Lucene search

K
nessusThis script is Copyright (C) 2014-2021 Tenable Network Security, Inc.OPENSUSE-2013-242.NASL
HistoryJun 13, 2014 - 12:00 a.m.

openSUSE Security Update : privoxy (openSUSE-2013-242)

2014-06-1300:00:00
This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.
www.tenable.com
17

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.013

Percentile

86.0%

privoxy was updated to 3.0.21 stable fo fix CVE-2013-2503 (bnc#809123)

  • changes in 3.0.21

  • On POSIX-like platforms, network sockets with file descriptor values above FD_SETSIZE are properly rejected. Previously they could cause memory corruption in configurations that allowed the limit to be reached.

  • Proxy authentication headers are removed unless the new directive enable-proxy-authentication-forwarding is used. Forwarding the headers potentionally allows malicious sites to trick the user into providing them with login information. Reported by Chris John Riley.

  • Compiles on OS/2 again now that unistd.h is only included on platforms that have it.

  • The show-status page shows the FEATURE_STRPTIME_SANITY_CHECKS status.

  • A couple of assert()s that could theoretically dereference NULL pointers in debug builds have been relocated.

  • Added an LSB info block to the generic start script.
    Based on a patch from Natxo Asenjo.

  • The max-client-connections default has been changed to 128 which should be more than enough for most setups.

  • Block rover.ebay./ar.&adtype= instead of '/.&adtype=’ which caused too man false positives.
    Reported by u302320 in #360284, additional feedback from Adam Piggott.

  • Unblock ‘.advrider.com/’ and ‘/.*ADVrider’. Anonymously reported in #3603636.

  • Stop blocking ‘/js/slider.js’. Reported by Adam Piggott in #3606635 and _lvm in #2791160.

  • Added an iframes filter.

  • The whole GPLv2 text is included in the user manual now, so Privoxy can serve it itself and the user can read it without having to wade through GPLv3 ads first.

  • Properly numbered and underlined a couple of section titles in the config that where previously overlooked due to a flaw in the conversion script. Reported by Ralf Jungblut.

  • Improved the support instruction to hopefully make it harder to unintentionally provide insufficient information when requesting support. Previously it wasn’t obvious that the information we need in bug reports is usually also required in support requests.

  • Removed documentation about packages that haven’t been provided in years.

  • Only log the test number when not running in verbose mode The position of the test is rarely relevant and it previously

  • for full list of changes see ChangeLog file shipped together with this package

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2013-242.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(74941);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2013-2503");

  script_name(english:"openSUSE Security Update : privoxy (openSUSE-2013-242)");
  script_summary(english:"Check for the openSUSE-2013-242 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"privoxy was updated to 3.0.21 stable fo fix CVE-2013-2503 (bnc#809123)

  - changes in 3.0.21

  - On POSIX-like platforms, network sockets with file
    descriptor values above FD_SETSIZE are properly
    rejected. Previously they could cause memory corruption
    in configurations that allowed the limit to be reached.

  - Proxy authentication headers are removed unless the new
    directive enable-proxy-authentication-forwarding is
    used. Forwarding the headers potentionally allows
    malicious sites to trick the user into providing them
    with login information. Reported by Chris John Riley.

  - Compiles on OS/2 again now that unistd.h is only
    included on platforms that have it.

  - The show-status page shows the
    FEATURE_STRPTIME_SANITY_CHECKS status.

  - A couple of assert()s that could theoretically
    dereference NULL pointers in debug builds have been
    relocated.

  - Added an LSB info block to the generic start script.
    Based on a patch from Natxo Asenjo.

  - The max-client-connections default has been changed to
    128 which should be more than enough for most setups.

  - Block rover.ebay./ar.*\&adtype= instead of
    '/.*\&adtype=' which caused too man false positives.
    Reported by u302320 in #360284, additional feedback from
    Adam Piggott.

  - Unblock '.advrider.com/' and '/.*ADVrider'. Anonymously
    reported in #3603636.

  - Stop blocking '/js/slider\.js'. Reported by Adam Piggott
    in #3606635 and _lvm in #2791160.

  - Added an iframes filter.

  - The whole GPLv2 text is included in the user manual now,
    so Privoxy can serve it itself and the user can read it
    without having to wade through GPLv3 ads first.

  - Properly numbered and underlined a couple of section
    titles in the config that where previously overlooked
    due to a flaw in the conversion script. Reported by Ralf
    Jungblut.

  - Improved the support instruction to hopefully make it
    harder to unintentionally provide insufficient
    information when requesting support. Previously it
    wasn't obvious that the information we need in bug
    reports is usually also required in support requests.

  - Removed documentation about packages that haven't been
    provided in years.

  - Only log the test number when not running in verbose
    mode The position of the test is rarely relevant and it
    previously

  - for full list of changes see ChangeLog file shipped
    together with this package"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=809123"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected privoxy packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:privoxy");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:privoxy-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:privoxy-debugsource");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");

  script_set_attribute(attribute:"patch_publication_date", value:"2013/03/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE12\.1|SUSE12\.2|SUSE12\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.1 / 12.2 / 12.3", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE12.1", reference:"privoxy-3.0.21-7.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"privoxy-debuginfo-3.0.21-7.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"privoxy-debugsource-3.0.21-7.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"privoxy-3.0.21-2.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"privoxy-debuginfo-3.0.21-2.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"privoxy-debugsource-3.0.21-2.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"privoxy-3.0.21-2.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"privoxy-debuginfo-3.0.21-2.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"privoxy-debugsource-3.0.21-2.4.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "privoxy");
}

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.013

Percentile

86.0%