Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.OPENSUSE-2020-1139.NASL
HistoryAug 04, 2020 - 12:00 a.m.

openSUSE Security Update : claws-mail (openSUSE-2020-1139)

2020-08-0400:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.9%

This update for claws-mail fixes the following issues :

  • Update to 3.17.6 :

  • It is now possible to ‘Inherit Folder properties and processing rules from parent folder’ when creating new folders with the move message and copy message dialogues.

  • A Phishing warning is now shown when copying a phishing URL, (in addition to clicking a phishing URL).

  • The progress window when importing an mbox file is now more responsive.

  • A warning dialogue is shown if the selected privacy system is ‘None’ and automatic signing amd/or encrypting is enabled.

  • Python plugin: pkgconfig is now used to check for python2. This enables the Python plugin (which uses python2) to be built on newer systems which have both python2 and python3.

  • CVE-2020-15917: Fixed an improper handling of suffix data after STARTTLS is mishandled (boo#1174457).

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2020-1139.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('compat.inc');

if (description)
{
  script_id(139303);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/27");

  script_cve_id("CVE-2020-15917");

  script_name(english:"openSUSE Security Update : claws-mail (openSUSE-2020-1139)");

  script_set_attribute(attribute:"synopsis", value:
"The remote openSUSE host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"This update for claws-mail fixes the following issues :

  - Update to 3.17.6 :

  - It is now possible to 'Inherit Folder properties and
    processing rules from parent folder' when creating new
    folders with the move message and copy message
    dialogues.

  - A Phishing warning is now shown when copying a phishing
    URL, (in addition to clicking a phishing URL).

  - The progress window when importing an mbox file is now
    more responsive.

  - A warning dialogue is shown if the selected privacy
    system is 'None' and automatic signing amd/or encrypting
    is enabled.

  - Python plugin: pkgconfig is now used to check for
    python2. This enables the Python plugin (which uses
    python2) to be built on newer systems which have both
    python2 and python3.

  - CVE-2020-15917: Fixed an improper handling of suffix
    data after STARTTLS is mishandled (boo#1174457).");
  script_set_attribute(attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1174457");
  script_set_attribute(attribute:"solution", value:
"Update the affected claws-mail packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-15917");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/07/23");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/08/03");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/08/04");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:claws-mail");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:claws-mail-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:claws-mail-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:claws-mail-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:claws-mail-lang");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.2");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"SuSE Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE15\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.2", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE15.2", reference:"claws-mail-3.17.6-lp152.3.3.1") ) flag++;
if ( rpm_check(release:"SUSE15.2", reference:"claws-mail-debuginfo-3.17.6-lp152.3.3.1") ) flag++;
if ( rpm_check(release:"SUSE15.2", reference:"claws-mail-debugsource-3.17.6-lp152.3.3.1") ) flag++;
if ( rpm_check(release:"SUSE15.2", reference:"claws-mail-devel-3.17.6-lp152.3.3.1") ) flag++;
if ( rpm_check(release:"SUSE15.2", reference:"claws-mail-lang-3.17.6-lp152.3.3.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "claws-mail / claws-mail-debuginfo / claws-mail-debugsource / etc");
}
VendorProductVersionCPE
novellopensuseclaws-mailp-cpe:/a:novell:opensuse:claws-mail
novellopensuseclaws-mail-debuginfop-cpe:/a:novell:opensuse:claws-mail-debuginfo
novellopensuseclaws-mail-debugsourcep-cpe:/a:novell:opensuse:claws-mail-debugsource
novellopensuseclaws-mail-develp-cpe:/a:novell:opensuse:claws-mail-devel
novellopensuseclaws-mail-langp-cpe:/a:novell:opensuse:claws-mail-lang
novellopensuse15.2cpe:/o:novell:opensuse:15.2

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.9%