Scientific Linux Security Update : nss on SL4.x, SL5.x, SL6.x i386/x86_64

2012-08-01T00:00:00
ID SL_20110428_NSS_ON_SL4_X.NASL
Type nessus
Reporter Tenable
Modified 2018-12-31T00:00:00

Description

Network Security Services (NSS) is a set of libraries designed to support the development of security-enabled client and server applications.

This erratum blacklists a small number of HTTPS certificates by adding them, flagged as untrusted, to the NSS Builtin Object Token (the libnssckbi.so library) certificate store. (BZ#689430)

Note: This fix only applies to applications using the NSS Builtin Object Token. It does not blacklist the certificates for applications that use the NSS library, but do not use the NSS Builtin Object Token (such as curl).

All NSS users should upgrade to these updated packages, which correct this issue. After installing the update, applications using NSS must be restarted for the changes to take effect.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#

include("compat.inc");

if (description)
{
  script_id(61026);
  script_version("1.2");
  script_cvs_date("Date: 2018/12/31 11:35:00");

  script_name(english:"Scientific Linux Security Update : nss on SL4.x, SL5.x, SL6.x i386/x86_64");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Scientific Linux host is missing one or more security
updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Network Security Services (NSS) is a set of libraries designed to
support the development of security-enabled client and server
applications.

This erratum blacklists a small number of HTTPS certificates by adding
them, flagged as untrusted, to the NSS Builtin Object Token (the
libnssckbi.so library) certificate store. (BZ#689430)

Note: This fix only applies to applications using the NSS Builtin
Object Token. It does not blacklist the certificates for applications
that use the NSS library, but do not use the NSS Builtin Object Token
(such as curl).

All NSS users should upgrade to these updated packages, which correct
this issue. After installing the update, applications using NSS must
be restarted for the changes to take effect."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=689430"
  );
  # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1104&L=scientific-linux-errata&T=0&P=3300
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?70c8b74a"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_attribute(attribute:"risk_factor", value:"High");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2011/04/28");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Scientific Linux Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);


flag = 0;
if (rpm_check(release:"SL4", reference:"nss-3.12.8-3.el4")) flag++;
if (rpm_check(release:"SL4", reference:"nss-devel-3.12.8-3.el4")) flag++;
if (rpm_check(release:"SL4", reference:"nss-tools-3.12.8-3.el4")) flag++;

if (rpm_check(release:"SL5", reference:"nss-3.12.8-4.el5_6")) flag++;
if (rpm_check(release:"SL5", reference:"nss-devel-3.12.8-4.el5_6")) flag++;
if (rpm_check(release:"SL5", reference:"nss-pkcs11-devel-3.12.8-4.el5_6")) flag++;
if (rpm_check(release:"SL5", reference:"nss-tools-3.12.8-4.el5_6")) flag++;

if (rpm_check(release:"SL6", reference:"nss-3.12.8-3.el6_0.0.sl6")) flag++;
if (rpm_check(release:"SL6", reference:"nss-devel-3.12.8-3.el6_0.0.sl6")) flag++;
if (rpm_check(release:"SL6", reference:"nss-pkcs11-devel-3.12.8-3.el6_0.0.sl6")) flag++;
if (rpm_check(release:"SL6", reference:"nss-sysinit-3.12.8-3.el6_0.0.sl6")) flag++;
if (rpm_check(release:"SL6", reference:"nss-tools-3.12.8-3.el6_0.0.sl6")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");