Updated net-snmp packages with security fix available for Oracle Linux 3
Reporter | Title | Published | Views | Family All 25 |
---|---|---|---|---|
VMware | VMSA-2010-0003.1 ESX Service Console update for net-snmp | 16 Feb 201000:00 | – | vmware |
VMware | VMSA-2010-0003.1 ESX Service Console update for net-snmp | 16 Feb 201000:00 | – | vmware |
Tenable Nessus | CentOS 3 : net-snmp (CESA-2009:1124) | 26 Jun 200900:00 | – | nessus |
Tenable Nessus | Scientific Linux Security Update : net-snmp on SL3.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
Tenable Nessus | RHEL 3 : net-snmp (RHSA-2009:1124) | 26 Jun 200900:00 | – | nessus |
Tenable Nessus | VMSA-2010-0003 : ESX Service Console update for net-snmp | 17 Feb 201000:00 | – | nessus |
OSV | Red Hat Security Advisory: net-snmp security update | 15 Sep 202418:01 | – | osv |
RedHat Linux | (RHSA-2009:1124) Moderate: net-snmp security update | 25 Jun 200900:00 | – | redhat |
OpenVAS | CentOS Security Advisory CESA-2009:1124 (net-snmp) | 30 Jun 200900:00 | – | openvas |
OpenVAS | RedHat Security Advisory RHSA-2009:1124 | 30 Jun 200900:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2009:1124 and
# Oracle Linux Security Advisory ELSA-2009-1124 respectively.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(67880);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2009-1887");
script_xref(name:"RHSA", value:"2009:1124");
script_name(english:"Oracle Linux 3 : net-snmp (ELSA-2009-1124)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Oracle Linux host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"From Red Hat Security Advisory 2009:1124 :
Updated net-snmp packages that fix a security issue are now available
for Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
The Simple Network Management Protocol (SNMP) is a protocol used for
network management.
A divide-by-zero flaw was discovered in the snmpd daemon. A remote
attacker could issue a specially crafted GETBULK request that could
crash the snmpd daemon. (CVE-2009-1887)
Note: An attacker must have read access to the SNMP server in order to
exploit this flaw. In the default configuration, the community name
'public' grants read-only access. In production deployments, it is
recommended to change this default community name.
All net-snmp users should upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the snmpd and snmptrapd daemons will be restarted
automatically."
);
script_set_attribute(
attribute:"see_also",
value:"https://oss.oracle.com/pipermail/el-errata/2009-June/001060.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected net-snmp packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_cwe_id(189);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:net-snmp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:net-snmp-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:net-snmp-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:net-snmp-perl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:net-snmp-utils");
script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:3");
script_set_attribute(attribute:"vuln_publication_date", value:"2009/06/26");
script_set_attribute(attribute:"patch_publication_date", value:"2009/06/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Oracle Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
os_ver = os_ver[1];
if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 3", "Oracle Linux " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
flag = 0;
if (rpm_check(release:"EL3", cpu:"i386", reference:"net-snmp-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"x86_64", reference:"net-snmp-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"i386", reference:"net-snmp-devel-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"x86_64", reference:"net-snmp-devel-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"i386", reference:"net-snmp-libs-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"x86_64", reference:"net-snmp-libs-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"i386", reference:"net-snmp-perl-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"x86_64", reference:"net-snmp-perl-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"i386", reference:"net-snmp-utils-5.0.9-2.30E.28")) flag++;
if (rpm_check(release:"EL3", cpu:"x86_64", reference:"net-snmp-utils-5.0.9-2.30E.28")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "net-snmp / net-snmp-devel / net-snmp-libs / net-snmp-perl / etc");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo