Fedora 30 : sqliteodbc security updat
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
Cvelist | CVE-2020-12050 | 30 Apr 202016:09 | – | cvelist |
Fedora | [SECURITY] Fedora 31 Update: sqliteodbc-0.9996-6.fc31 | 30 Apr 202003:44 | – | fedora |
Fedora | [SECURITY] Fedora 30 Update: sqliteodbc-0.9996-4.fc30 | 30 Apr 202002:52 | – | fedora |
Fedora | [SECURITY] Fedora 32 Update: sqliteodbc-0.9996-6.fc32 | 1 May 202004:07 | – | fedora |
UbuntuCve | CVE-2020-12050 | 30 Apr 202000:00 | – | ubuntucve |
Tenable Nessus | openSUSE Security Update : sqliteodbc (openSUSE-2020-628) | 11 May 202000:00 | – | nessus |
Tenable Nessus | Fedora 31 : sqliteodbc (2020-c98c7da2f6) | 30 Apr 202000:00 | – | nessus |
CVE | CVE-2020-12050 | 30 Apr 202017:15 | – | cve |
Debian CVE | CVE-2020-12050 | 30 Apr 202017:15 | – | debiancve |
OpenVAS | Fedora: Security Advisory for sqliteodbc (FEDORA-2020-c98c7da2f6) | 2 May 202000:00 | – | openvas |
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2020-1e85425a52.
#
include("compat.inc");
if (description)
{
script_id(136151);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/11");
script_cve_id("CVE-2020-12050");
script_xref(name:"FEDORA", value:"2020-1e85425a52");
script_name(english:"Fedora 30 : sqliteodbc (2020-1e85425a52)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Fix CVE-2020-12050 (use mktemp(1) for temp. file name creation)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2020-1e85425a52"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected sqliteodbc package."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-12050");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:sqliteodbc");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:30");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/30");
script_set_attribute(attribute:"patch_publication_date", value:"2020/04/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/30");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^30([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 30", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC30", reference:"sqliteodbc-0.9996-4.fc30")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "sqliteodbc");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo