Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OPENSUSE-2014-552.NASL
HistorySep 25, 2014 - 12:00 a.m.

openSUSE Security Update : geary (openSUSE-SU-2014:1225-1)

2014-09-2500:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

49.6%

geary was updated to version 0.6.3 (bnc#896679 VUL-0: CVE-2014-5444) :

Security issue fixed :

  • Warn user of not matching TLS certificate issues when connecting (bgo#713247, CVE-2014-5444).

  • Fix wrong timestamp in composed email Date: header (bgo#714376).

  • Patch major memory leak due to GMime bindings.

  • Stabilize search sorting to prevent dropped search results.

  • Prevent Inbox from being cleared on startup w/ Dovecot, Zimbra, and more.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2014-552.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(77844);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2014-5444");
  script_bugtraq_id(70318);

  script_name(english:"openSUSE Security Update : geary (openSUSE-SU-2014:1225-1)");
  script_summary(english:"Check for the openSUSE-2014-552 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"geary was updated to version 0.6.3 (bnc#896679 VUL-0: CVE-2014-5444) :

Security issue fixed :

  + Warn user of not matching TLS certificate issues when
    connecting (bgo#713247, CVE-2014-5444).

  + Fix wrong timestamp in composed email Date: header
    (bgo#714376).

  + Patch major memory leak due to GMime bindings.

  + Stabilize search sorting to prevent dropped search
    results.

  + Prevent Inbox from being cleared on startup w/ Dovecot,
    Zimbra, and more."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=896679"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://lists.opensuse.org/opensuse-updates/2014-09/msg00035.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected geary packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:geary");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:geary-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:geary-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:geary-lang");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2014/09/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/25");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE13.1", reference:"geary-0.6.3-3.10.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"geary-debuginfo-0.6.3-3.10.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"geary-debugsource-0.6.3-3.10.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"geary-lang-0.6.3-3.10.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "geary");
}
VendorProductVersionCPE
novellopensusegearyp-cpe:/a:novell:opensuse:geary
novellopensusegeary-debuginfop-cpe:/a:novell:opensuse:geary-debuginfo
novellopensusegeary-debugsourcep-cpe:/a:novell:opensuse:geary-debugsource
novellopensusegeary-langp-cpe:/a:novell:opensuse:geary-lang
novellopensuse13.1cpe:/o:novell:opensuse:13.1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

49.6%