The version of AOS installed on the remote host is prior to 6.7.1. It is, therefore, affected by multiple vulnerabilities as referenced in the NXSA-AOS-6.7.1 advisory.
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. (CVE-2023-38408)
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. (CVE-2023-24329)
Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. (CVE-2022-25147)
Every named
instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the max-cache-size
statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in named
can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size
limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
(CVE-2023-2828)
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability.
In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed. (CVE-2022-48339)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(187068);
script_version("1.0");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/19");
script_cve_id(
"CVE-2022-25147",
"CVE-2022-48339",
"CVE-2023-2828",
"CVE-2023-24329",
"CVE-2023-38408"
);
script_name(english:"Nutanix AOS : Multiple Vulnerabilities (NXSA-AOS-6.7.1)");
script_set_attribute(attribute:"synopsis", value:
"The Nutanix AOS host is affected by multiple vulnerabilities .");
script_set_attribute(attribute:"description", value:
"The version of AOS installed on the remote host is prior to 6.7.1. It is, therefore, affected by multiple
vulnerabilities as referenced in the NXSA-AOS-6.7.1 advisory.
- The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path,
leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in
/usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an
incomplete fix for CVE-2016-10009. (CVE-2023-38408)
- An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting
methods by supplying a URL that starts with blank characters. (CVE-2023-24329)
- Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility
(APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable
Runtime Utility (APR-util) 1.6.1 and prior versions. (CVE-2022-25147)
- Every `named` instance configured to run as a recursive resolver maintains a cache database holding the
responses to the queries it has recently sent to authoritative servers. The size limit for that cache
database can be configured using the `max-cache-size` statement in the configuration file; it defaults to
90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the
configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets
from the cache, to keep memory use below the configured limit. It has been discovered that the
effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the
resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size`
limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0
through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
(CVE-2023-2828)
- An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability.
In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and
parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be
executed. (CVE-2022-48339)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://portal.nutanix.com/page/documents/security-advisories/release-advisories/details?id=NXSA-AOS-6.7.1
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f9025b4b");
script_set_attribute(attribute:"solution", value:
"Update the Nutanix AOS software to recommended version.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-38408");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/01/31");
script_set_attribute(attribute:"patch_publication_date", value:"2023/12/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/12/19");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:nutanix:aos");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("nutanix_collect.nasl");
script_require_keys("Host/Nutanix/Data/lts", "Host/Nutanix/Data/Service", "Host/Nutanix/Data/Version", "Host/Nutanix/Data/arch");
exit(0);
}
include('vcf.inc');
include('vcf_extras.inc');
var app_info = vcf::nutanix::get_app_info();
var constraints = [
{ 'fixed_version' : '6.7.1', 'product' : 'AOS', 'fixed_display' : 'Upgrade the AOS install to 6.7.1 or higher.', 'lts' : FALSE },
{ 'fixed_version' : '6.7.1', 'product' : 'NDFS', 'fixed_display' : 'Upgrade the AOS install to 6.7.1 or higher.', 'lts' : FALSE }
];
vcf::nutanix::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE
);