The remote host is missing an update for the 'liblouis' package(s) announced via the USN-3782-1 advisory. It was discovered that Liblouis incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. It was also discovered that Liblouis incorrectly handled certain files, possibly causing a denial of service. This issue only affected Ubuntu 18.04 LTS
Reporter | Title | Published | Views | Family All 64 |
---|---|---|---|---|
OpenVAS | Fedora Update for liblouis FEDORA-2018-70fac49405 | 8 Oct 201800:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2019:13994-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2020:3107-1) | 19 Apr 202100:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for liblouis (openSUSE-SU-2019:1160-1) | 6 Apr 201900:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2019:0795-1) | 9 Jun 202100:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2018:2780-1) | 19 Apr 202100:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for liblouis (openSUSE-SU-2018:2819-1) | 25 Sep 201800:00 | – | openvas |
OpenVAS | Fedora Update for liblouis FEDORA-2018-9a09435935 | 8 Oct 201800:00 | – | openvas |
Fedora | [SECURITY] Fedora 28 Update: liblouis-2.6.2-16.fc28 | 7 Oct 201822:16 | – | fedora |
Fedora | [SECURITY] Fedora 29 Update: liblouis-3.7.0-1.fc29 | 2 Oct 201819:36 | – | fedora |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/notices/USN-3782-1 |
# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.843671");
script_cve_id("CVE-2018-12085", "CVE-2018-17294");
script_tag(name:"creation_date", value:"2018-10-26 04:05:08 +0000 (Fri, 26 Oct 2018)");
script_version("2024-02-02T05:06:06+0000");
script_tag(name:"last_modification", value:"2024-02-02 05:06:06 +0000 (Fri, 02 Feb 2024)");
script_tag(name:"cvss_base", value:"6.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2018-06-25 20:26:18 +0000 (Mon, 25 Jun 2018)");
script_name("Ubuntu: Security Advisory (USN-3782-1)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone AG");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(14\.04\ LTS|16\.04\ LTS|18\.04\ LTS)");
script_xref(name:"Advisory-ID", value:"USN-3782-1");
script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-3782-1");
script_tag(name:"summary", value:"The remote host is missing an update for the 'liblouis' package(s) announced via the USN-3782-1 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"Henri Salo discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2018-12085)
It was discovered that Liblouis incorrectly handled certain files.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17294)");
script_tag(name:"affected", value:"'liblouis' package(s) on Ubuntu 14.04, Ubuntu 16.04, Ubuntu 18.04.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "UBUNTU14.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"liblouis-bin", ver:"2.5.3-2ubuntu1.5", rls:"UBUNTU14.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"liblouis2", ver:"2.5.3-2ubuntu1.5", rls:"UBUNTU14.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU16.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"liblouis-bin", ver:"2.6.4-2ubuntu0.4", rls:"UBUNTU16.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"liblouis9", ver:"2.6.4-2ubuntu0.4", rls:"UBUNTU16.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "UBUNTU18.04 LTS") {
if(!isnull(res = isdpkgvuln(pkg:"liblouis-bin", ver:"3.5.0-1ubuntu0.3", rls:"UBUNTU18.04 LTS"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"liblouis14", ver:"3.5.0-1ubuntu0.3", rls:"UBUNTU18.04 LTS"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo