Lucene search

K

FreeBSD : go -- multiple vulnerabilities (a4f2416c-02a0-11ed-b817-10c37b4ac2ea)

FreeBSD multiple vulnerabilities with stack exhaustion, improper sanitization, and request smuggling in net/htt

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Oracle linux
go-toolset and golang security and bug fix update
2 Aug 202200:00
oraclelinux
Oracle linux
go-toolset:ol8 security and bug fix update
3 Aug 202200:00
oraclelinux
Oracle linux
ol8addon security update
7 Nov 202200:00
oraclelinux
Oracle linux
grafana-pcp security update
15 Nov 202200:00
oraclelinux
Oracle linux
grafana-pcp security update
22 Nov 202200:00
oraclelinux
Oracle linux
container-tools:3.0 security update
15 Nov 202200:00
oraclelinux
Oracle linux
container-tools:ol8 security, bug fix, and enhancement update
23 May 202300:00
oraclelinux
Oracle linux
container-tools:4.0 security and bug fix update
23 May 202300:00
oraclelinux
Oracle linux
grafana security, bug fix, and enhancement update
22 Nov 202200:00
oraclelinux
Oracle linux
grafana security, bug fix, and enhancement update
15 Nov 202200:00
oraclelinux
Rows per page
#
# (C) Tenable, Inc.
#
# @NOAGENT@
#
# The descriptive text and package checks in this plugin were
# extracted from the FreeBSD VuXML database :
#
# Copyright 2003-2021 Jacques Vidrine and contributors
#
# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
# HTML, PDF, PostScript, RTF and so forth) with or without modification,
# are permitted provided that the following conditions are met:
# 1. Redistributions of source code (VuXML) must retain the above
#    copyright notice, this list of conditions and the following
#    disclaimer as the first lines of this file unmodified.
# 2. Redistributions in compiled form (transformed to other DTDs,
#    published online in any format, converted to PDF, PostScript,
#    RTF and other formats) must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer
#    in the documentation and/or other materials provided with the
#    distribution.
#
# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#

include('compat.inc');

if (description)
{
  script_id(163105);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/18");

  script_cve_id(
    "CVE-2022-1705",
    "CVE-2022-1962",
    "CVE-2022-28131",
    "CVE-2022-30630",
    "CVE-2022-30631",
    "CVE-2022-30632",
    "CVE-2022-30633",
    "CVE-2022-30635",
    "CVE-2022-32148"
  );
  script_xref(name:"IAVB", value:"2022-B-0025-S");

  script_name(english:"FreeBSD : go -- multiple vulnerabilities (a4f2416c-02a0-11ed-b817-10c37b4ac2ea)");

  script_set_attribute(attribute:"synopsis", value:
"The remote FreeBSD host is missing one or more security-related updates.");
  script_set_attribute(attribute:"description", value:
"The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple
vulnerabilities as referenced in the a4f2416c-02a0-11ed-b817-10c37b4ac2ea advisory.

  - The Go project reports: net/http: improper sanitization of Transfer-Encoding             header The HTTP/1
    client accepted some invalid             Transfer-Encoding headers as indicating a chunked
    encoding. This could potentially allow for request             smuggling, but only if combined with an
    intermediate             server that also improperly failed to reject the header             as invalid.
    When httputil.ReverseProxy.ServeHTTP was called with a             Request.Header map containing a nil
    value for the             X-Forwarded-For header, ReverseProxy would set the client             IP as the
    value of the X-Forwarded-For header, contrary to             its documentation. In the more usual case
    where a Director             function set the X-Forwarded-For header value to nil,
    ReverseProxy would leave the header unmodified as             expected. compress/gzip: stack exhaustion in
    Reader.Read Calling Reader.Read on an archive containing a large             number of concatenated
    0-length compressed files can             cause a panic due to stack exhaustion. encoding/xml: stack
    exhaustion in Unmarshal Calling Unmarshal on a XML document into a Go struct             which has a
    nested field that uses the any field tag can             cause a panic due to stack exhaustion.
    encoding/xml: stack exhaustion in Decoder.Skip Calling Decoder.Skip when parsing a deeply nested XML
    document can cause a panic due to stack exhaustion. encoding/gob: stack exhaustion in Decoder.Decode
    Calling Decoder.Decode on a message which contains             deeply nested structures can cause a panic
    due to stack             exhaustion. path/filepath: stack exhaustion in Glob Calling Glob on a path which
    contains a large number of             path separators can cause a panic due to stack
    exhaustion. io/fs: stack exhaustion in Glob Calling Glob on a path which contains a large number of
    path separators can cause a panic due to stack             exhaustion. go/parser: stack exhaustion in all
    Parse* functions Calling any of the Parse functions on Go source code             which contains deeply
    nested types or declarations can             cause a panic due to stack exhaustion. (CVE-2022-1705,
    CVE-2022-1962, CVE-2022-28131, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632, CVE-2022-30633,
    CVE-2022-30635, CVE-2022-32148)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://groups.google.com/g/golang-dev/c/frczlF8OFQ0");
  # https://vuxml.freebsd.org/freebsd/a4f2416c-02a0-11ed-b817-10c37b4ac2ea.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?27a1175e");
  script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-32148");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/07/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/07/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/07/14");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:go117");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:go118");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"FreeBSD Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");

  exit(0);
}


include("freebsd_package.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);


var flag = 0;

var packages = [
    'go117<1.17.12',
    'go118<1.18.4'
];

foreach var package( packages ) {
    if (pkg_test(save_report:TRUE, pkg: package)) flag++;
}

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : pkg_report_get()
  );
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo