The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:2806-1 advisory.
An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c. (CVE-2020-13987)
An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
(CVE-2020-13988)
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c. (CVE-2020-17437)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable, Inc.
#
# The package checks in this plugin were extracted from
# SUSE update advisory SUSE-SU-2022:2806-1. The text itself
# is copyright (C) SUSE.
##
include('compat.inc');
if (description)
{
script_id(164140);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/14");
script_cve_id("CVE-2020-13987", "CVE-2020-13988", "CVE-2020-17437");
script_xref(name:"SuSE", value:"SUSE-SU-2022:2806-1");
script_xref(name:"CEA-ID", value:"CEA-2020-0139");
script_name(english:"SUSE SLES12 Security Update : open-iscsi (SUSE-SU-2022:2806-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in
the SUSE-SU-2022:2806-1 advisory.
- An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP
TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in
net/ipv4/uip.c. (CVE-2020-13987)
- An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack
component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
(CVE-2020-13988)
- An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set
in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the
value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the
offset at which the normal data should be present in the global buffer. However, the length of this offset
is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to
memory that is way beyond the data buffer in uip_process in uip.c. (CVE-2020-17437)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/1179908");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-13987");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-13988");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2020-17437");
# https://lists.suse.com/pipermail/sle-security-updates/2022-August/011912.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?035ef330");
script_set_attribute(attribute:"solution", value:
"Update the affected iscsiuio, libopeniscsiusr0_2_0 and / or open-iscsi packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-17437");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/12/11");
script_set_attribute(attribute:"patch_publication_date", value:"2022/08/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/08/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:iscsiuio");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libopeniscsiusr0_2_0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:open-iscsi");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include('rpm.inc');
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item("Host/SuSE/release");
if (isnull(os_release) || os_release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
var os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'SUSE');
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, 'SUSE SLES12', 'SUSE (' + os_ver + ')');
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'SUSE (' + os_ver + ')', cpu);
var service_pack = get_kb_item("Host/SuSE/patchlevel");
if (isnull(service_pack)) service_pack = "0";
if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:service_pack))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + service_pack);
var pkgs = [
{'reference':'iscsiuio-0.7.8.2-53.34.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.3']},
{'reference':'libopeniscsiusr0_2_0-2.0.876-53.34.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.3']},
{'reference':'open-iscsi-2.0.876-53.34.1', 'sp':'3', 'cpu':'x86_64', 'release':'SLES12', 'rpm_spec_vers_cmp':TRUE, 'exists_check':['sles-release-12.3']}
];
var ltss_caveat_required = FALSE;
var flag = 0;
foreach var package_array ( pkgs ) {
var reference = NULL;
var _release = NULL;
var sp = NULL;
var _cpu = NULL;
var exists_check = NULL;
var rpm_spec_vers_cmp = NULL;
if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
if (!empty_or_null(package_array['release'])) _release = package_array['release'];
if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];
if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
if (reference && _release) {
if (exists_check) {
var check_flag = 0;
foreach var check (exists_check) {
if (!rpm_exists(release:_release, rpm:check)) continue;
check_flag++;
}
if (!check_flag) continue;
}
if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'iscsiuio / libopeniscsiusr0_2_0 / open-iscsi');
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | iscsiuio | p-cpe:/a:novell:suse_linux:iscsiuio |
novell | suse_linux | libopeniscsiusr0_2_0 | p-cpe:/a:novell:suse_linux:libopeniscsiusr0_2_0 |
novell | suse_linux | open-iscsi | p-cpe:/a:novell:suse_linux:open-iscsi |
novell | suse_linux | 12 | cpe:/o:novell:suse_linux:12 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437
www.nessus.org/u?035ef330
bugzilla.suse.com/1179908
www.suse.com/security/cve/CVE-2020-13987
www.suse.com/security/cve/CVE-2020-13988
www.suse.com/security/cve/CVE-2020-17437