NetApp Clustered Data ONTAP 8.x < 8.3.2P12 (NTAP-20170831-0002)

2017-10-18T00:00:00
ID NETAPP_ONTAP_NTAP-20170831-0002.NASL
Type nessus
Reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2021-05-02T00:00:00

Description

The version of NetApp Clustered Data ONTAP running on the remote host is 8.3.x prior to 8.3.2P12. It is, therefore, affected by unspecified flaws in Storage Virtual Machines (SVMs) that allow an authenticated remote attacker to gain access to potentially sensitive information and execute arbitrary code on the storage controller.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(103926);
  script_version("1.4");
  script_cvs_date("Date: 2019/11/12");

  script_cve_id("CVE-2017-12421", "CVE-2017-12423");

  script_name(english:"NetApp Clustered Data ONTAP 8.x < 8.3.2P12 (NTAP-20170831-0002)");
  script_summary(english:"Checks the version of ONTAP.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a heap overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of NetApp Clustered Data ONTAP running on the remote
host is 8.3.x prior to 8.3.2P12. It is, therefore, affected by
unspecified flaws in Storage Virtual Machines (SVMs) that allow an
authenticated remote attacker to gain access to potentially sensitive
information and execute arbitrary code on the storage controller.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  # https://kb.netapp.com/support/s/article/NTAP-20170831-0002?language=en_US
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?64357134");
  script_set_attribute(attribute:"solution", value:
"Upgrade to NetApp Clustered Data ONTAP version 8.3.2P12 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-12421");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/09/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/09/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:netapp:data_ontap");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("netapp_ontap_detect.nbin");
  script_require_keys("Host/NetApp/ONTAP/display_version", "Host/NetApp/ONTAP/version", "Host/NetApp/ONTAP/mode", "Host/NetApp/ONTAP/cluster");

  exit(0);
}

include("vcf.inc");

app_name = "NetApp ONTAP";

cluster = get_kb_item_or_exit("Host/NetApp/ONTAP/cluster");

# Not vulnerable if not running in Clustered mode
if (!cluster)
  audit(AUDIT_OS_CONF_NOT_VULN, app_name);

app_info = vcf::get_app_info(app:app_name, kb_ver:"Host/NetApp/ONTAP/display_version");

vcf::check_granularity(app_info:app_info, sig_segments:2);

constraints = [
  { "min_version" : "8.3",  "fixed_version" : "8.3.2P12" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);