", "modified": "2019-08-05T00:00:00", "published": "2019-08-05T00:00:00", "id": "ASA-201908-5", "href": "https://security.archlinux.org/ASA-201908-5", "type": "archlinux", "title": "[ASA-201908-5] sdl2: arbitrary code execution", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-09-22T18:36:39", "bulletinFamily": "unix", "cvelist": ["CVE-2019-13616", "CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Arch Linux Security Advisory ASA-201910-8\n=========================================\n\nSeverity: High\nDate : 2019-10-11\nCVE-ID : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575\nCVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635\nCVE-2019-7636 CVE-2019-7637 CVE-2019-7638 CVE-2019-13616\nPackage : sdl\nType : arbitrary code execution\nRemote : Yes\nLink : https://security.archlinux.org/AVG-890\n\nSummary\n=======\n\nThe package sdl before version 1.2.15-13 is vulnerable to arbitrary\ncode execution.\n\nResolution\n==========\n\nUpgrade to 1.2.15-13.\n\n# pacman -Syu \"sdl>=1.2.15-13\"\n\nThe problems have been fixed upstream but no release is available yet.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2019-7572 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.\n\n- CVE-2019-7573 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c\n(inside the wNumCoef loop).\n\n- CVE-2019-7574 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.\n\n- CVE-2019-7575 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.\n\n- CVE-2019-7576 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c\n(outside the wNumCoef loop).\n\n- CVE-2019-7577 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.\n\n- CVE-2019-7578 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.\n\n- CVE-2019-7635 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.\n\n- CVE-2019-7636 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.\n\n- CVE-2019-7637 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.\n\n- CVE-2019-7638 (arbitrary code execution)\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has\na heap-based buffer over-read in Map1toN in video/SDL_pixels.c.\n\n- CVE-2019-13616 (arbitrary code execution)\n\nA heap-based buffer overflow was discovered in SDL in the\nSDL_BlitCopy() function, that was called while copying an existing\nsurface into a new optimized one, due to lack of validation while\nloading a BMP image in the SDL_LoadBMP_RW() function. An application\nthat uses SDL to parse untrusted input files may be vulnerable to this\nflaw, which could allow an attacker to make the application crash or\npossibly execute code.\n\nImpact\n======\n\nAn attacker can execute arbitrary code on the affected host via a\ncrafted audio, image or video file.\n\nReferences\n==========\n\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4495\nhttps://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15-and-sdl2/25720\nhttps://hg.libsdl.org/SDL/rev/e52413f52586\nhttps://hg.libsdl.org/SDL/rev/a8afedbcaea0\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4491\nhttps://hg.libsdl.org/SDL/rev/388987dff7bf\nhttps://hg.libsdl.org/SDL/rev/f9a9d6c76b21\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4496\nhttps://hg.libsdl.org/SDL/rev/a6e3d2f5183e\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4493\nhttps://hg.libsdl.org/SDL/rev/a936f9bd3e38\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4490\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4492\nhttps://hg.libsdl.org/SDL/rev/faf9bbcfb5f\nhttps://hg.libsdl.org/SDL/rev/416136310b88\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4494\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4498\nhttps://hg.libsdl.org/SDL/rev/7c643f1c1887\nhttps://hg.libsdl.org/SDL/rev/f1f5878be5db\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4499\nhttps://hg.libsdl.org/SDL/rev/19d8c3b9c251\nhttps://hg.libsdl.org/SDL/rev/07c39cbbeacf\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4497\nhttps://hg.libsdl.org/SDL/rev/9b0e5c555c0f\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4500\nhttps://bugzilla.libsdl.org/show_bug.cgi?id=4538\nhttps://hg.libsdl.org/SDL/rev/ad1bbfbca760\nhttps://security.archlinux.org/CVE-2019-7572\nhttps://security.archlinux.org/CVE-2019-7573\nhttps://security.archlinux.org/CVE-2019-7574\nhttps://security.archlinux.org/CVE-2019-7575\nhttps://security.archlinux.org/CVE-2019-7576\nhttps://security.archlinux.org/CVE-2019-7577\nhttps://security.archlinux.org/CVE-2019-7578\nhttps://security.archlinux.org/CVE-2019-7635\nhttps://security.archlinux.org/CVE-2019-7636\nhttps://security.archlinux.org/CVE-2019-7637\nhttps://security.archlinux.org/CVE-2019-7638\nhttps://security.archlinux.org/CVE-2019-13616a", "modified": "2019-10-11T00:00:00", "published": "2019-10-11T00:00:00", "id": "ASA-201910-8", "href": "https://security.archlinux.org/ASA-201910-8", "type": "archlinux", "title": "[ASA-201910-8] sdl: arbitrary code execution", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2019-04-16T16:20:44", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "This update for SDL fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\n audio/SDL_wave.c.(bsc#1124806).\n - CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\n audio/SDL_wave.c (bsc#1125099).\n - CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124799).\n - CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124805).\n - CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\n video/SDL_blit_1.c. (bsc#1124827).\n - CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\n video/SDL_pixels.c (bsc#1124826).\n - CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\n video/SDL_pixels.c (bsc#1124824).\n - CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\n in audio/SDL_wave.c (bsc#1124803).\n - CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in\n audio/SDL_wave.c (bsc#1124802).\n - CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\n function in SDL_surface.c (bsc#1124825).\n - CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\n audio/SDL_wave.c (bsc#1124800).\n\n This update was imported from the SUSE:SLE-12:Update update project.\n\n", "edition": 1, "modified": "2019-04-16T15:11:27", "published": "2019-04-16T15:11:27", "id": "OPENSUSE-SU-2019:1213-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00063.html", "title": "Security update for SDL (moderate)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-04-18T00:30:02", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "This update for SDL fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\n audio/SDL_wave.c.(bsc#1124806).\n - CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\n audio/SDL_wave.c (bsc#1125099).\n - CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124799).\n - CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124805).\n - CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\n video/SDL_blit_1.c. (bsc#1124827).\n - CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\n video/SDL_pixels.c (bsc#1124826).\n - CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\n video/SDL_pixels.c (bsc#1124824).\n - CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\n in audio/SDL_wave.c (bsc#1124803).\n - CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in\n audio/SDL_wave.c (bsc#1124802).\n - CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\n function in SDL_surface.c (bsc#1124825).\n - CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\n audio/SDL_wave.c (bsc#1124800).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-04-17T21:24:18", "published": "2019-04-17T21:24:18", "id": "OPENSUSE-SU-2019:1223-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00073.html", "title": "Security update for SDL (moderate)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-04-23T22:20:31", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "This update for SDL2 fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2019-7572: Fixed a buffer over-read in IMA_ADPCM_nibble in\n audio/SDL_wave.c.(bsc#1124806).\n - CVE-2019-7578: Fixed a heap-based buffer over-read in InitIMA_ADPCM in\n audio/SDL_wave.c (bsc#1125099).\n - CVE-2019-7576: Fixed heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124799).\n - CVE-2019-7573: Fixed a heap-based buffer over-read in InitMS_ADPCM in\n audio/SDL_wave.c (bsc#1124805).\n - CVE-2019-7635: Fixed a heap-based buffer over-read in Blit1to4 in\n video/SDL_blit_1.c. (bsc#1124827).\n - CVE-2019-7636: Fixed a heap-based buffer over-read in SDL_GetRGB in\n video/SDL_pixels.c (bsc#1124826).\n - CVE-2019-7638: Fixed a heap-based buffer over-read in Map1toN in\n video/SDL_pixels.c (bsc#1124824).\n - CVE-2019-7574: Fixed a heap-based buffer over-read in IMA_ADPCM_decode\n in audio/SDL_wave.c (bsc#1124803).\n - CVE-2019-7575: Fixed a heap-based buffer overflow in MS_ADPCM_decode in\n audio/SDL_wave.c (bsc#1124802).\n - CVE-2019-7637: Fixed a heap-based buffer overflow in SDL_FillRect\n function in SDL_surface.c (bsc#1124825).\n - CVE-2019-7577: Fixed a buffer over read in SDL_LoadWAV_RW in\n audio/SDL_wave.c (bsc#1124800).