GLSA-200711-27 : Link Grammar: User-assisted execution of arbitrary code

2007-11-20T00:00:00
ID GENTOO_GLSA-200711-27.NASL
Type nessus
Reporter Tenable
Modified 2018-08-10T00:00:00

Description

The remote host is affected by the vulnerability described in GLSA-200711-27 (Link Grammar: User-assisted execution of arbitrary code)

Alin Rad Pop from Secunia Research discovered a boundary error in the     function separate_sentence() in file tokenize.c when processing an     overly long word which might lead to a stack-based buffer overflow.

Impact :

A remote attacker could entice a user to parse a specially crafted     sentence, resulting in the remote execution of arbitrary code with the     privileges of the user running the application. Note that this     vulnerability may be triggered by an application using Link Grammar to     parse sentences (e.g. AbiWord).

Workaround :

There is no known workaround at this time.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200711-27.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include("compat.inc");

if (description)
{
  script_id(28266);
  script_version("1.13");
  script_cvs_date("Date: 2018/08/10 18:07:07");

  script_cve_id("CVE-2007-5395");
  script_xref(name:"GLSA", value:"200711-27");

  script_name(english:"GLSA-200711-27 : Link Grammar: User-assisted execution of arbitrary code");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200711-27
(Link Grammar: User-assisted execution of arbitrary code)

    Alin Rad Pop from Secunia Research discovered a boundary error in the
    function separate_sentence() in file tokenize.c when processing an
    overly long word which might lead to a stack-based buffer overflow.
  
Impact :

    A remote attacker could entice a user to parse a specially crafted
    sentence, resulting in the remote execution of arbitrary code with the
    privileges of the user running the application. Note that this
    vulnerability may be triggered by an application using Link Grammar to
    parse sentences (e.g. AbiWord).
  
Workaround :

    There is no known workaround at this time."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200711-27"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Link Grammar users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=dev-libs/link-grammar-4.2.4-r1'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_cwe_id(119);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:link-grammar");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2007/11/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/20");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"dev-libs/link-grammar", unaffected:make_list("ge 4.2.4-r1"), vulnerable:make_list("lt 4.2.4-r1"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Link Grammar");
}