Lucene search

K
nessusThis script is Copyright (C) 2017-2021 Tenable Network Security, Inc.OPENSUSE-2017-1298.NASL
HistoryNov 27, 2017 - 12:00 a.m.

openSUSE Security Update : file (openSUSE-2017-1298)

2017-11-2700:00:00
This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.
www.tenable.com
18

The GNU file utility was updated to version 5.22.

Security issues fixed :

  • CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650)

  • CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651)

  • CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152)

  • CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253)

  • CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253)

Version update to file version 5.22

  • add indirect relative for TIFF/Exif

  • restructure elf note printing to avoid repeated messages

  • add note limit, suggested by Alexander Cherepanov

  • Bail out on partial pread()'s (Alexander Cherepanov)

  • Fix incorrect bounds check in file_printable (Alexander Cherepanov)

  • PR/405: ignore SIGPIPE from uncompress programs

  • change printable -> file_printable and use it in more places for safety

  • in ELF, instead of ‘(uses dynamic libraries)’ when PT_INTERP is present print the interpreter name.

Version update to file version 5.21

  • there was an incorrect free in magic_load_buffers()

  • there was an out of bounds read for some pascal strings

  • there was a memory leak in magic lists

  • don’t interpret strings printed from files using the current locale, convert them to ascii format first.

  • there was an out of bounds read in elf note reads

Update to file version 5.20

  • recognize encrypted CDF documents

  • add magic_load_buffers from Brooks Davis

  • add thumbs.db support

Additional non-security bug fixes :

  • Fixed a memory corruption during rpmbuild (bsc#1063269)

  • Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511)

  • file command throws ‘Composite Document File V2 Document, corrupt: Can’t read SSAT’ error against excel 97/2003 file format. (bsc#1009966)

This update was imported from the SUSE:SLE-12:Update update project.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2017-1298.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(104764);
  script_version("3.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2014-8116", "CVE-2014-8117", "CVE-2014-9620", "CVE-2014-9621", "CVE-2014-9653");

  script_name(english:"openSUSE Security Update : file (openSUSE-2017-1298)");
  script_summary(english:"Check for the openSUSE-2017-1298 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The GNU file utility was updated to version 5.22.

Security issues fixed :

  - CVE-2014-9621: The ELF parser in file allowed remote
    attackers to cause a denial of service via a long
    string. (bsc#913650)

  - CVE-2014-9620: The ELF parser in file allowed remote
    attackers to cause a denial of service via a large
    number of notes. (bsc#913651)

  - CVE-2014-9653: readelf.c in file did not consider that
    pread calls sometimes read only a subset of the
    available data, which allows remote attackers to cause a
    denial of service (uninitialized memory access) or
    possibly have unspecified other impact via a crafted ELF
    file. (bsc#917152)

  - CVE-2014-8116: The ELF parser (readelf.c) in file
    allowed remote attackers to cause a denial of service
    (CPU consumption or crash) via a large number of (1)
    program or (2) section headers or (3) invalid
    capabilities. (bsc#910253)

  - CVE-2014-8117: softmagic.c in file did not properly
    limit recursion, which allowed remote attackers to cause
    a denial of service (CPU consumption or crash) via
    unspecified vectors. (bsc#910253)

Version update to file version 5.22

  - add indirect relative for TIFF/Exif

  - restructure elf note printing to avoid repeated messages

  - add note limit, suggested by Alexander Cherepanov

  - Bail out on partial pread()'s (Alexander Cherepanov)

  - Fix incorrect bounds check in file_printable (Alexander
    Cherepanov)

  - PR/405: ignore SIGPIPE from uncompress programs

  - change printable -> file_printable and use it in more
    places for safety

  - in ELF, instead of '(uses dynamic libraries)' when
    PT_INTERP is present print the interpreter name.

Version update to file version 5.21

  - there was an incorrect free in magic_load_buffers()

  - there was an out of bounds read for some pascal strings

  - there was a memory leak in magic lists

  - don't interpret strings printed from files using the
    current locale, convert them to ascii format first.

  - there was an out of bounds read in elf note reads

Update to file version 5.20

  - recognize encrypted CDF documents

  - add magic_load_buffers from Brooks Davis

  - add thumbs.db support

Additional non-security bug fixes :

  - Fixed a memory corruption during rpmbuild (bsc#1063269)

  - Backport of a fix for an increased printable string
    length as found in file 5.30 (bsc#996511)

  - file command throws 'Composite Document File V2
    Document, corrupt: Can't read SSAT' error against excel
    97/2003 file format. (bsc#1009966)

This update was imported from the SUSE:SLE-12:Update update project."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1009966"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1063269"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=910252"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=910253"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=913650"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=913651"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=917152"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.opensuse.org/show_bug.cgi?id=996511"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected file packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:file");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:file-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:file-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:file-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:file-magic");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmagic1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmagic1-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmagic1-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libmagic1-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-magic");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");

  script_set_attribute(attribute:"patch_publication_date", value:"2017/11/23");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/11/27");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE42\.2|SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.2 / 42.3", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE42.2", reference:"file-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"file-debuginfo-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"file-debugsource-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"file-devel-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"file-magic-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"libmagic1-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"libmagic1-debuginfo-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", reference:"python-magic-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmagic1-32bit-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.2", cpu:"x86_64", reference:"libmagic1-debuginfo-32bit-5.22-7.3.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"file-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"file-debuginfo-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"file-debugsource-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"file-devel-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"file-magic-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmagic1-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"libmagic1-debuginfo-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", reference:"python-magic-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmagic1-32bit-5.22-10.1") ) flag++;
if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libmagic1-debuginfo-32bit-5.22-10.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "file / file-debuginfo / file-debugsource / file-devel / file-magic / etc");
}
VendorProductVersionCPE
novellopensusefilep-cpe:/a:novell:opensuse:file
novellopensusefile-debuginfop-cpe:/a:novell:opensuse:file-debuginfo
novellopensusefile-debugsourcep-cpe:/a:novell:opensuse:file-debugsource
novellopensusefile-develp-cpe:/a:novell:opensuse:file-devel
novellopensusefile-magicp-cpe:/a:novell:opensuse:file-magic
novellopensuselibmagic1p-cpe:/a:novell:opensuse:libmagic1
novellopensuselibmagic1-32bitp-cpe:/a:novell:opensuse:libmagic1-32bit
novellopensuselibmagic1-debuginfop-cpe:/a:novell:opensuse:libmagic1-debuginfo
novellopensuselibmagic1-debuginfo-32bitp-cpe:/a:novell:opensuse:libmagic1-debuginfo-32bit
novellopensusepython-magicp-cpe:/a:novell:opensuse:python-magic
Rows per page:
1-10 of 121