FreeBSD Ports bugzilla version contains vulnerabilitie
Reporter | Title | Published | Views | Family All 39 |
---|---|---|---|---|
FreeBSD | bugzilla -- multiple vulnerabilities | 26 Jul 201200:00 | – | freebsd |
Tenable Nessus | FreeBSD : bugzilla -- multiple vulnerabilities (58253655-d82c-11e1-907c-20cf30e32f6d) | 30 Jul 201200:00 | – | nessus |
Tenable Nessus | Bugzilla < 3.6.10 / 4.0.7 / 4.2.2 / 4.3.2 Multiple Information Disclosures | 23 Aug 201200:00 | – | nessus |
Tenable Nessus | Fedora 17 : bugzilla-4.0.7-1.fc17 (2012-11364) | 13 Aug 201200:00 | – | nessus |
Tenable Nessus | Fedora 16 : bugzilla-4.0.7-1.fc16 (2012-11324) | 13 Aug 201200:00 | – | nessus |
Tenable Nessus | Mandriva Linux Security Advisory : bugzilla (MDVSA-2013:066) | 20 Apr 201300:00 | – | nessus |
OpenVAS | FreeBSD Ports: bugzilla | 10 Aug 201200:00 | – | openvas |
OpenVAS | Fedora Update for bugzilla FEDORA-2012-11364 | 30 Aug 201200:00 | – | openvas |
OpenVAS | Fedora Update for bugzilla FEDORA-2012-11364 | 30 Aug 201200:00 | – | openvas |
OpenVAS | Fedora Update for bugzilla FEDORA-2012-11324 | 14 Aug 201200:00 | – | openvas |
# SPDX-FileCopyrightText: 2012 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.71514");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_cve_id("CVE-2012-1968", "CVE-2012-1969");
script_version("2023-07-26T05:05:09+0000");
script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
script_tag(name:"creation_date", value:"2012-08-10 03:22:17 -0400 (Fri, 10 Aug 2012)");
script_name("FreeBSD Ports: bugzilla");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 E-Soft Inc.");
script_family("FreeBSD Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdrel");
script_tag(name:"insight", value:"The following package is affected: bugzilla
CVE-2012-1968
Bugzilla 4.1.x and 4.2.x before 4.2.2 and 4.3.x before 4.3.2 uses
bug-editor privileges instead of bugmail-recipient privileges during
construction of HTML bugmail documents, which allows remote attackers
to obtain sensitive description information by reading the tooltip
portions of an HTML e-mail message.
CVE-2012-1969
The get_attachment_link function in Template.pm in Bugzilla 2.x and
3.x before 3.6.10, 3.7.x and 4.0.x before 4.0.7, 4.1.x and 4.2.x
before 4.2.2, and 4.3.x before 4.3.2 does not check whether an
attachment is private before presenting the attachment description
within a public comment, which allows remote attackers to obtain
sensitive description information by reading a comment.");
script_tag(name:"solution", value:"Update your system with the appropriate patches or
software upgrades.");
script_xref(name:"URL", value:"https://bugzilla.mozilla.org/show_bug.cgi?id=777398");
script_xref(name:"URL", value:"https://bugzilla.mozilla.org/show_bug.cgi?id=777586");
script_xref(name:"URL", value:"http://www.vuxml.org/freebsd/58253655-d82c-11e1-907c-20cf30e32f6d.html");
script_tag(name:"summary", value:"The remote host is missing an update to the system
as announced in the referenced advisory.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-bsd.inc");
vuln = FALSE;
txt = "";
bver = portver(pkg:"bugzilla");
if(!isnull(bver) && revcomp(a:bver, b:"3.6.0")>=0 && revcomp(a:bver, b:"3.6.10")<0) {
txt += "Package bugzilla version " + bver + " is installed which is known to be vulnerable.\n";
vuln = TRUE;
}
if(!isnull(bver) && revcomp(a:bver, b:"4.0.0")>=0 && revcomp(a:bver, b:"4.0.7")<0) {
txt += "Package bugzilla version " + bver + " is installed which is known to be vulnerable.\n";
vuln = TRUE;
}
if(!isnull(bver) && revcomp(a:bver, b:"4.2.0")>=0 && revcomp(a:bver, b:"4.2.2")<0) {
txt += "Package bugzilla version " + bver + " is installed which is known to be vulnerable.\n";
vuln = TRUE;
}
if(vuln) {
security_message(data:txt);
} else if (__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo