CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
94.7%
This update of curl fixes several security issues :
libcurl URL decode buffer boundary flaw. (bnc#824517 / CVE-2013-2174)
cookie domain tailmatch. (bnc#814655 / CVE-2013-1944)
curl sets SSL_OP_ALL. (bnc#742306 / CVE-2011-3389)
When SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier. (CVE-2010-4180)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The text description of this plugin is (C) Novell, Inc.
#
if (NASL_LEVEL < 3000) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(67223);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");
script_cve_id(
"CVE-2010-4180",
"CVE-2011-3389",
"CVE-2013-1944",
"CVE-2013-2174"
);
script_xref(name:"CEA-ID", value:"CEA-2019-0547");
script_name(english:"SuSE 10 Security Update : libcurl4 (ZYPP Patch Number 8618) (BEAST)");
script_set_attribute(attribute:"synopsis", value:
"The remote SuSE 10 host is missing a security-related patch.");
script_set_attribute(attribute:"description", value:
"This update of curl fixes several security issues :
- libcurl URL decode buffer boundary flaw. (bnc#824517 /
CVE-2013-2174)
- cookie domain tailmatch. (bnc#814655 / CVE-2013-1944)
- curl sets SSL_OP_ALL. (bnc#742306 / CVE-2011-3389)
- When SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled,
does not properly prevent modification of the
ciphersuite in the session cache, which allows remote
attackers to force the downgrade to an unintended cipher
via vectors involving sniffing network traffic to
discover a session identifier. (CVE-2010-4180)");
script_set_attribute(attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2010-4180.html");
script_set_attribute(attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2011-3389.html");
script_set_attribute(attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2013-1944.html");
script_set_attribute(attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2013-2174.html");
script_set_attribute(attribute:"solution", value:
"Apply ZYPP patch number 8618.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/12/06");
script_set_attribute(attribute:"patch_publication_date", value:"2013/06/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2013-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
flag = 0;
if (rpm_check(release:"SLED10", sp:4, cpu:"i586", reference:"libcurl4-7.19.0-11.6.1")) flag++;
if (rpm_check(release:"SLED10", sp:4, cpu:"x86_64", reference:"libcurl4-32bit-7.19.0-11.6.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else exit(0, "The host is not affected.");
Vendor | Product | Version | CPE |
---|---|---|---|
suse | suse_linux | cpe:/o:suse:suse_linux |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
support.novell.com/security/cve/CVE-2010-4180.html
support.novell.com/security/cve/CVE-2011-3389.html
support.novell.com/security/cve/CVE-2013-1944.html
support.novell.com/security/cve/CVE-2013-2174.html