SuSE 11 Security Update : NetworkManager-gnome (SAT Patch Number 1879)
2010-02-02T00:00:00
ID SUSE_11_NETWORKMANAGER-GNOME-100128.NASL Type nessus Reporter This script is Copyright (C) 2010-2021 Tenable Network Security, Inc. Modified 2010-02-02T00:00:00
Description
The following bugs have been fixed :
nm-applet connected to WPA2 Enterprise networks even if
the specified CA certificate file didn't exist.
(CVE-2009-4144)
When editing connections in nm-applet the connection
object was exported via DBus disclosing potentially
sensitive information to local users. (CVE-2009-4145)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SuSE 11 update information. The text itself is
# copyright (C) Novell, Inc.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(44375);
script_version("1.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2009-4144", "CVE-2009-4145");
script_name(english:"SuSE 11 Security Update : NetworkManager-gnome (SAT Patch Number 1879)");
script_summary(english:"Checks rpm output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote SuSE 11 host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"The following bugs have been fixed :
- nm-applet connected to WPA2 Enterprise networks even if
the specified CA certificate file didn't exist.
(CVE-2009-4144)
- When editing connections in nm-applet the connection
object was exported via DBus disclosing potentially
sensitive information to local users. (CVE-2009-4145)"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=565549"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2009-4144.html"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2009-4145.html"
);
script_set_attribute(attribute:"solution", value:"Apply SAT patch number 1879.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_cwe_id(200, 310);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:NetworkManager-gnome");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_set_attribute(attribute:"patch_publication_date", value:"2010/01/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/02/02");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
pl = get_kb_item("Host/SuSE/patchlevel");
if (pl) audit(AUDIT_OS_NOT, "SuSE 11.0");
flag = 0;
if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"NetworkManager-gnome-0.7.0.r1053-11.11.1")) flag++;
if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"NetworkManager-gnome-0.7.0.r1053-11.11.1")) flag++;
if (rpm_check(release:"SLES11", sp:0, reference:"NetworkManager-gnome-0.7.0.r1053-11.11.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "SUSE_11_NETWORKMANAGER-GNOME-100128.NASL", "bulletinFamily": "scanner", "title": "SuSE 11 Security Update : NetworkManager-gnome (SAT Patch Number 1879)", "description": "The following bugs have been fixed :\n\n - nm-applet connected to WPA2 Enterprise networks even if\n the specified CA certificate file didn't exist.\n (CVE-2009-4144)\n\n - When editing connections in nm-applet the connection\n object was exported via DBus disclosing potentially\n sensitive information to local users. (CVE-2009-4145)", "published": "2010-02-02T00:00:00", "modified": "2010-02-02T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/44375", "reporter": "This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.", "references": ["http://support.novell.com/security/cve/CVE-2009-4145.html", "http://support.novell.com/security/cve/CVE-2009-4144.html", "https://bugzilla.novell.com/show_bug.cgi?id=565549"], "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "type": "nessus", "lastseen": "2021-01-17T14:09:41", "edition": 25, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-4145", "CVE-2009-4144"]}, {"type": "ubuntu", "idList": ["USN-883-1"]}, {"type": "openvas", "idList": ["OPENVAS:880580", "OPENVAS:840367", "OPENVAS:1361412562310870219", "OPENVAS:1361412562310840367", "OPENVAS:1361412562310880580", "OPENVAS:861604", "OPENVAS:1361412562310861604", "OPENVAS:870219", "OPENVAS:1361412562310122393"]}, {"type": "centos", "idList": ["CESA-2010:0108"]}, {"type": "redhat", "idList": ["RHSA-2010:0108"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0108"]}, {"type": "nessus", "idList": ["UBUNTU_USN-883-1.NASL", "SUSE_11_2_NETWORKMANAGER-GNOME-100126.NASL", "FEDORA_2009-13642.NASL", "SL_20100216_NETWORKMANAGER_ON_SL5_X.NASL", "SUSE_11_1_NETWORKMANAGER-GNOME-100126.NASL", "REDHAT-RHSA-2010-0108.NASL", "SUSE_11_0_NETWORKMANAGER-GNOME-100126.NASL", "CENTOS_RHSA-2010-0108.NASL", "ORACLELINUX_ELSA-2010-0108.NASL"]}, {"type": "fedora", "idList": ["FEDORA:41FAC10F862"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:9709"]}], "modified": "2021-01-17T14:09:41", "rev": 2}, "score": {"value": 5.1, "vector": "NONE", "modified": "2021-01-17T14:09:41", "rev": 2}, "vulnersScore": 5.1}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44375);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n\n script_name(english:\"SuSE 11 Security Update : NetworkManager-gnome (SAT Patch Number 1879)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The following bugs have been fixed :\n\n - nm-applet connected to WPA2 Enterprise networks even if\n the specified CA certificate file didn't exist.\n (CVE-2009-4144)\n\n - When editing connections in nm-applet the connection\n object was exported via DBus disclosing potentially\n sensitive information to local users. (CVE-2009-4145)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=565549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4144.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-4145.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 1879.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (pl) audit(AUDIT_OS_NOT, \"SuSE 11.0\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"NetworkManager-gnome-0.7.0.r1053-11.11.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"NetworkManager-gnome-0.7.0.r1053-11.11.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"NetworkManager-gnome-0.7.0.r1053-11.11.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "44375", "cpe": ["cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:NetworkManager-gnome"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:54:19", "description": "nm-connection-editor in NetworkManager (NM) 0.7.x exports connection objects over D-Bus upon actions in the connection editor GUI, which allows local users to obtain sensitive information by reading D-Bus signals, as demonstrated by using dbus-monitor to discover the password for the WiFi network.", "edition": 3, "cvss3": {}, "published": "2009-12-23T20:30:00", "title": "CVE-2009-4145", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-4145"], "modified": "2017-09-19T01:29:00", "cpe": ["cpe:/a:gnome:networkmanager:0.7.2"], "id": "CVE-2009-4145", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4145", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:gnome:networkmanager:0.7.2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:54:19", "description": "NetworkManager (NM) 0.7.2 does not ensure that the configured Certification Authority (CA) certificate file for a (1) WPA Enterprise or (2) 802.1x network remains present upon a connection attempt, which might allow remote attackers to obtain sensitive information or cause a denial of service (connectivity disruption) by spoofing the identity of a wireless network.", "edition": 3, "cvss3": {}, "published": "2009-12-23T20:30:00", "title": "CVE-2009-4144", "type": "cve", "cwe": ["CWE-310"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-4144"], "modified": "2017-09-19T01:29:00", "cpe": ["cpe:/a:gnome:networkmanager:0.7.2"], "id": "CVE-2009-4144", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4144", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:gnome:networkmanager:0.7.2:*:*:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-08T23:31:51", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "It was discovered that NetworkManager did not ensure that the Certification \nAuthority (CA) certificate file remained present when using WPA Enterprise \nor 802.1x networks. A remote attacker could use this flaw to spoof the \nidentity of a wireless network and view sensitive information. \n(CVE-2009-4144)\n\nIt was discovered that the connection editor GUI would incorrectly export \nobjects over D-Bus. A local user could read D-Bus signals to view other \nusers' network connection passwords and pre-shared keys. (CVE-2009-4145)", "edition": 5, "modified": "2010-01-13T00:00:00", "published": "2010-01-13T00:00:00", "id": "USN-883-1", "href": "https://ubuntu.com/security/notices/USN-883-1", "title": "network-manager-applet vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2017-07-25T10:55:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Check for the Version of NetworkManager", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:880580", "href": "http://plugins.openvas.org/nasl.php?oid=880580", "type": "openvas", "title": "CentOS Update for NetworkManager CESA-2010:0108 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for NetworkManager CESA-2010:0108 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"NetworkManager is a network link manager that attempts to keep a wired or\n wireless network connection active at all times.\n\n A missing network certificate verification flaw was found in\n NetworkManager. If a user created a WPA Enterprise or 802.1x wireless\n network connection that was verified using a Certificate Authority (CA)\n certificate, and then later removed that CA certificate file,\n NetworkManager failed to verify the identity of the network on the\n following connection attempts. In these situations, a malicious wireless\n network spoofing the original network could trick a user into disclosing\n authentication credentials or communicating over an untrusted network.\n (CVE-2009-4144)\n \n An information disclosure flaw was found in NetworkManager's\n nm-connection-editor D-Bus interface. If a user edited network connection\n options using nm-connection-editor, a summary of those changes was\n broadcasted over the D-Bus message bus, possibly disclosing sensitive\n information (such as wireless network authentication credentials) to other\n local users. (CVE-2009-4145)\n \n Users of NetworkManager should upgrade to these updated packages, which\n contain backported patches to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"NetworkManager on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-February/016521.html\");\n script_id(880580);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2010:0108\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_name(\"CentOS Update for NetworkManager CESA-2010:0108 centos5 i386\");\n\n script_summary(\"Check for the Version of NetworkManager\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-devel\", rpm:\"NetworkManager-devel~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib-devel\", rpm:\"NetworkManager-glib-devel~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-gnome\", rpm:\"NetworkManager-gnome~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:1361412562310880580", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880580", "type": "openvas", "title": "CentOS Update for NetworkManager CESA-2010:0108 centos5 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for NetworkManager CESA-2010:0108 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2010-February/016521.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880580\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"CESA\", value:\"2010:0108\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_name(\"CentOS Update for NetworkManager CESA-2010:0108 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'NetworkManager'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"NetworkManager on CentOS 5\");\n script_tag(name:\"insight\", value:\"NetworkManager is a network link manager that attempts to keep a wired or\n wireless network connection active at all times.\n\n A missing network certificate verification flaw was found in\n NetworkManager. If a user created a WPA Enterprise or 802.1x wireless\n network connection that was verified using a Certificate Authority (CA)\n certificate, and then later removed that CA certificate file,\n NetworkManager failed to verify the identity of the network on the\n following connection attempts. In these situations, a malicious wireless\n network spoofing the original network could trick a user into disclosing\n authentication credentials or communicating over an untrusted network.\n (CVE-2009-4144)\n\n An information disclosure flaw was found in NetworkManager's\n nm-connection-editor D-Bus interface. If a user edited network connection\n options using nm-connection-editor, a summary of those changes was\n broadcasted over the D-Bus message bus, possibly disclosing sensitive\n information (such as wireless network authentication credentials) to other\n local users. (CVE-2009-4145)\n\n Users of NetworkManager should upgrade to these updated packages, which\n contain backported patches to correct these issues.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-devel\", rpm:\"NetworkManager-devel~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib-devel\", rpm:\"NetworkManager-glib-devel~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-gnome\", rpm:\"NetworkManager-gnome~0.7.0~9.el5_4\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-02T10:53:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Check for the Version of NetworkManager", "modified": "2017-12-28T00:00:00", "published": "2010-02-19T00:00:00", "id": "OPENVAS:1361412562310870219", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870219", "type": "openvas", "title": "RedHat Update for NetworkManager RHSA-2010:0108-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for NetworkManager RHSA-2010:0108-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"NetworkManager is a network link manager that attempts to keep a wired or\n wireless network connection active at all times.\n\n A missing network certificate verification flaw was found in\n NetworkManager. If a user created a WPA Enterprise or 802.1x wireless\n network connection that was verified using a Certificate Authority (CA)\n certificate, and then later removed that CA certificate file,\n NetworkManager failed to verify the identity of the network on the\n following connection attempts. In these situations, a malicious wireless\n network spoofing the original network could trick a user into disclosing\n authentication credentials or communicating over an untrusted network.\n (CVE-2009-4144)\n \n An information disclosure flaw was found in NetworkManager's\n nm-connection-editor D-Bus interface. If a user edited network connection\n options using nm-connection-editor, a summary of those changes was\n broadcasted over the D-Bus message bus, possibly disclosing sensitive\n information (such as wireless network authentication credentials) to other\n local users. (CVE-2009-4145)\n \n Users of NetworkManager should upgrade to these updated packages, which\n contain backported patches to correct these issues.\";\n\ntag_affected = \"NetworkManager on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-February/msg00007.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870219\");\n script_version(\"$Revision: 8254 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-28 08:29:05 +0100 (Thu, 28 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-02-19 13:38:15 +0100 (Fri, 19 Feb 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2010:0108-01\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_name(\"RedHat Update for NetworkManager RHSA-2010:0108-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of NetworkManager\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-debuginfo\", rpm:\"NetworkManager-debuginfo~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-devel\", rpm:\"NetworkManager-devel~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib-devel\", rpm:\"NetworkManager-glib-devel~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-gnome\", rpm:\"NetworkManager-gnome~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-03T10:55:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Check for the Version of NetworkManager", "modified": "2018-01-02T00:00:00", "published": "2010-01-15T00:00:00", "id": "OPENVAS:1361412562310861604", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310861604", "type": "openvas", "title": "Fedora Update for NetworkManager FEDORA-2009-13642", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for NetworkManager FEDORA-2009-13642\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"NetworkManager on Fedora 11\";\ntag_insight = \"NetworkManager attempts to keep an active network connection available at all\n times. It is intended only for the desktop use-case, and is not intended for\n usage on servers. The point of NetworkManager is to make networking\n configuration and setup as painless and automatic as possible. If using DHCP,\n NetworkManager is _intended_ to replace default routes, obtain IP addresses\n from a DHCP server, and change nameservers whenever it sees fit.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00122.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.861604\");\n script_version(\"$Revision: 8269 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 08:28:22 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-15 10:29:41 +0100 (Fri, 15 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2009-13642\");\n script_cve_id(\"CVE-2009-4145\", \"CVE-2009-4144\");\n script_name(\"Fedora Update for NetworkManager FEDORA-2009-13642\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of NetworkManager\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.2~2.git20091223.fc11\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-23T13:06:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-883-1", "modified": "2018-01-23T00:00:00", "published": "2010-01-19T00:00:00", "id": "OPENVAS:1361412562310840367", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840367", "type": "openvas", "title": "Ubuntu Update for network-manager-applet vulnerabilities USN-883-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_883_1.nasl 8495 2018-01-23 07:57:49Z teissa $\n#\n# Ubuntu Update for network-manager-applet vulnerabilities USN-883-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that NetworkManager did not ensure that the Certification\n Authority (CA) certificate file remained present when using WPA Enterprise\n or 802.1x networks. A remote attacker could use this flaw to spoof the\n identity of a wireless network and view sensitive information.\n (CVE-2009-4144)\n\n It was discovered that the connection editor GUI would incorrectly export\n objects over D-Bus. A local user could read D-Bus signals to view other\n users' network connection passwords and pre-shared keys. (CVE-2009-4145)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-883-1\";\ntag_affected = \"network-manager-applet vulnerabilities on Ubuntu 8.10 ,\n Ubuntu 9.04\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-883-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840367\");\n script_version(\"$Revision: 8495 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-23 08:57:49 +0100 (Tue, 23 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-19 08:58:46 +0100 (Tue, 19 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"883-1\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_name(\"Ubuntu Update for network-manager-applet vulnerabilities USN-883-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"network-manager-gnome\", ver:\"0.7.1~rc4.1-0ubuntu2.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"network-manager-gnome\", ver:\"0.7~~svn20081020t000444-0ubuntu1.8.10.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-14T11:48:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Check for the Version of NetworkManager", "modified": "2017-12-14T00:00:00", "published": "2010-02-19T00:00:00", "id": "OPENVAS:870219", "href": "http://plugins.openvas.org/nasl.php?oid=870219", "type": "openvas", "title": "RedHat Update for NetworkManager RHSA-2010:0108-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for NetworkManager RHSA-2010:0108-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"NetworkManager is a network link manager that attempts to keep a wired or\n wireless network connection active at all times.\n\n A missing network certificate verification flaw was found in\n NetworkManager. If a user created a WPA Enterprise or 802.1x wireless\n network connection that was verified using a Certificate Authority (CA)\n certificate, and then later removed that CA certificate file,\n NetworkManager failed to verify the identity of the network on the\n following connection attempts. In these situations, a malicious wireless\n network spoofing the original network could trick a user into disclosing\n authentication credentials or communicating over an untrusted network.\n (CVE-2009-4144)\n \n An information disclosure flaw was found in NetworkManager's\n nm-connection-editor D-Bus interface. If a user edited network connection\n options using nm-connection-editor, a summary of those changes was\n broadcasted over the D-Bus message bus, possibly disclosing sensitive\n information (such as wireless network authentication credentials) to other\n local users. (CVE-2009-4145)\n \n Users of NetworkManager should upgrade to these updated packages, which\n contain backported patches to correct these issues.\";\n\ntag_affected = \"NetworkManager on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-February/msg00007.html\");\n script_id(870219);\n script_version(\"$Revision: 8109 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-14 07:31:15 +0100 (Thu, 14 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-02-19 13:38:15 +0100 (Fri, 19 Feb 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2010:0108-01\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_name(\"RedHat Update for NetworkManager RHSA-2010:0108-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of NetworkManager\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-debuginfo\", rpm:\"NetworkManager-debuginfo~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-devel\", rpm:\"NetworkManager-devel~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib-devel\", rpm:\"NetworkManager-glib-devel~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"NetworkManager-gnome\", rpm:\"NetworkManager-gnome~0.7.0~9.el5_4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-15T11:58:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Check for the Version of NetworkManager", "modified": "2017-12-15T00:00:00", "published": "2010-01-15T00:00:00", "id": "OPENVAS:861604", "href": "http://plugins.openvas.org/nasl.php?oid=861604", "type": "openvas", "title": "Fedora Update for NetworkManager FEDORA-2009-13642", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for NetworkManager FEDORA-2009-13642\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"NetworkManager on Fedora 11\";\ntag_insight = \"NetworkManager attempts to keep an active network connection available at all\n times. It is intended only for the desktop use-case, and is not intended for\n usage on servers. The point of NetworkManager is to make networking\n configuration and setup as painless and automatic as possible. If using DHCP,\n NetworkManager is _intended_ to replace default routes, obtain IP addresses\n from a DHCP server, and change nameservers whenever it sees fit.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00122.html\");\n script_id(861604);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-15 10:29:41 +0100 (Fri, 15 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2009-13642\");\n script_cve_id(\"CVE-2009-4145\", \"CVE-2009-4144\");\n script_name(\"Fedora Update for NetworkManager FEDORA-2009-13642\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of NetworkManager\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC11\")\n{\n\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.2~2.git20091223.fc11\", rls:\"FC11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:18:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-883-1", "modified": "2017-12-01T00:00:00", "published": "2010-01-19T00:00:00", "id": "OPENVAS:840367", "href": "http://plugins.openvas.org/nasl.php?oid=840367", "type": "openvas", "title": "Ubuntu Update for network-manager-applet vulnerabilities USN-883-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_883_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for network-manager-applet vulnerabilities USN-883-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that NetworkManager did not ensure that the Certification\n Authority (CA) certificate file remained present when using WPA Enterprise\n or 802.1x networks. A remote attacker could use this flaw to spoof the\n identity of a wireless network and view sensitive information.\n (CVE-2009-4144)\n\n It was discovered that the connection editor GUI would incorrectly export\n objects over D-Bus. A local user could read D-Bus signals to view other\n users' network connection passwords and pre-shared keys. (CVE-2009-4145)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-883-1\";\ntag_affected = \"network-manager-applet vulnerabilities on Ubuntu 8.10 ,\n Ubuntu 9.04\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-883-1/\");\n script_id(840367);\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-19 08:58:46 +0100 (Tue, 19 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"883-1\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_name(\"Ubuntu Update for network-manager-applet vulnerabilities USN-883-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"network-manager-gnome\", ver:\"0.7.1~rc4.1-0ubuntu2.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"network-manager-gnome\", ver:\"0.7~~svn20081020t000444-0ubuntu1.8.10.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "Oracle Linux Local Security Checks ELSA-2010-0108", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310122393", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122393", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2010-0108", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-0108.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122393\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:18:09 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-0108\");\n script_tag(name:\"insight\", value:\"ELSA-2010-0108 - NetworkManager security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-0108\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-0108.html\");\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"NetworkManager\", rpm:\"NetworkManager~0.7.0~9.el5_4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"NetworkManager-devel\", rpm:\"NetworkManager-devel~0.7.0~9.el5_4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib\", rpm:\"NetworkManager-glib~0.7.0~9.el5_4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"NetworkManager-glib-devel\", rpm:\"NetworkManager-glib-devel~0.7.0~9.el5_4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"NetworkManager-gnome\", rpm:\"NetworkManager-gnome~0.7.0~9.el5_4\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:25:56", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "**CentOS Errata and Security Advisory** CESA-2010:0108\n\n\nNetworkManager is a network link manager that attempts to keep a wired or\nwireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority (CA)\ncertificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious wireless\nnetwork spoofing the original network could trick a user into disclosing\nauthentication credentials or communicating over an untrusted network.\n(CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network connection\noptions using nm-connection-editor, a summary of those changes was\nbroadcasted over the D-Bus message bus, possibly disclosing sensitive\ninformation (such as wireless network authentication credentials) to other\nlocal users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages, which\ncontain backported patches to correct these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2010-February/028559.html\nhttp://lists.centos.org/pipermail/centos-announce/2010-February/028560.html\n\n**Affected packages:**\nNetworkManager\nNetworkManager-devel\nNetworkManager-glib\nNetworkManager-glib-devel\nNetworkManager-gnome\n\n**Upstream details at:**\n", "edition": 3, "modified": "2010-02-23T00:09:27", "published": "2010-02-23T00:09:27", "href": "http://lists.centos.org/pipermail/centos-announce/2010-February/028559.html", "id": "CESA-2010:0108", "title": "NetworkManager security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:46", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "NetworkManager is a network link manager that attempts to keep a wired or\nwireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority (CA)\ncertificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious wireless\nnetwork spoofing the original network could trick a user into disclosing\nauthentication credentials or communicating over an untrusted network.\n(CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network connection\noptions using nm-connection-editor, a summary of those changes was\nbroadcasted over the D-Bus message bus, possibly disclosing sensitive\ninformation (such as wireless network authentication credentials) to other\nlocal users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "modified": "2017-09-08T11:51:06", "published": "2010-02-16T05:00:00", "id": "RHSA-2010:0108", "href": "https://access.redhat.com/errata/RHSA-2010:0108", "type": "redhat", "title": "(RHSA-2010:0108) Moderate: NetworkManager security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:31", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "[1:0.7.0-9.el5_4]\n- Ensure a connection is not used after its CA certificate has been deleted\n- Resolves: CVE-2009-4144\n- Fix possible information disclosure by nm-connection-editor\n- Resolves: CVE-2009-4145 ", "edition": 4, "modified": "2010-02-16T00:00:00", "published": "2010-02-16T00:00:00", "id": "ELSA-2010-0108", "href": "http://linux.oracle.com/errata/ELSA-2010-0108.html", "title": "NetworkManager security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-06T09:26:09", "description": "Updated NetworkManager packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nNetworkManager is a network link manager that attempts to keep a wired\nor wireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "edition": 27, "published": "2010-02-23T00:00:00", "title": "CentOS 5 : NetworkManager (CESA-2010:0108)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2010-02-23T00:00:00", "cpe": ["p-cpe:/a:centos:centos:NetworkManager-glib-devel", "p-cpe:/a:centos:centos:NetworkManager-glib", "p-cpe:/a:centos:centos:NetworkManager-gnome", "cpe:/o:centos:centos:5", "p-cpe:/a:centos:centos:NetworkManager-devel", "p-cpe:/a:centos:centos:NetworkManager"], "id": "CENTOS_RHSA-2010-0108.NASL", "href": "https://www.tenable.com/plugins/nessus/44677", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0108 and \n# CentOS Errata and Security Advisory 2010:0108 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44677);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_xref(name:\"RHSA\", value:\"2010:0108\");\n\n script_name(english:\"CentOS 5 : NetworkManager (CESA-2010:0108)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated NetworkManager packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nNetworkManager is a network link manager that attempts to keep a wired\nor wireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages,\nwhich contain backported patches to correct these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-February/016521.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fa5b110f\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2010-February/016522.