Lucene search

K

RedHat Update for frysk RHSA-2011:1327-01

🗓️ 23 Sep 2011 00:00:00Reported by Copyright (C) 2011 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 23 Views

The remote host is missing an update for the 'frysk' package(s) announced via the referenced advisory. The 'frysk' package on Red Hat Enterprise Linux AS version 4, Red Hat Enterprise Linux ES version 4, Red Hat Enterprise Linux WS version 4 is affected by a buffer overflow flaw in HarfBuzz, which could allow an attacker to execute arbitrary code or crash the application

Show more
Related
Refs
Code
# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2011-September/msg00039.html");
  script_oid("1.3.6.1.4.1.25623.1.0.870488");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_version("2024-03-21T05:06:54+0000");
  script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
  script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
  script_xref(name:"RHSA", value:"2011:1327-01");
  script_cve_id("CVE-2011-3193");
  script_name("RedHat Update for frysk RHSA-2011:1327-01");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'frysk'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("Red Hat Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_4");
  script_tag(name:"affected", value:"frysk on Red Hat Enterprise Linux AS version 4,
  Red Hat Enterprise Linux ES version 4,
  Red Hat Enterprise Linux WS version 4");
  script_tag(name:"solution", value:"Please Install the Updated Packages.");
  script_tag(name:"insight", value:"frysk is an execution-analysis technology implemented using native Java and
  C++. It provides developers and system administrators with the ability to
  examine and analyze multi-host, multi-process, and multithreaded systems
  while they are running. frysk is released as a Technology Preview for Red
  Hat Enterprise Linux 4.

  A buffer overflow flaw was found in HarfBuzz, an OpenType text shaping
  engine used in the embedded Pango library. If a frysk application were used
  to debug or trace a process that uses HarfBuzz while it loaded a
  specially-crafted font file, it could cause the application to crash or,
  possibly, execute arbitrary code with the privileges of the user running
  the application. (CVE-2011-3193)

  Users of frysk are advised to upgrade to this updated package, which
  contains a backported patch to correct this issue. All running frysk
  applications must be restarted for this update to take effect.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release) exit(0);

res = "";

if(release == "RHENT_4")
{

  if ((res = isrpmvuln(pkg:"frysk", rpm:"frysk~0.0.1.2007.08.03~8.el4", rls:"RHENT_4")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"frysk-debuginfo", rpm:"frysk-debuginfo~0.0.1.2007.08.03~8.el4", rls:"RHENT_4")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Sep 2011 00:00Current
6.5Medium risk
Vulners AI Score6.5
CVSS29.3
EPSS0.116
23
.json
Report