Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_SIEMENS_CVE-2018-25032.NASL
HistoryApr 11, 2023 - 12:00 a.m.

Siemens SCALANCE Third-Party Out-of-bounds Write (CVE-2018-25032)

2023-04-1100:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

8 High

AI Score

Confidence

High

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501019);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/04");

  script_cve_id("CVE-2018-25032");
  script_xref(name:"DSA", value:"DSA-5111");
  script_xref(name:"FEDORA", value:"FEDORA-2022-413a80a102");
  script_xref(name:"FEDORA", value:"FEDORA-2022-dbd2935e44");
  script_xref(name:"FEDORA", value:"FEDORA-2022-12b89e2aad");
  script_xref(name:"FEDORA", value:"FEDORA-2022-61cf1c64f6");
  script_xref(name:"FEDORA", value:"FEDORA-2022-3a92250fd5");
  script_xref(name:"FEDORA", value:"FEDORA-2022-b58a85e167");
  script_xref(name:"GLSA", value:"GLSA-202210-42");

  script_name(english:"Siemens SCALANCE Third-Party Out-of-bounds Write (CVE-2018-25032)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"zlib before 1.2.12 allows memory corruption when deflating (i.e., when
compressing) if the input has many distant matches.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2022/May/33");
  script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2022/May/35");
  script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2022/May/38");
  # https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?38a1dd68");
  # https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?448287a6");
  # https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?45af3c73");
  # https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?619f7bb2");
  # https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f678acee");
  script_set_attribute(attribute:"see_also", value:"http://www.openwall.com/lists/oss-security/2022/03/25/2");
  script_set_attribute(attribute:"see_also", value:"http://www.openwall.com/lists/oss-security/2022/03/26/1");
  script_set_attribute(attribute:"see_also", value:"https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf");
  script_set_attribute(attribute:"see_also", value:"https://github.com/madler/zlib/compare/v1.2.11...v1.2.12");
  script_set_attribute(attribute:"see_also", value:"https://github.com/madler/zlib/issues/605");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html");
  script_set_attribute(attribute:"see_also", value:"https://security.gentoo.org/glsa/202210-42");
  script_set_attribute(attribute:"see_also", value:"https://security.netapp.com/advisory/ntap-20220526-0009/");
  script_set_attribute(attribute:"see_also", value:"https://security.netapp.com/advisory/ntap-20220729-0004/");
  script_set_attribute(attribute:"see_also", value:"https://support.apple.com/kb/HT213255");
  script_set_attribute(attribute:"see_also", value:"https://support.apple.com/kb/HT213256");
  script_set_attribute(attribute:"see_also", value:"https://support.apple.com/kb/HT213257");
  script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2022/dsa-5111");
  script_set_attribute(attribute:"see_also", value:"https://www.openwall.com/lists/oss-security/2022/03/24/1");
  script_set_attribute(attribute:"see_also", value:"https://www.openwall.com/lists/oss-security/2022/03/28/1");
  script_set_attribute(attribute:"see_also", value:"https://www.openwall.com/lists/oss-security/2022/03/28/3");
  script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpujul2022.html");
  # https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?99e9bba5");
  # https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b940b278");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-25032");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(787);

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/03/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/03/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/04/11");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:scalance_sc622-2c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:scalance_sc626-2c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:scalance_sc632-2c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:scalance_sc636-2c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:scalance_sc642-2c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:scalance_sc646-2c_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Siemens");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Siemens');

var asset = tenable_ot::assets::get(vendor:'Siemens');

var vuln_cpes = {
    "cpe:/o:siemens:scalance_sc622-2c_firmware" :
        {"versionEndExcluding" : "3.0", "family" : "SCALANCES"},
    "cpe:/o:siemens:scalance_sc626-2c_firmware" :
        {"versionEndExcluding" : "3.0", "family" : "SCALANCES"},
    "cpe:/o:siemens:scalance_sc632-2c_firmware" :
        {"versionEndExcluding" : "3.0", "family" : "SCALANCES"},
    "cpe:/o:siemens:scalance_sc636-2c_firmware" :
        {"versionEndExcluding" : "3.0", "family" : "SCALANCES"},
    "cpe:/o:siemens:scalance_sc642-2c_firmware" :
        {"versionEndExcluding" : "3.0", "family" : "SCALANCES"},
    "cpe:/o:siemens:scalance_sc646-2c_firmware" :
        {"versionEndExcluding" : "3.0", "family" : "SCALANCES"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
VendorProductVersionCPE
siemensscalance_sc622-2c_firmwarecpe:/o:siemens:scalance_sc622-2c_firmware
siemensscalance_sc626-2c_firmwarecpe:/o:siemens:scalance_sc626-2c_firmware
siemensscalance_sc632-2c_firmwarecpe:/o:siemens:scalance_sc632-2c_firmware
siemensscalance_sc636-2c_firmwarecpe:/o:siemens:scalance_sc636-2c_firmware
siemensscalance_sc642-2c_firmwarecpe:/o:siemens:scalance_sc642-2c_firmware
siemensscalance_sc646-2c_firmwarecpe:/o:siemens:scalance_sc646-2c_firmware

References