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?367d10ee\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected networkmanager packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:NetworkManager-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:NetworkManager-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/02/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"NetworkManager-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"NetworkManager-devel-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"NetworkManager-glib-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"NetworkManager-glib-devel-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"NetworkManager-gnome-0.7.0-9.el5_4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager / NetworkManager-devel / NetworkManager-glib / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:07:06", "description": "This update corrects two security issues, as well as fixes for various\nmobile broadband devices and Fedora system network configuration\nhandling.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2010-02-25T00:00:00", "title": "Fedora 11 : NetworkManager-0.7.2-2.git20091223.fc11 (2009-13642)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2010-02-25T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:11", "p-cpe:/a:fedoraproject:fedora:NetworkManager"], "id": "FEDORA_2009-13642.NASL", "href": "https://www.tenable.com/plugins/nessus/44883", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-13642.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44883);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_xref(name:\"FEDORA\", value:\"2009-13642\");\n\n script_name(english:\"Fedora 11 : NetworkManager-0.7.2-2.git20091223.fc11 (2009-13642)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update corrects two security issues, as well as fixes for various\nmobile broadband devices and Fedora system network configuration\nhandling.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=546117\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=546795\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2010-January/033445.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4f4cc987\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected NetworkManager package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/25\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"NetworkManager-0.7.2-2.git20091223.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T06:57:18", "description": "It was discovered that NetworkManager did not ensure that the\nCertification Authority (CA) certificate file remained present when\nusing WPA Enterprise or 802.1x networks. A remote attacker could use\nthis flaw to spoof the identity of a wireless network and view\nsensitive information. (CVE-2009-4144)\n\nIt was discovered that the connection editor GUI would incorrectly\nexport objects over D-Bus. A local user could read D-Bus signals to\nview other users' network connection passwords and pre-shared keys.\n(CVE-2009-4145).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2013-03-09T00:00:00", "title": "Ubuntu 8.10 / 9.04 : network-manager-applet vulnerabilities (USN-883-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:network-manager-gnome", "cpe:/o:canonical:ubuntu_linux:8.10", "cpe:/o:canonical:ubuntu_linux:9.04"], "id": "UBUNTU_USN-883-1.NASL", "href": "https://www.tenable.com/plugins/nessus/65121", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-883-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65121);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_xref(name:\"USN\", value:\"883-1\");\n\n script_name(english:\"Ubuntu 8.10 / 9.04 : network-manager-applet vulnerabilities (USN-883-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that NetworkManager did not ensure that the\nCertification Authority (CA) certificate file remained present when\nusing WPA Enterprise or 802.1x networks. A remote attacker could use\nthis flaw to spoof the identity of a wireless network and view\nsensitive information. (CVE-2009-4144)\n\nIt was discovered that the connection editor GUI would incorrectly\nexport objects over D-Bus. A local user could read D-Bus signals to\nview other users' network connection passwords and pre-shared keys.\n(CVE-2009-4145).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/883-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected network-manager-gnome package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:network-manager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.10|9\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.10 / 9.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.10\", pkgname:\"network-manager-gnome\", pkgver:\"0.7~~svn20081020t000444-0ubuntu1.8.10.3\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"network-manager-gnome\", pkgver:\"0.7.1~rc4.1-0ubuntu2.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"network-manager-gnome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:04:02", "description": "nm-applet connected to WPA2 Enterprise networks even if the specified\nCA certificate file didn't exist (CVE-2009-4144).\n\nWhen editing connections in nm-applet the connection object was\nexported via DBus disclosing potentially sensitive information to\nlocal users (CVE-2009-4145).", "edition": 25, "published": "2010-02-02T00:00:00", "title": "openSUSE Security Update : NetworkManager-gnome (NetworkManager-gnome-1877)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2010-02-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:NetworkManager-gnome", "cpe:/o:novell:opensuse:11.1"], "id": "SUSE_11_1_NETWORKMANAGER-GNOME-100126.NASL", "href": "https://www.tenable.com/plugins/nessus/44365", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update NetworkManager-gnome-1877.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44365);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n\n script_name(english:\"openSUSE Security Update : NetworkManager-gnome (NetworkManager-gnome-1877)\");\n script_summary(english:\"Check for the NetworkManager-gnome-1877 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"nm-applet connected to WPA2 Enterprise networks even if the specified\nCA certificate file didn't exist (CVE-2009-4144).\n\nWhen editing connections in nm-applet the connection object was\nexported via DBus disclosing potentially sensitive information to\nlocal users (CVE-2009-4145).