Lucene search

K
nessusThis script is Copyright (C) 2013-2021 Tenable Network Security, Inc.REDHAT-RHSA-2008-0627.NASL
HistoryJan 24, 2013 - 12:00 a.m.

RHEL 4 : Proxy Server (RHSA-2008:0627)

2013-01-2400:00:00
This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.
www.tenable.com
14

Red Hat Network Proxy Server version 5.1.1 is now available. This update includes a fix for a security issue in a Red Hat Network Proxy Server component.

This update has been rated as having low security impact by the Red Hat Security Response Team.

The Red Hat Network Proxy Server 5.1.1 release corrects a security vulnerability in a shipped component. In a typical operating environment, this component is not exposed to users of Proxy Server in a vulnerable manner. This security update will reduce risk in unique Proxy Server environments.

A flaw was found in the mod_perl ‘ModPerl::RegistryCooker’ class. If a server implemented a mod_perl registry module using the ‘namespace_from_uri’ method, a remote attacker requesting a carefully crafted URI can cause resource consumption, which could lead to a denial of service. (CVE-2007-1349)

Users of Red Hat Network Proxy Server 5.1 are advised to upgrade to 5.1.1, which resolves this issue.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Red Hat Security Advisory RHSA-2008:0627. The text 
# itself is copyright (C) Red Hat, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(63859);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");

  script_cve_id("CVE-2007-1349");
  script_xref(name:"RHSA", value:"2008:0627");

  script_name(english:"RHEL 4 : Proxy Server (RHSA-2008:0627)");
  script_summary(english:"Checks rpm output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Red Hat host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Red Hat Network Proxy Server version 5.1.1 is now available. This
update includes a fix for a security issue in a Red Hat Network Proxy
Server component.

This update has been rated as having low security impact by the Red
Hat Security Response Team.

The Red Hat Network Proxy Server 5.1.1 release corrects a security
vulnerability in a shipped component. In a typical operating
environment, this component is not exposed to users of Proxy Server in
a vulnerable manner. This security update will reduce risk in unique
Proxy Server environments.

A flaw was found in the mod_perl 'ModPerl::RegistryCooker' class. If a
server implemented a mod_perl registry module using the
'namespace_from_uri' method, a remote attacker requesting a carefully
crafted URI can cause resource consumption, which could lead to a
denial of service. (CVE-2007-1349)

Users of Red Hat Network Proxy Server 5.1 are advised to upgrade to
5.1.1, which resolves this issue."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.redhat.com/security/data/cve/CVE-2007-1349.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://rhn.redhat.com/errata/RHSA-2008-0627.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected mod_perl package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_cwe_id(399);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_perl");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");

  script_set_attribute(attribute:"patch_publication_date", value:"2008/08/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/24");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.");
  script_family(english:"Red Hat Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);

flag = 0;
if (rpm_check(release:"RHEL4", reference:"mod_perl-2.0.2-12.el4")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
redhatenterprise_linuxmod_perlp-cpe:/a:redhat:enterprise_linux:mod_perl
redhatenterprise_linux4cpe:/o:redhat:enterprise_linux:4