New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, and 12.0 to fix security issues. The first issue which allows remote attackers to make recursive queries only affects Slackware 12.0. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
https://vulners.com/cve/CVE-2007-2925 The second issue is the discovery that BIND9’s query IDs are cryptographically weak. This issue affects the versions of BIND9 in all supported Slackware versions. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
https://vulners.com/cve/CVE-2007-2926
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Slackware Security Advisory 2007-207-01. The text
# itself is copyright (C) Slackware Linux, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(54868);
script_version("1.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2007-2925", "CVE-2007-2926");
script_bugtraq_id(25037);
script_xref(name:"SSA", value:"2007-207-01");
script_name(english:"Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 8.1 / 9.0 / 9.1 : bind (SSA:2007-207-01)");
script_summary(english:"Checks for updated package in /var/log/packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Slackware host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, 10.2, 11.0, and 12.0 to fix security issues. The first issue
which allows remote attackers to make recursive queries only affects
Slackware 12.0. More details about this issue may be found in the
Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 The second
issue is the discovery that BIND9's query IDs are cryptographically
weak. This issue affects the versions of BIND9 in all supported
Slackware versions. More details about this issue may be found in the
Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926"
);
# http://www.slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.521385
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c5c1303b"
);
script_set_attribute(attribute:"solution", value:"Update the affected bind package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:bind");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:10.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:10.1");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:10.2");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:11.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:12.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:8.1");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:9.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:9.1");
script_set_attribute(attribute:"patch_publication_date", value:"2007/07/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/05/28");
script_set_attribute(attribute:"vuln_publication_date", value:"2007/07/24");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.");
script_family(english:"Slackware Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Slackware/release", "Host/Slackware/packages");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("slackware.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Slackware/release")) audit(AUDIT_OS_NOT, "Slackware");
if (!get_kb_item("Host/Slackware/packages")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Slackware", cpu);
flag = 0;
if (slackware_check(osver:"8.1", pkgname:"bind", pkgver:"9.2.8_P1", pkgarch:"i386", pkgnum:"1_slack8.1")) flag++;
if (slackware_check(osver:"9.0", pkgname:"bind", pkgver:"9.2.8_P1", pkgarch:"i386", pkgnum:"1_slack9.0")) flag++;
if (slackware_check(osver:"9.1", pkgname:"bind", pkgver:"9.2.8_P1", pkgarch:"i486", pkgnum:"1_slack9.1")) flag++;
if (slackware_check(osver:"10.0", pkgname:"bind", pkgver:"9.2.8_P1", pkgarch:"i486", pkgnum:"1_slack10.0")) flag++;
if (slackware_check(osver:"10.1", pkgname:"bind", pkgver:"9.3.4_P1", pkgarch:"i486", pkgnum:"1_slack10.1")) flag++;
if (slackware_check(osver:"10.2", pkgname:"bind", pkgver:"9.3.4_P1", pkgarch:"i486", pkgnum:"1_slack10.2")) flag++;
if (slackware_check(osver:"11.0", pkgname:"bind", pkgver:"9.3.4_P1", pkgarch:"i486", pkgnum:"1_slack11.0")) flag++;
if (slackware_check(osver:"12.0", pkgname:"bind", pkgver:"9.4.1_P1", pkgarch:"i486", pkgnum:"1_slack12.0")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
slackware | slackware_linux | bind | p-cpe:/a:slackware:slackware_linux:bind |
slackware | slackware_linux | 10.0 | cpe:/o:slackware:slackware_linux:10.0 |
slackware | slackware_linux | 10.1 | cpe:/o:slackware:slackware_linux:10.1 |
slackware | slackware_linux | 10.2 | cpe:/o:slackware:slackware_linux:10.2 |
slackware | slackware_linux | 11.0 | cpe:/o:slackware:slackware_linux:11.0 |
slackware | slackware_linux | 12.0 | cpe:/o:slackware:slackware_linux:12.0 |
slackware | slackware_linux | 8.1 | cpe:/o:slackware:slackware_linux:8.1 |
slackware | slackware_linux | 9.0 | cpe:/o:slackware:slackware_linux:9.0 |
slackware | slackware_linux | 9.1 | cpe:/o:slackware:slackware_linux:9.1 |