\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-04-23T21:13:16", "published": "2019-04-23T21:13:16", "id": "OPENSUSE-SU-2019:1261-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00088.html", "title": "Security update for SDL2 (moderate)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2019-09-08T21:38:15", "bulletinFamily": "unix", "cvelist": ["CVE-2019-13626", "CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "### Background\n\nSimple DirectMedia Layer is a cross-platform development library designed to provide low level access to audio, keyboard, mouse, joystick, and graphics hardware via OpenGL and Direct3D. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Simple DirectMedia Layer. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could entice a user to process a specially crafted audio or video, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Simple DirectMedia Layer users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-libs/libsdl2-2.0.10\"", "edition": 1, "modified": "2019-09-08T00:00:00", "published": "2019-09-08T00:00:00", "id": "GLSA-201909-07", "href": "https://security.gentoo.org/glsa/201909-07", "title": "Simple DirectMedia Layer: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:44:41", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-13616", "CVE-2019-7576", "CVE-2019-7577"], "description": "USN-4156-1 fixed several vulnerabilities in SDL. This update provides \nthe corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.\n\nOriginal advisory details:\n\nIt was discovered that SDL incorrectly handled certain images. If a user \nwere tricked into opening a crafted image file, a remote attacker could \nuse this issue to cause SDL to crash, resulting in a denial of service, or \npossibly execute arbitary code.", "edition": 2, "modified": "2019-10-16T00:00:00", "published": "2019-10-16T00:00:00", "id": "USN-4156-2", "href": "https://ubuntu.com/security/notices/USN-4156-2", "title": "SDL vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:35:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-13616", "CVE-2019-7576", "CVE-2019-7577"], "description": "It was discovered that SDL incorrectly handled certain images. If a user \nwere tricked into opening a crafted image file, a remote attacker could \nuse this issue to cause SDL to crash, resulting in a denial of service, or \npossibly execute arbitrary code.", "edition": 2, "modified": "2019-10-15T00:00:00", "published": "2019-10-15T00:00:00", "id": "USN-4156-1", "href": "https://ubuntu.com/security/notices/USN-4156-1", "title": "SDL vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2020-11-04T02:30:33", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.\n\nSecurity Fix(es):\n\n* SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572)\n\n* SDL: heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575)\n\n* SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636)\n\n* SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637)\n\n* SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638)\n\n* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573)\n\n* SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574)\n\n* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576)\n\n* SDL: buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577)\n\n* SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578)\n\n* SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.", "modified": "2020-11-04T05:02:34", "published": "2020-11-03T17:21:34", "id": "RHSA-2020:4627", "href": "https://access.redhat.com/errata/RHSA-2020:4627", "type": "redhat", "title": "(RHSA-2020:4627) Moderate: SDL security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-07T18:04:51", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7572", "CVE-2019-7573", "CVE-2019-7574", "CVE-2019-7575", "CVE-2019-7576", "CVE-2019-7577", "CVE-2019-7578", "CVE-2019-7635", "CVE-2019-7636", "CVE-2019-7637", "CVE-2019-7638"], "description": "Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.\n\nSecurity Fix(es):\n\n* SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572)\n\n* SDL: heap-based buffer overflow in function MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575)\n\n* SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636)\n\n* SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637)\n\n* SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638)\n\n* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573)\n\n* SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574)\n\n* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576)\n\n* SDL: buffer over-read in function SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577)\n\n* SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578)\n\n* SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.", "modified": "2020-09-29T13:42:03", "published": "2020-09-29T11:39:03", "id": "RHSA-2020:3868", "href": "https://access.redhat.com/errata/RHSA-2020:3868", "type": "redhat", "title": "(RHSA-2020:3868) Moderate: SDL security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2020-10-07T06:55:12", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "[1.2.15-17]\n- Fix Some CVEs: CVE-2019-7572, CVE-2019-7573, CVE-2019-7574,\n CVE-2019-7575, CVE-2019-7576, CVE-2019-7577, CVE-2019-7578,\n CVE-2019-7635, CVE-2019-7636, CVE-2019-7637, CVE-2019-7638\n- Resolves: rhbz#1716201, rhbz#1716202, rhbz#1716206,\n- Resolves: rhbz#1716207, rhbz#1716208", "edition": 1, "modified": "2020-10-06T00:00:00", "published": "2020-10-06T00:00:00", "id": "ELSA-2020-3868", "href": "http://linux.oracle.com/errata/ELSA-2020-3868.html", "title": "SDL security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-12T03:31:27", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "[1.2.15-38]\n- fix CVEs\n- Resolves: rhbz#1716209, rhbz#1716210, rhbz#1716211, rhbz#1716212,\n rhbz#1716213, rhbz#1716214, rhbz#1716215, rhbz#1716216,\n\t rhbz#1716217, rhbz#1716218, rhbz#1716219", "edition": 1, "modified": "2020-11-10T00:00:00", "published": "2020-11-10T00:00:00", "id": "ELSA-2020-4627", "href": "http://linux.oracle.com/errata/ELSA-2020-4627.html", "title": "SDL security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2020-10-20T23:09:07", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "**CentOS Errata and Security Advisory** CESA-2020:3868\n\n\nSimple DirectMedia Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device.\n\nSecurity Fix(es):\n\n* SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572)\n\n* SDL: heap-based buffer overflow in function MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575)\n\n* SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636)\n\n* SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637)\n\n* SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638)\n\n* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573)\n\n* SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574)\n\n* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576)\n\n* SDL: buffer over-read in function SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577)\n\n* SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578)\n\n* SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2020-October/012834.html\n\n**Affected packages:**\nSDL\nSDL-devel\nSDL-static\n\n**Upstream details at:**\n", "edition": 1, "modified": "2020-10-20T18:56:35", "published": "2020-10-20T18:56:35", "id": "CESA-2020:3868", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2020-October/012834.html", "title": "SDL security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-10-11T01:23:32", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "Package : libsdl2\nVersion : 2.0.2+dfsg1-6+deb8u2\nCVE ID : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575\n CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635\n CVE-2019-7636 CVE-2019-7637 CVE-2019-7638\n\nThe update of libsdl2 released as DLA 1714-1 led to several regressions, as\nreported by Avital Ostromich. These regressions are caused by libsdl1.2\npatches for CVE-2019-7637, CVE-2019-7635, CVE-2019-7638 and CVE-2019-7636 being\napplied to libsdl2 without adaptations.\n\nFor Debian 8 "Jessie", this problem has been fixed in version\n2.0.2+dfsg1-6+deb8u2.\n\nWe recommend that you upgrade your libsdl2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 11, "modified": "2019-10-17T09:46:25", "published": "2019-10-17T09:46:25", "id": "DEBIAN:DLA-1714-2:98CFC", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201910/msg00021.html", "title": "[SECURITY] [DLA 1714-2] libsdl2 regression update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-10-11T01:23:31", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "Package : libsdl2\nVersion : 2.0.2+dfsg1-6+deb8u1\nCVE ID : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575\n CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635\n CVE-2019-7636 CVE-2019-7637 CVE-2019-7638\n\n\nMultiple buffer overflow security issues have been found in libsdl2,\na library that allows low level access to a video frame buffer, audio\noutput, mouse, and keyboard.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n2.0.2+dfsg1-6+deb8u1.