Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OPENSUSE-2014-781.NASL
HistoryDec 16, 2014 - 12:00 a.m.

openSUSE Security Update : jasper (openSUSE-SU-2014:1644-1)

2014-12-1600:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
16

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.425 Medium

EPSS

Percentile

97.4%

jasper was updated to fix one security issue.

This security issue was fixed :

  • Heap overflows in libjasper (CVE-2014-9029).
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2014-781.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(80053);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2014-9029");

  script_name(english:"openSUSE Security Update : jasper (openSUSE-SU-2014:1644-1)");
  script_summary(english:"Check for the openSUSE-2014-781 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"jasper was updated to fix one security issue.

This security issue was fixed :

  - Heap overflows in libjasper (CVE-2014-9029)."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=906364"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://lists.opensuse.org/opensuse-updates/2014-12/msg00062.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected jasper packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:jasper");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:jasper-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:jasper-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjasper-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjasper1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjasper1-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjasper1-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjasper1-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");

  script_set_attribute(attribute:"patch_publication_date", value:"2014/12/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/16");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE12\.3|SUSE13\.1|SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.3 / 13.1 / 13.2", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE12.3", reference:"jasper-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"jasper-debuginfo-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"jasper-debugsource-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"libjasper-devel-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"libjasper1-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", reference:"libjasper1-debuginfo-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", cpu:"x86_64", reference:"libjasper1-32bit-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE12.3", cpu:"x86_64", reference:"libjasper1-debuginfo-32bit-1.900.1-156.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"jasper-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"jasper-debuginfo-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"jasper-debugsource-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libjasper-devel-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libjasper1-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", reference:"libjasper1-debuginfo-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libjasper1-32bit-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.1", cpu:"x86_64", reference:"libjasper1-debuginfo-32bit-1.900.1-160.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"jasper-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"jasper-debuginfo-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"jasper-debugsource-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"libjasper-devel-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"libjasper1-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", reference:"libjasper1-debuginfo-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", cpu:"x86_64", reference:"libjasper1-32bit-1.900.1-163.5.1") ) flag++;
if ( rpm_check(release:"SUSE13.2", cpu:"x86_64", reference:"libjasper1-debuginfo-32bit-1.900.1-163.5.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jasper / jasper-debuginfo / jasper-debugsource / libjasper-devel / etc");
}
VendorProductVersionCPE
novellopensusejasperp-cpe:/a:novell:opensuse:jasper
novellopensusejasper-debuginfop-cpe:/a:novell:opensuse:jasper-debuginfo
novellopensusejasper-debugsourcep-cpe:/a:novell:opensuse:jasper-debugsource
novellopensuselibjasper-develp-cpe:/a:novell:opensuse:libjasper-devel
novellopensuselibjasper1p-cpe:/a:novell:opensuse:libjasper1
novellopensuselibjasper1-32bitp-cpe:/a:novell:opensuse:libjasper1-32bit
novellopensuselibjasper1-debuginfop-cpe:/a:novell:opensuse:libjasper1-debuginfo
novellopensuselibjasper1-debuginfo-32bitp-cpe:/a:novell:opensuse:libjasper1-debuginfo-32bit
novellopensuse12.3cpe:/o:novell:opensuse:12.3
novellopensuse13.1cpe:/o:novell:opensuse:13.1
Rows per page:
1-10 of 111

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.425 Medium

EPSS

Percentile

97.4%