Lucene search

K
nessusThis script is Copyright (C) 2008-2021 Tenable Network Security, Inc.GENTOO_GLSA-200804-15.NASL
HistoryApr 17, 2008 - 12:00 a.m.

GLSA-200804-15 : libpng: Execution of arbitrary code

2008-04-1700:00:00
This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.
www.tenable.com
8

The remote host is affected by the vulnerability described in GLSA-200804-15 (libpng: Execution of arbitrary code)

Tavis Ormandy of the Google Security Team discovered that libpng does     not handle zero-length unknown chunks in PNG files correctly, which     might lead to memory corruption in applications that call     png_set_read_user_chunk_fn() or png_set_keep_unknown_chunks().

Impact :

A remote attacker could entice a user or automated system to process a     specially crafted PNG image in an application using libpng and possibly     execute arbitrary code with the privileges of the user running the     application. Note that processing of unknown chunks is disabled by     default in most PNG applications, but some such as ImageMagick are     affected.

Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200804-15.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(31962);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2008-1382");
  script_bugtraq_id(28770);
  script_xref(name:"GLSA", value:"200804-15");

  script_name(english:"GLSA-200804-15 : libpng: Execution of arbitrary code");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200804-15
(libpng: Execution of arbitrary code)

    Tavis Ormandy of the Google Security Team discovered that libpng does
    not handle zero-length unknown chunks in PNG files correctly, which
    might lead to memory corruption in applications that call
    png_set_read_user_chunk_fn() or png_set_keep_unknown_chunks().
  
Impact :

    A remote attacker could entice a user or automated system to process a
    specially crafted PNG image in an application using libpng and possibly
    execute arbitrary code with the privileges of the user running the
    application. Note that processing of unknown chunks is disabled by
    default in most PNG applications, but some such as ImageMagick are
    affected.
  
Workaround :

    There is no known workaround at this time."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200804-15"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All libpng users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=media-libs/libpng-1.2.26-r1'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(189);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:libpng");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2008/04/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/04/17");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"media-libs/libpng", unaffected:make_list("ge 1.2.26-r1"), vulnerable:make_list("lt 1.2.26-r1"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libpng");
}
VendorProductVersionCPE
gentoolinuxlibpngp-cpe:/a:gentoo:linux:libpng
gentoolinuxcpe:/o:gentoo:linux