6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.1%
udisks was updated to fix a buffer overflow in mount path parsing.
If users have the possibility to create very long mount points, such as with FUSE, they could cause udisksd to crash, or even to run arbitrary code as root with specially crafted mount paths.
(bnc#865854, CVE-2014-0004)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2014-219.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(75297);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2014-0004");
script_name(english:"openSUSE Security Update : udisks (openSUSE-SU-2014:0389-1)");
script_summary(english:"Check for the openSUSE-2014-219 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"udisks was updated to fix a buffer overflow in mount path parsing.
If users have the possibility to create very long mount points, such
as with FUSE, they could cause udisksd to crash, or even to run
arbitrary code as root with specially crafted mount paths.
(bnc#865854, CVE-2014-0004)"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=865854"
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.opensuse.org/opensuse-updates/2014-03/msg00052.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected udisks packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udisks");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udisks-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udisks-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:udisks-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
script_set_attribute(attribute:"patch_publication_date", value:"2014/03/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE12\.3|SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.3 / 13.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE12.3", reference:"udisks-1.0.4-11.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"udisks-debuginfo-1.0.4-11.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"udisks-debugsource-1.0.4-11.4.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"udisks-devel-1.0.4-11.4.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udisks-1.0.4-13.4.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udisks-debuginfo-1.0.4-13.4.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udisks-debugsource-1.0.4-13.4.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"udisks-devel-1.0.4-13.4.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "udisks");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | opensuse | udisks | p-cpe:/a:novell:opensuse:udisks |
novell | opensuse | udisks-debuginfo | p-cpe:/a:novell:opensuse:udisks-debuginfo |
novell | opensuse | udisks-debugsource | p-cpe:/a:novell:opensuse:udisks-debugsource |
novell | opensuse | udisks-devel | p-cpe:/a:novell:opensuse:udisks-devel |
novell | opensuse | 12.3 | cpe:/o:novell:opensuse:12.3 |
novell | opensuse | 13.1 | cpe:/o:novell:opensuse:13.1 |