Oracle Solaris Critical Patch Update : jan2014_SRU1_4

2014-07-26T00:00:00
ID SOLARIS_JAN2014_SRU1_4.NASL
Type nessus
Reporter Tenable
Modified 2015-11-13T00:00:00

Description

This Solaris system is missing necessary patches to address a critical security update :

  • Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Remote Procedure Call (RPC)). Supported versions that are affected are 8, 9, 10 and 11.1. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Solaris accessible data as well as read access to a subset of Solaris accessible data and ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2013-5821)

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Oracle CPU for jan2014.
#
include("compat.inc");

if (description)
{
  script_id(76815);
  script_version("$Revision: 1.3 $");
  script_cvs_date("$Date: 2015/11/13 15:27:57 $");

  script_cve_id("CVE-2013-5821");
  script_bugtraq_id(64856);
  script_osvdb_id(16004, 16005, 97966, 102048, 102049, 102050, 102051, 102052, 102053, 102054, 102055, 102056);

  script_name(english:"Oracle Solaris Critical Patch Update : jan2014_SRU1_4");
  script_summary(english:"Check for the jan2014 CPU");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Solaris system is missing a security patch from CPU
jan2014."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This Solaris system is missing necessary patches to address a critical
security update :

  - Vulnerability in the Solaris component of Oracle and Sun
    Systems Products Suite (subcomponent: Remote Procedure
    Call (RPC)). Supported versions that are affected are 8,
    9, 10 and 11.1. Easily exploitable vulnerability
    requiring logon to Operating System. Successful attack
    of this vulnerability can result in unauthorized update,
    insert or delete access to some Solaris accessible data
    as well as read access to a subset of Solaris accessible
    data and ability to cause a partial denial of service
    (partial DOS) of Solaris. (CVE-2013-5821)"
  );
  # http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1932653.xml
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?5d7439df"
  );
  # http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?17c46362"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://support.oracle.com/rs?type=doc&id=1607615.1"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Install the jan2014 CPU from the Oracle support website."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2014/01/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/26");
  script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/20");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.");
  script_family(english:"Solaris Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("solaris.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Solaris11/release");
if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11");


fix_release = "0.5.11-0.175.1.1.0.4.0";

flag = 0;

if (solaris_check_release(release:"0.5.11-0.175.1.1.0.4.0", sru:"11.1.1.4.0") > 0) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report2());
  else security_warning(0);
  exit(0);
}
audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);