Lucene search

K

Debian: Security Advisory (DSA-4072-1)

🗓️ 20 Dec 2017 00:00:00Reported by Copyright (C) 2017 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 48 Views

Debian 'bouncycastle' package(s) update available due to RSA key vulnerabilit

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Debian
[SECURITY] [DSA 4072-1] bouncycastle security update
21 Dec 201722:23
debian
IBM Security Bulletins
Security Bulletin: Vulnerability in Bouncy Castle used by Logstash shipped with IBM Operations Analytics - Log Analysis (CVE-2017-13098)
21 Nov 202208:35
ibm
IBM Security Bulletins
Security Bulletin: IBM Security Guardium is affected by a Public disclosed vulnerability from Bouncy Castle
28 Sep 201804:30
ibm
IBM Security Bulletins
Security Bulletin: Bouncy Castle as used by IBM QRadar SIEM contains multiple vulnerabilities (CVE-2018-1000613, CVE-2017-13098, CVE-2018-1000180)
5 Feb 202119:10
ibm
IBM Security Bulletins
Security Bulletin: IBM Security Guardium Big Data Intelligence is affected by a Using Components with Known Vulnerabilities vulnerability
14 Oct 201916:59
ibm
IBM Security Bulletins
Security Bulletin: Bouncy Castle Vulnerabilities Affect IBM Sterling B2B Integrator
6 Oct 202114:43
ibm
IBM Security Bulletins
Security Bulletin: Multiple Bouncy Castle Vulnerabilities Affect IBM Sterling B2B Integrator
13 Nov 202019:10
ibm
IBM Security Bulletins
Security Bulletin: IBM Sterling File Gateway is vulnerable to multiple issues due to Bouncy Castle
14 Oct 202221:58
ibm
IBM Security Bulletins
Security Bulletin: Resilient is vulnerable to Using Components with Known Vulnerabilities
19 Apr 202121:45
ibm
IBM Security Bulletins
Security Bulletin: Multiple Security Vulnerabilities Impact IBM Predictive Insights
8 Sep 202020:36
ibm
Rows per page
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.704072");
  script_cve_id("CVE-2017-13098");
  script_tag(name:"creation_date", value:"2017-12-20 23:00:00 +0000 (Wed, 20 Dec 2017)");
  script_version("2024-02-02T05:06:06+0000");
  script_tag(name:"last_modification", value:"2024-02-02 05:06:06 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2018-01-04 18:32:05 +0000 (Thu, 04 Jan 2018)");

  script_name("Debian: Security Advisory (DSA-4072-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Debian Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB9");

  script_xref(name:"Advisory-ID", value:"DSA-4072-1");
  script_xref(name:"URL", value:"https://www.debian.org/security/2017/DSA-4072-1");
  script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/DSA-4072");
  script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/bouncycastle");

  script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'bouncycastle' package(s) announced via the DSA-4072-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"Hanno Boeck, Juraj Somorovsky and Craig Young discovered that the TLS implementation in Bouncy Castle is vulnerable to an adaptive chosen ciphertext attack against RSA keys.

For the stable distribution (stretch), this problem has been fixed in version 1.56-1+deb9u1.

We recommend that you upgrade your bouncycastle packages.

For the detailed security status of bouncycastle please refer to its security tracker page at: [link moved to references]");

  script_tag(name:"affected", value:"'bouncycastle' package(s) on Debian 9.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "DEB9") {

  if(!isnull(res = isdpkgvuln(pkg:"libbcmail-java", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcmail-java-doc", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcpg-java", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcpg-java-doc", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcpkix-java", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcpkix-java-doc", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcprov-java", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(!isnull(res = isdpkgvuln(pkg:"libbcprov-java-doc", ver:"1.56-1+deb9u1", rls:"DEB9"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 Dec 2017 00:00Current
6.8Medium risk
Vulners AI Score6.8
CVSS24.3
CVSS35.9 - 7.5
EPSS0.003
48
.json
Report