7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.6 Medium
AI Score
Confidence
Low
0.004 Low
EPSS
Percentile
73.7%
The remote Rocky Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RLSA-2022:1851 advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# Rocky Linux Security Advisory RLSA-2022:1851.
##
include('compat.inc');
if (description)
{
script_id(184472);
script_version("1.0");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/06");
script_cve_id("CVE-2021-4213");
script_xref(name:"RLSA", value:"2022:1851");
script_name(english:"Rocky Linux 8 : pki-core:10.6 (RLSA-2022:1851)");
script_set_attribute(attribute:"synopsis", value:
"The remote Rocky Linux host is missing a security update.");
script_set_attribute(attribute:"description", value:
"The remote Rocky Linux 8 host has packages installed that are affected by a vulnerability as referenced in the
RLSA-2022:1851 advisory.
- A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds
up in the server memory, saturating the server's RAM. This flaw allows an attacker to force the invocation
of an out-of-memory process, causing a denial of service. (CVE-2021-4213)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://errata.rockylinux.org/RLSA-2022:1851");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1904112");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1980378");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2004084");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2006070");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2019200");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2027470");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2042900");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-4213");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/05/10");
script_set_attribute(attribute:"patch_publication_date", value:"2022/05/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/06");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:jss");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:jss-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:jss-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:jss-javadoc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:ldapjdk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:ldapjdk-javadoc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-acme");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-base-java");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-ca");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-core-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-core-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-kra");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-server");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-symkey");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-symkey-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-tools");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:pki-tools-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:python3-pki");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:rocky:linux:tomcatjss");
script_set_attribute(attribute:"cpe", value:"cpe:/o:rocky:linux:8");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Rocky Linux Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RockyLinux/release", "Host/RockyLinux/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RockyLinux/release');
if (isnull(os_release) || 'Rocky Linux' >!< os_release) audit(AUDIT_OS_NOT, 'Rocky Linux');
var os_ver = pregmatch(pattern: "Rocky(?: Linux)? release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Rocky Linux');
os_ver = os_ver[1];
if (! preg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Rocky Linux 8.x', 'Rocky Linux ' + os_ver);
if (!get_kb_item('Host/RockyLinux/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Rocky Linux', cpu);
var module_ver = get_kb_item('Host/RockyLinux/appstream/pki-core');
if (isnull(module_ver)) audit(AUDIT_PACKAGE_NOT_INSTALLED, 'Module pki-core:10.6');
if ('10.6' >!< module_ver) audit(AUDIT_PACKAGE_NOT_AFFECTED, 'Module pki-core:' + module_ver);
var appstreams = {
'pki-core:10.6': [
{'reference':'jss-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-debuginfo-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-debuginfo-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-debugsource-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-debugsource-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-javadoc-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'jss-javadoc-4.9.3-1.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'ldapjdk-4.23.0-1.module+el8.5.0+701+8dc610e5', 'release':'8', 'el_string':'el8.5.0', 'rpm_spec_vers_cmp':TRUE},
{'reference':'ldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942', 'release':'8', 'el_string':'el8.7.0', 'rpm_spec_vers_cmp':TRUE},
{'reference':'ldapjdk-javadoc-4.23.0-1.module+el8.5.0+701+8dc610e5', 'release':'8', 'el_string':'el8.5.0', 'rpm_spec_vers_cmp':TRUE},
{'reference':'ldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942', 'release':'8', 'el_string':'el8.7.0', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-acme-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-base-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-base-java-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-ca-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-core-debuginfo-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-core-debuginfo-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-core-debugsource-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-core-debugsource-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-kra-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-server-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-symkey-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-symkey-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-symkey-debuginfo-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-symkey-debuginfo-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-tools-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-tools-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-tools-debuginfo-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'pki-tools-debuginfo-10.12.0-2.module+el8.6.0+788+76246f77', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'python3-pki-10.12.0-2.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE},
{'reference':'tomcatjss-7.7.1-1.module+el8.6.0+788+76246f77', 'release':'8', 'rpm_spec_vers_cmp':TRUE}
]
};
var flag = 0;
var appstreams_found = 0;
foreach var module (keys(appstreams)) {
var appstream = NULL;
var appstream_name = NULL;
var appstream_version = NULL;
var appstream_split = split(module, sep:':', keep:FALSE);
if (!empty_or_null(appstream_split)) {
appstream_name = appstream_split[0];
appstream_version = appstream_split[1];
if (!empty_or_null(appstream_name)) appstream = get_one_kb_item('Host/RockyLinux/appstream/' + appstream_name);
}
if (!empty_or_null(appstream) && appstream_version == appstream || appstream_name == 'all') {
appstreams_found++;
foreach var package_array ( appstreams[module] ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var epoch = NULL;
var allowmaj = NULL;
var exists_check = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = 'Rocky-' + package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (reference && _release && (!exists_check || rpm_exists(release:_release, rpm:exists_check))) {
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
}
}
}
}
if (!appstreams_found) audit(AUDIT_PACKAGE_NOT_INSTALLED, 'Module pki-core:10.6');
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'jss / jss-debuginfo / jss-debugsource / jss-javadoc / ldapjdk / etc');
}
Vendor | Product | Version | CPE |
---|---|---|---|
rocky | linux | jss | p-cpe:/a:rocky:linux:jss |
rocky | linux | jss-debuginfo | p-cpe:/a:rocky:linux:jss-debuginfo |
rocky | linux | jss-debugsource | p-cpe:/a:rocky:linux:jss-debugsource |
rocky | linux | jss-javadoc | p-cpe:/a:rocky:linux:jss-javadoc |
rocky | linux | ldapjdk | p-cpe:/a:rocky:linux:ldapjdk |
rocky | linux | ldapjdk-javadoc | p-cpe:/a:rocky:linux:ldapjdk-javadoc |
rocky | linux | pki-acme | p-cpe:/a:rocky:linux:pki-acme |
rocky | linux | pki-base | p-cpe:/a:rocky:linux:pki-base |
rocky | linux | pki-base-java | p-cpe:/a:rocky:linux:pki-base-java |
rocky | linux | pki-ca | p-cpe:/a:rocky:linux:pki-ca |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4213
bugzilla.redhat.com/show_bug.cgi?id=1904112
bugzilla.redhat.com/show_bug.cgi?id=1980378
bugzilla.redhat.com/show_bug.cgi?id=2004084
bugzilla.redhat.com/show_bug.cgi?id=2006070
bugzilla.redhat.com/show_bug.cgi?id=2019200
bugzilla.redhat.com/show_bug.cgi?id=2027470
bugzilla.redhat.com/show_bug.cgi?id=2042900
errata.rockylinux.org/RLSA-2022:1851
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.6 Medium
AI Score
Confidence
Low
0.004 Low
EPSS
Percentile
73.7%