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=565549\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected NetworkManager-gnome package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"NetworkManager-gnome-0.7.0.r1053-11.2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager-gnome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:44:40", "description": "CVE-2009-4145 NetworkManager: information disclosure by\nnm-connection-editor\n\nCVE-2009-4144 NetworkManager: WPA enterprise network not verified when\ncertificate is removed\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : NetworkManager on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20100216_NETWORKMANAGER_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60734", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60734);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n\n script_name(english:\"Scientific Linux Security Update : NetworkManager on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2009-4145 NetworkManager: information disclosure by\nnm-connection-editor\n\nCVE-2009-4144 NetworkManager: WPA enterprise network not verified when\ncertificate is removed\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1002&L=scientific-linux-errata&T=0&P=1034\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?603268cb\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"NetworkManager-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"NetworkManager-devel-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"NetworkManager-glib-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"NetworkManager-glib-devel-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"NetworkManager-gnome-0.7.0-9.el5_4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:05:33", "description": "nm-applet connected to WPA2 Enterprise networks even if the specified\nCA certificate file didn't exist (CVE-2009-4144).\n\nWhen editing connections in nm-applet the connection object was\nexported via DBus disclosing potentially sensitive information to\nlocal users (CVE-2009-4145).", "edition": 25, "published": "2010-02-02T00:00:00", "title": "openSUSE Security Update : NetworkManager-gnome (NetworkManager-gnome-1877)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2010-02-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:NetworkManager-gnome", "cpe:/o:novell:opensuse:11.2"], "id": "SUSE_11_2_NETWORKMANAGER-GNOME-100126.NASL", "href": "https://www.tenable.com/plugins/nessus/44371", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update NetworkManager-gnome-1877.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44371);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n\n script_name(english:\"openSUSE Security Update : NetworkManager-gnome (NetworkManager-gnome-1877)\");\n script_summary(english:\"Check for the NetworkManager-gnome-1877 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"nm-applet connected to WPA2 Enterprise networks even if the specified\nCA certificate file didn't exist (CVE-2009-4144).\n\nWhen editing connections in nm-applet the connection object was\nexported via DBus disclosing potentially sensitive information to\nlocal users (CVE-2009-4145).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=565549\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected NetworkManager-gnome package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"NetworkManager-gnome-0.7.1-5.4.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager-gnome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:07:28", "description": "Updated NetworkManager packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nNetworkManager is a network link manager that attempts to keep a wired\nor wireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "edition": 27, "published": "2010-02-17T00:00:00", "title": "RHEL 5 : NetworkManager (RHSA-2010:0108)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2010-02-17T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:NetworkManager", "p-cpe:/a:redhat:enterprise_linux:NetworkManager-glib", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:NetworkManager-gnome", "p-cpe:/a:redhat:enterprise_linux:NetworkManager-devel", "cpe:/o:redhat:enterprise_linux:5.4", "p-cpe:/a:redhat:enterprise_linux:NetworkManager-glib-devel"], "id": "REDHAT-RHSA-2010-0108.NASL", "href": "https://www.tenable.com/plugins/nessus/44633", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0108. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44633);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_xref(name:\"RHSA\", value:\"2010:0108\");\n\n script_name(english:\"RHEL 5 : NetworkManager (RHSA-2010:0108)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated NetworkManager packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nNetworkManager is a network link manager that attempts to keep a wired\nor wireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages,\nwhich contain backported patches to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-4144\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-4145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0108\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:NetworkManager-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:NetworkManager-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0108\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"NetworkManager-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"NetworkManager-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"NetworkManager-devel-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"NetworkManager-devel-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"NetworkManager-glib-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"NetworkManager-glib-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"NetworkManager-glib-devel-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"NetworkManager-glib-devel-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"NetworkManager-gnome-0.7.0-9.el5_4\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"NetworkManager-gnome-0.7.0-9.el5_4\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager / NetworkManager-devel / NetworkManager-glib / etc\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T12:44:57", "description": "From Red Hat Security Advisory 2010:0108 :\n\nUpdated NetworkManager packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nNetworkManager is a network link manager that attempts to keep a wired\nor wireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : NetworkManager (ELSA-2010-0108)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:NetworkManager", "p-cpe:/a:oracle:linux:NetworkManager-devel", "p-cpe:/a:oracle:linux:NetworkManager-glib-devel", "p-cpe:/a:oracle:linux:NetworkManager-glib", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:NetworkManager-gnome"], "id": "ORACLELINUX_ELSA-2010-0108.NASL", "href": "https://www.tenable.com/plugins/nessus/67996", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2010:0108 and \n# Oracle Linux Security Advisory ELSA-2010-0108 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67996);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n script_xref(name:\"RHSA\", value:\"2010:0108\");\n\n script_name(english:\"Oracle Linux 5 : NetworkManager (ELSA-2010-0108)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2010:0108 :\n\nUpdated NetworkManager packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nNetworkManager is a network link manager that attempts to keep a wired\nor wireless network connection active at all times.\n\nA missing network certificate verification flaw was found in\nNetworkManager. If a user created a WPA Enterprise or 802.1x wireless\nnetwork connection that was verified using a Certificate Authority\n(CA) certificate, and then later removed that CA certificate file,\nNetworkManager failed to verify the identity of the network on the\nfollowing connection attempts. In these situations, a malicious\nwireless network spoofing the original network could trick a user into\ndisclosing authentication credentials or communicating over an\nuntrusted network. (CVE-2009-4144)\n\nAn information disclosure flaw was found in NetworkManager's\nnm-connection-editor D-Bus interface. If a user edited network\nconnection options using nm-connection-editor, a summary of those\nchanges was broadcasted over the D-Bus message bus, possibly\ndisclosing sensitive information (such as wireless network\nauthentication credentials) to other local users. (CVE-2009-4145)\n\nUsers of NetworkManager should upgrade to these updated packages,\nwhich contain backported patches to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2010-February/001358.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected networkmanager packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:NetworkManager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:NetworkManager-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:NetworkManager-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:NetworkManager-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"NetworkManager-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"NetworkManager-devel-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"NetworkManager-glib-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"NetworkManager-glib-devel-0.7.0-9.el5_4\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"NetworkManager-gnome-0.7.0-9.el5_4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager / NetworkManager-devel / NetworkManager-glib / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:02:57", "description": "nm-applet connected to WPA2 Enterprise networks even if the specified\nCA certificate file didn't exist (CVE-2009-4144).\n\nWhen editing connections in nm-applet the connection object was\nexported via DBus disclosing potentially sensitive information to\nlocal users (CVE-2009-4145).", "edition": 25, "published": "2010-02-02T00:00:00", "title": "openSUSE Security Update : NetworkManager-gnome (NetworkManager-gnome-1877)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "modified": "2010-02-02T00:00:00", "cpe": ["cpe:/o:novell:opensuse:11.0", "p-cpe:/a:novell:opensuse:NetworkManager-gnome"], "id": "SUSE_11_0_NETWORKMANAGER-GNOME-100126.NASL", "href": "https://www.tenable.com/plugins/nessus/44359", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update NetworkManager-gnome-1877.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44359);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2009-4144\", \"CVE-2009-4145\");\n\n script_name(english:\"openSUSE Security Update : NetworkManager-gnome (NetworkManager-gnome-1877)\");\n script_summary(english:\"Check for the NetworkManager-gnome-1877 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"nm-applet connected to WPA2 Enterprise networks even if the specified\nCA certificate file didn't exist (CVE-2009-4144).\n\nWhen editing connections in nm-applet the connection object was\nexported via DBus disclosing potentially sensitive information to\nlocal users (CVE-2009-4145).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=565549\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected NetworkManager-gnome package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:NetworkManager-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"NetworkManager-gnome-0.7.0.r729-7.6\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"NetworkManager-gnome\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-4144", "CVE-2009-4145"], "description": "NetworkManager attempts to keep an active network connection available at a ll times. It is intended only for the desktop use-case, and is not intended f or usage on servers. The point of NetworkManager is to make networking configuration and setup as painless and automatic as possible. If using DH CP, NetworkManager is _intended_ to replace default routes, obtain IP addresses from a DHCP server, and change nameservers whenever it sees fit. ", "modified": "2010-01-02T21:31:41", "published": "2010-01-02T21:31:41", "id": "FEDORA:41FAC10F862", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: NetworkManager-0.7.2-2.git20091223.fc11", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:32", "bulletinFamily": "software", "cvelist": ["CVE-2009-4144", "CVE-2009-0365", "CVE-2009-4145", "CVE-2009-0578"], "description": "Unauthorized access to network connections through dbus, WPA certificate spoofing.", "edition": 1, "modified": "2010-01-17T00:00:00", "published": "2010-01-17T00:00:00", "id": "SECURITYVULNS:VULN:9709", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9709", "title": "Gnome network-manager-applet unauthorized access", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}