The remote openSUSE host is missing a security update. ghostscript by default read some initialization files from the current working directory. Local attackers could potentially exploit that to have other users execute arbitrary commands by placing such files e.g. in /tmp (CVE-2010-2055)
Reporter | Title | Published | Views | Family All 61 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 14 Update: ghostscript-8.71-16.fc14 | 12 Oct 201003:13 | – | fedora |
Fedora | [SECURITY] Fedora 12 Update: gv-3.7.1-1.fc12 | 8 Jul 201018:12 | – | fedora |
Fedora | [SECURITY] Fedora 13 Update: ghostscript-8.71-16.fc13 | 11 Oct 201019:26 | – | fedora |
Fedora | [SECURITY] Fedora 13 Update: gv-3.7.1-1.fc13 | 8 Jul 201018:26 | – | fedora |
Fedora | [SECURITY] Fedora 12 Update: ghostscript-8.71-16.fc12 | 14 Oct 201023:02 | – | fedora |
Veracode | Arbitrary Code Execution | 10 Apr 202001:09 | – | veracode |
OpenVAS | Ghostscript Arbitrary Command Execution Vulnerability | 26 Jul 201000:00 | – | openvas |
OpenVAS | Fedora Update for ghostscript FEDORA-2010-14549 | 2 Dec 201000:00 | – | openvas |
OpenVAS | Fedora Update for ghostscript FEDORA-2010-14549 | 2 Dec 201000:00 | – | openvas |
OpenVAS | Ghostscript Arbitrary Command Execution Vulnerability | 26 Jul 201000:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update ghostscript-devel-2726.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(75512);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2010-2055");
script_name(english:"openSUSE Security Update : ghostscript-devel (openSUSE-SU-2010:0451-1)");
script_summary(english:"Check for the ghostscript-devel-2726 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"ghostscript by default read some initialization files from the current
working directory. Local attackers could potentially exploit that to
have other users execute arbitrary commands by placing such files e.g.
in /tmp (CVE-2010-2055)."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=559122"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=605043"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=608071"
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.opensuse.org/opensuse-updates/2010-08/msg00000.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected ghostscript-devel packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-fonts-other");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-fonts-rus");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-fonts-std");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-ijs-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-library");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-omni");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ghostscript-x11");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgimpprint");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgimpprint-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.3");
script_set_attribute(attribute:"patch_publication_date", value:"2010/07/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE11\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.3", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-devel-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-fonts-other-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-fonts-rus-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-fonts-std-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-ijs-devel-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-library-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-omni-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"ghostscript-x11-8.70-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"libgimpprint-4.2.7-15.1.1") ) flag++;
if ( rpm_check(release:"SUSE11.3", reference:"libgimpprint-devel-4.2.7-15.1.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ghostscript-devel / ghostscript-fonts-other / ghostscript-fonts-rus / etc");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo