Lucene search

K

Fedora 30 : teeworlds (2019-d29e04fa11)

The remote Fedora host is missing a security update for teeworlds package, version 0.7.3.1-2.fc30. Update the affected package

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Fedora Update for teeworlds FEDORA-2019-d29e04fa11
8 May 201900:00
openvas
OpenVAS
openSUSE: Security Advisory for teeworlds (openSUSE-SU-2019:1793-1)
9 Jan 202000:00
openvas
Fedora
[SECURITY] Fedora 30 Update: teeworlds-0.7.3.1-2.fc30
7 May 201916:47
fedora
Tenable Nessus
openSUSE Security Update : teeworlds (openSUSE-2019-1793)
24 Jul 201900:00
nessus
SUSE Linux
Security update for teeworlds (moderate)
24 Aug 201900:00
suse
SUSE Linux
Security update for teeworlds (moderate)
23 Jul 201900:00
suse
CVE
CVE-2019-10877
5 Apr 201906:29
cve
CVE
CVE-2019-10879
5 Apr 201905:29
cve
CVE
CVE-2019-10878
5 Apr 201905:29
cve
NVD
CVE-2019-10877
5 Apr 201906:29
nvd
Rows per page
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory FEDORA-2019-d29e04fa11.
#

include("compat.inc");

if (description)
{
  script_id(124687);
  script_version("1.3");
  script_cvs_date("Date: 2020/01/21");

  script_cve_id("CVE-2019-10877", "CVE-2019-10878", "CVE-2019-10879");
  script_xref(name:"FEDORA", value:"2019-d29e04fa11");

  script_name(english:"Fedora 30 : teeworlds (2019-d29e04fa11)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Restore s390x builds.

----

0.7.3.1

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-d29e04fa11"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected teeworlds package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:teeworlds");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:30");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/05/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/08");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^30([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 30", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);


flag = 0;
if (rpm_check(release:"FC30", reference:"teeworlds-0.7.3.1-2.fc30")) flag++;


if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_HOLE,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "teeworlds");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
08 May 2019 00:00Current
1.0Low risk
Vulners AI Score1.0
EPSS0.055
18
.json
Report