This update for curl fixes the following issues: curl was updated to version 7.37.0 (fate#325339 bsc#1084137) This update syncs the curl version to the one in SUSE Linux Enterprise 12 and is full binary compatible to the previous version. This update is done to allow other third-party software like ‘R’ to be able to be used on the SUSE Linux Enterprise 11 codebase. Following security issues were fixed :
CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532). The package also requires a libopenssl that implements the DEFAULT_SUSE cipher list (bsc#1081056, bsc#1083463,bsc#1086825)
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2018:1323-1.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(109890);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2018-1000120", "CVE-2018-1000121", "CVE-2018-1000122");
script_name(english:"SUSE SLES11 Security Update : curl (SUSE-SU-2018:1323-1)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote SUSE host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"This update for curl fixes the following issues: curl was updated to
version 7.37.0 (fate#325339 bsc#1084137) This update syncs the curl
version to the one in SUSE Linux Enterprise 12 and is full binary
compatible to the previous version. This update is done to allow other
third-party software like 'R' to be able to be used on the SUSE Linux
Enterprise 11 codebase. Following security issues were fixed :
- CVE-2018-1000120: A buffer overflow exists in the FTP
URL handling that allowed an attacker to cause a denial
of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in
the LDAP code that allowed an attacker to cause a denial
of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the
RTSP+RTP handling code that allowed an attacker to cause
a denial of service or information leakage
(bsc#1084532). The package also requires a libopenssl
that implements the DEFAULT_SUSE cipher list
(bsc#1081056, bsc#1083463,bsc#1086825)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1081056"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1083463"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1084137"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1084521"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1084524"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1084532"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1085124"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1086825"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1087922"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.suse.com/show_bug.cgi?id=1090194"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-1000120/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-1000121/"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.suse.com/security/cve/CVE-2018-1000122/"
);
# https://www.suse.com/support/update/announcement/2018/suse-su-20181323-1/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?db65cc36"
);
script_set_attribute(
attribute:"solution",
value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t
patch sdksp4-curl-13609=1
SUSE Linux Enterprise Server 11-SP4:zypper in -t patch
slessp4-curl-13609=1
SUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch
slessp3-curl-13609=1
SUSE Linux Enterprise Server 11-SECURITY:zypper in -t patch
secsp3-curl-13609=1
SUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch
sleposp3-curl-13609=1
SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch
dbgsp4-curl-13609=1
SUSE Linux Enterprise Debuginfo 11-SP3:zypper in -t patch
dbgsp3-curl-13609=1"
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:curl");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcurl4");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/03/14");
script_set_attribute(attribute:"patch_publication_date", value:"2018/05/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/05/17");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES11)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES11", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES11" && (! preg(pattern:"^(3|4)$", string:sp))) audit(AUDIT_OS_NOT, "SLES11 SP3/4", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES11", sp:"4", cpu:"x86_64", reference:"libcurl4-32bit-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", cpu:"s390x", reference:"libcurl4-32bit-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"curl-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"4", reference:"libcurl4-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"x86_64", reference:"libcurl4-32bit-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"3", cpu:"s390x", reference:"libcurl4-32bit-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"curl-7.37.0-70.27.1")) flag++;
if (rpm_check(release:"SLES11", sp:"3", reference:"libcurl4-7.37.0-70.27.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "curl");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | curl | p-cpe:/a:novell:suse_linux:curl |
novell | suse_linux | libcurl4 | p-cpe:/a:novell:suse_linux:libcurl4 |
novell | suse_linux | 11 | cpe:/o:novell:suse_linux:11 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
www.nessus.org/u?db65cc36
bugzilla.suse.com/show_bug.cgi?id=1081056
bugzilla.suse.com/show_bug.cgi?id=1083463
bugzilla.suse.com/show_bug.cgi?id=1084137
bugzilla.suse.com/show_bug.cgi?id=1084521
bugzilla.suse.com/show_bug.cgi?id=1084524
bugzilla.suse.com/show_bug.cgi?id=1084532
bugzilla.suse.com/show_bug.cgi?id=1085124
bugzilla.suse.com/show_bug.cgi?id=1086825
bugzilla.suse.com/show_bug.cgi?id=1087922
bugzilla.suse.com/show_bug.cgi?id=1090194
www.suse.com/security/cve/CVE-2018-1000120/
www.suse.com/security/cve/CVE-2018-1000121/
www.suse.com/security/cve/CVE-2018-1000122/