Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310827960
HistoryJul 26, 2023 - 12:00 a.m.

Fedora: Security Advisory for grpc (FEDORA-2023-15b3e80753)

2023-07-2600:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
fedora
security advisory
grpc
vulnerability
update
vendorfix
grpc
high performance rpc
microservices architecture
mobile devices

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.9%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.827960");
  script_version("2023-10-12T05:05:32+0000");
  script_cve_id("CVE-2023-32732");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"last_modification", value:"2023-10-12 05:05:32 +0000 (Thu, 12 Oct 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-06-15 22:14:00 +0000 (Thu, 15 Jun 2023)");
  script_tag(name:"creation_date", value:"2023-07-26 01:13:19 +0000 (Wed, 26 Jul 2023)");
  script_name("Fedora: Security Advisory for grpc (FEDORA-2023-15b3e80753)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Fedora Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC38");

  script_xref(name:"Advisory-ID", value:"FEDORA-2023-15b3e80753");
  script_xref(name:"URL", value:"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'grpc'
  package(s) announced via the FEDORA-2023-15b3e80753 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"gRPC is a modern open source high performance RPC framework that can run in any
environment. It can efficiently connect services in and across data centers
with pluggable support for load balancing, tracing, health checking and
authentication. It is also applicable in last mile of distributed computing to
connect devices, mobile applications and browsers to backend services.

The main usage scenarios:

   Efficiently connecting polyglot services in microservices style
    architecture
   Connecting mobile devices, browser clients to backend services
   Generating efficient client libraries

Core Features that make it awesome:

   Idiomatic client libraries in 10 languages
   Highly efficient on wire and with a simple service definition framework
   Bi-directional streaming with http/2 based transport
   Pluggable auth, tracing, load balancing and health checking

This package provides the shared C core library.");

  script_tag(name:"affected", value:"'grpc' package(s) on Fedora 38.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "FC38") {

  if(!isnull(res = isrpmvuln(pkg:"grpc", rpm:"grpc~1.48.4~8.fc38", rls:"FC38"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.9%