\n\nWe recommend that you upgrade your libsdl2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 13, "modified": "2019-03-13T16:56:09", "published": "2019-03-13T16:56:09", "id": "DEBIAN:DLA-1714-1:580CA", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201903/msg00016.html", "title": "[SECURITY] [DLA 1714-1] libsdl2 security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T01:03:56", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "Package : libsdl1.2\nVersion : 1.2.15-10+deb8u1\nCVE ID : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575\n CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635\n CVE-2019-7636 CVE-2019-7637 CVE-2019-7638\n\nMultiple buffer overflow security issues have been found in libsdl1.2,\na library that allows low level access to a video frame buffer, audio\noutput, mouse, and keyboard.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n1.2.15-10+deb8u1.\n\nWe recommend that you upgrade your libsdl1.2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 10, "modified": "2019-03-13T16:53:21", "published": "2019-03-13T16:53:21", "id": "DEBIAN:DLA-1713-1:F4DFB", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201903/msg00015.html", "title": "[SECURITY] [DLA 1713-1] libsdl1.2 security update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T00:51:12", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "Package : libsdl1.2\nVersion : 1.2.15-10+deb8u2\nCVE ID : CVE-2019-7572 CVE-2019-7573 CVE-2019-7574 CVE-2019-7575\n CVE-2019-7576 CVE-2019-7577 CVE-2019-7578 CVE-2019-7635\n CVE-2019-7636 CVE-2019-7637 CVE-2019-7638\n\nThe update of libsdl1.2 released as DLA 1713-1 led to a regression, caused\nby an incomplete fix for CVE-2019-7637. This issue was known upstream and\nresulted, among others, in windows versions from libsdl1.2 failing to set\nvideo mode.\n\nFor Debian 8 "Jessie", this problem has been fixed in version\n1.2.15-10+deb8u2.\n\nWe recommend that you upgrade your libsdl1.2 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 7, "modified": "2019-10-17T09:45:52", "published": "2019-10-17T09:45:52", "id": "DEBIAN:DLA-1713-2:CAA4F", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201910/msg00020.html", "title": "[SECURITY] [DLA 1713-2] libsdl1.2 regression update", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "amazon": [{"lastseen": "2020-11-10T12:37:24", "bulletinFamily": "unix", "cvelist": ["CVE-2019-7636", "CVE-2019-7574", "CVE-2019-7572", "CVE-2019-7575", "CVE-2019-7578", "CVE-2019-7573", "CVE-2019-7635", "CVE-2019-7637", "CVE-2019-7638", "CVE-2019-7576", "CVE-2019-7577"], "description": "**Issue Overview:**\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c. ([CVE-2019-7572 __](<https://access.redhat.com/security/cve/CVE-2019-7572>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop). ([CVE-2019-7573 __](<https://access.redhat.com/security/cve/CVE-2019-7573>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c. ([CVE-2019-7574 __](<https://access.redhat.com/security/cve/CVE-2019-7574>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c. ([CVE-2019-7575 __](<https://access.redhat.com/security/cve/CVE-2019-7575>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop). ([CVE-2019-7576 __](<https://access.redhat.com/security/cve/CVE-2019-7576>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c. ([CVE-2019-7577 __](<https://access.redhat.com/security/cve/CVE-2019-7577>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c. ([CVE-2019-7578 __](<https://access.redhat.com/security/cve/CVE-2019-7578>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c. ([CVE-2019-7635 __](<https://access.redhat.com/security/cve/CVE-2019-7635>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c. ([CVE-2019-7636 __](<https://access.redhat.com/security/cve/CVE-2019-7636>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c. ([CVE-2019-7637 __](<https://access.redhat.com/security/cve/CVE-2019-7637>))\n\nSDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c. ([CVE-2019-7638 __](<https://access.redhat.com/security/cve/CVE-2019-7638>))\n\n \n**Affected Packages:** \n\n\nSDL\n\n \n**Issue Correction:** \nRun _yum update SDL_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n SDL-1.2.15-17.amzn2.aarch64 \n SDL-devel-1.2.15-17.amzn2.aarch64 \n SDL-static-1.2.15-17.amzn2.aarch64 \n SDL-debuginfo-1.2.15-17.amzn2.aarch64 \n \n i686: \n SDL-1.2.15-17.amzn2.i686 \n SDL-devel-1.2.15-17.amzn2.i686 \n SDL-static-1.2.15-17.amzn2.i686 \n SDL-debuginfo-1.2.15-17.amzn2.i686 \n \n src: \n SDL-1.2.15-17.amzn2.src \n \n x86_64: \n SDL-1.2.15-17.amzn2.x86_64 \n SDL-devel-1.2.15-17.amzn2.x86_64 \n SDL-static-1.2.15-17.amzn2.x86_64 \n SDL-debuginfo-1.2.15-17.amzn2.x86_64 \n \n \n", "edition": 1, "modified": "2020-10-22T17:17:00", "published": "2020-10-22T17:17:00", "id": "ALAS2-2020-1500", "href": "https://alas.aws.amazon.com/AL2/ALAS-2020-1500.html", "title": "Medium: SDL", "type": "amazon", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}