SuSE 10 Security Update : net-snmp (ZYPP Patch Number 6248)

2009-09-24T00:00:00
ID SUSE_NET-SNMP-6248.NASL
Type nessus
Reporter Tenable
Modified 2012-05-17T00:00:00

Description

With this update of net-snmp the handling of TCP wrappers rules for client authorization was improved, prior to this update it was possible for remote attackers to bypass intended access restrictions and execute SNMP queries. (CVE-2008-6123) Additionally binding to multiple interfaces was improved.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#
# The text description of this plugin is (C) Novell, Inc.
#

include("compat.inc");

if (description)
{
  script_id(41562);
  script_version ("$Revision: 1.8 $");
  script_cvs_date("$Date: 2012/05/17 11:20:15 $");

  script_cve_id("CVE-2008-6123");

  script_name(english:"SuSE 10 Security Update : net-snmp (ZYPP Patch Number 6248)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote SuSE 10 host is missing a security-related patch."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"With this update of net-snmp the handling of TCP wrappers rules for
client authorization was improved, prior to this update it was
possible for remote attackers to bypass intended access restrictions
and execute SNMP queries. (CVE-2008-6123) Additionally binding to
multiple interfaces was improved."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://support.novell.com/security/cve/CVE-2008-6123.html"
  );
  script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 6248.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_cwe_id(20);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2009/05/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/24");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2009-2012 Tenable Network Security, Inc.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");

  exit(0);
}


include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");


flag = 0;
if (rpm_check(release:"SLED10", sp:2, reference:"net-snmp-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLED10", sp:2, reference:"net-snmp-devel-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLED10", sp:2, reference:"perl-SNMP-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLED10", sp:2, cpu:"x86_64", reference:"net-snmp-32bit-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLES10", sp:2, reference:"net-snmp-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLES10", sp:2, reference:"net-snmp-devel-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLES10", sp:2, reference:"perl-SNMP-5.3.0.1-25.31")) flag++;
if (rpm_check(release:"SLES10", sp:2, cpu:"x86_64", reference:"net-snmp-32bit-5.3.0.1-25.31")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else exit(0, "The host is not affected.");