RHEL 2.1 : gdm (RHSA-2003:259)

2004-07-06T00:00:00
ID REDHAT-RHSA-2003-259.NASL
Type nessus
Reporter Tenable
Modified 2018-07-25T00:00:00

Description

Updated GDM packages are available which correct a local crash if XDMCP is enabled.

GDM is the GNOME Display Manager for X.

Two bugs have been found in the X Display Manager Control Protocol (XDMCP) which could allow a denial of service attack (DoS) by crashing the gdm daemon. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2003-0548 and CVE-2003-0549 to these issues.

This attack is only possible if XDMCP is enabled. XDMCP is not enabled by default in Red Hat Enterprise Linux distributions. In addition is documented best practise that XDMCP should only ever be run on trusted networks.

Users of XDMCP in GDM should upgrade to these erratum packages which contain backported security fixes are are not vulnerable to these issues.

Note that Red Hat Enterprise Linux 2.1 is not vulnerable to CVE-2003-0547, a vulnerability that allows a local user to read any text file, as it did not have the 'examine session errors' feature.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Red Hat Security Advisory RHSA-2003:259. The text 
# itself is copyright (C) Red Hat, Inc.
#

include("compat.inc");

if (description)
{
  script_id(12416);
  script_version ("1.21");
  script_cvs_date("Date: 2018/07/25 18:58:04");

  script_cve_id("CVE-2003-0548", "CVE-2003-0549");
  script_bugtraq_id(8470);
  script_xref(name:"RHSA", value:"2003:259");

  script_name(english:"RHEL 2.1 : gdm (RHSA-2003:259)");
  script_summary(english:"Checks the rpm output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Red Hat host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Updated GDM packages are available which correct a local crash if
XDMCP is enabled.

GDM is the GNOME Display Manager for X.

Two bugs have been found in the X Display Manager Control Protocol
(XDMCP) which could allow a denial of service attack (DoS) by crashing
the gdm daemon. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2003-0548 and CVE-2003-0549
to these issues.

This attack is only possible if XDMCP is enabled. XDMCP is not enabled
by default in Red Hat Enterprise Linux distributions. In addition is
documented best practise that XDMCP should only ever be run on trusted
networks.

Users of XDMCP in GDM should upgrade to these erratum packages which
contain backported security fixes are are not vulnerable to these
issues.

Note that Red Hat Enterprise Linux 2.1 is not vulnerable to
CVE-2003-0547, a vulnerability that allows a local user to read any
text file, as it did not have the 'examine session errors' feature."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.redhat.com/security/data/cve/CVE-2003-0548.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.redhat.com/security/data/cve/CVE-2003-0549.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://rhn.redhat.com/errata/RHSA-2003-259.html"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected gdm package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:gdm");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:2.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2003/08/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/06");
  script_set_attribute(attribute:"vuln_publication_date", value:"2003/08/22");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
  script_family(english:"Red Hat Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = eregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! ereg(pattern:"^2\.1([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 2.1", "Red Hat " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
if (cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i386", cpu);

yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo)) 
{
  rhsa = "RHSA-2003:259";
  yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
  if (!empty_or_null(yum_report))
  {
    security_report_v4(
      port       : 0,
      severity   : SECURITY_WARNING,
      extra      : yum_report 
    );
    exit(0);
  }
  else
  {
    audit_message = "affected by Red Hat security advisory " + rhsa;
    audit(AUDIT_OS_NOT, audit_message);
  }
}
else
{
  flag = 0;
  if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"gdm-2.2.3.1-20.1")) flag++;

  if (flag)
  {
    security_report_v4(
      port       : 0,
      severity   : SECURITY_WARNING,
      extra      : rpm_report_get() + redhat_report_package_caveat()
    );
    exit(0);
  }
  else
  {
    tested = pkg_tests_get();
    if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
    else audit(AUDIT_PACKAGE_NOT_INSTALLED, "gdm");
  }
}