7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.5%
New upstream release
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2020-e59bcaf702.
#
include('compat.inc');
if (description)
{
script_id(137928);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/05");
script_cve_id(
"CVE-2017-9103",
"CVE-2017-9104",
"CVE-2017-9105",
"CVE-2017-9106",
"CVE-2017-9107",
"CVE-2017-9108",
"CVE-2017-9109"
);
script_xref(name:"FEDORA", value:"2020-e59bcaf702");
script_name(english:"Fedora 31 : adns (2020-e59bcaf702)");
script_set_attribute(attribute:"synopsis", value:
"The remote Fedora host is missing a security update.");
script_set_attribute(attribute:"description", value:
"New upstream release
- Important security fixes: CVE-2017-9103 CVE-2017-9104
CVE-2017-9105 CVE-2017-9109: 	Vulnerable
applications: all adns callers. Exploitable by: the
local recursive resolver. 	Likely worst case: Remote
code execution. CVE-2017-9106: 	Vulnerable
applications: those that make SOA queries. Exploitable
by: upstream DNS data sources. 	Likely worst case:
DoS (crash of the adns-using application) CVE-2017-9107:
	Vulnerable applications: those that use
adns_qf_quoteok_query. Exploitable by: sources of query
domain names. 	Likely worst case: DoS (crash of the
adns-using application) CVE-2017-9108: 	Vulnerable
applications: adnshost. Exploitable by: code responsible
for framing the input. Likely worst case: DoS (adnshost
crashes at EOF). All found by AFL 2.35b. Thanks to the
University of Cambridge Department of Applied
Mathematics for computing facilities.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2020-e59bcaf702");
script_set_attribute(attribute:"solution", value:
"Update the affected adns package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-9109");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/06/18");
script_set_attribute(attribute:"patch_publication_date", value:"2020/07/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/07/01");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:adns");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:31");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Fedora Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^31([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 31", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC31", reference:"adns-1.6.0-1.fc31")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "adns");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | adns | p-cpe:/a:fedoraproject:fedora:adns |
fedoraproject | fedora | 31 | cpe:/o:fedoraproject:fedora:31 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109
bodhi.fedoraproject.org/updates/FEDORA-2020-e59bcaf702
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
0.012 Low
EPSS
Percentile
85.5%