ID OPENVAS:1361412562310871078 Type openvas Reporter Copyright (C) 2013 Greenbone Networks GmbH Modified 2018-11-23T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# RedHat Update for 389-ds-base RHSA-2013:1752-01
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.871078");
script_version("$Revision: 12497 $");
script_tag(name:"last_modification", value:"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $");
script_tag(name:"creation_date", value:"2013-11-21 10:44:09 +0530 (Thu, 21 Nov 2013)");
script_cve_id("CVE-2013-4485");
script_tag(name:"cvss_base", value:"4.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:N/A:P");
script_name("RedHat Update for 389-ds-base RHSA-2013:1752-01");
script_tag(name:"affected", value:"389-ds-base on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)");
script_tag(name:"insight", value:"The 389 Directory Server is an LDAPv3 compliant server. The base packages
include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
It was discovered that the 389 Directory Server did not properly handle
certain Get Effective Rights (GER) search queries when the attribute list,
which is a part of the query, included several names using the '@'
character. An attacker able to submit search queries to the 389 Directory
Server could cause it to crash. (CVE-2013-4485)
All 389-ds-base users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, the 389 server service will be restarted automatically.");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"RHSA", value:"2013:1752-01");
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2013-November/msg00036.html");
script_tag(name:"summary", value:"The remote host is missing an update for the '389-ds-base'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2013 Greenbone Networks GmbH");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"389-ds-base", rpm:"389-ds-base~1.2.11.15~30.el6_5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"389-ds-base-debuginfo", rpm:"389-ds-base-debuginfo~1.2.11.15~30.el6_5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"389-ds-base-libs", rpm:"389-ds-base-libs~1.2.11.15~30.el6_5", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310871078", "type": "openvas", "bulletinFamily": "scanner", "title": "RedHat Update for 389-ds-base RHSA-2013:1752-01", "description": "The remote host is missing an update for the ", "published": "2013-11-21T00:00:00", "modified": "2018-11-23T00:00:00", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871078", "reporter": "Copyright (C) 2013 Greenbone Networks GmbH", "references": ["https://www.redhat.com/archives/rhsa-announce/2013-November/msg00036.html", "2013:1752-01"], "cvelist": ["CVE-2013-4485"], "lastseen": "2019-05-29T18:38:28", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2013-4485"]}, {"type": "nessus", "idList": ["FEDORA_2013-22139.NASL", "SL_20131121_389_DS_BASE_ON_SL6_X.NASL", "REDHAT-RHSA-2013-1753.NASL", "REDHAT-RHSA-2013-1752.NASL", "ALA_ALAS-2013-255.NASL", "ORACLELINUX_ELSA-2013-1752.NASL", "CENTOS_RHSA-2013-1752.NASL", "FEDORA_2013-21875.NASL", "FEDORA_2013-22012.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310120548", "OPENVAS:1361412562310867241", "OPENVAS:1361412562310867594", "OPENVAS:1361412562310123519", "OPENVAS:871078", "OPENVAS:867098", "OPENVAS:1361412562310867098", "OPENVAS:867594", "OPENVAS:867241"]}, {"type": "redhat", "idList": ["RHSA-2013:1753", "RHSA-2013:1752"]}, {"type": "centos", "idList": ["CESA-2013:1752"]}, {"type": "amazon", "idList": ["ALAS-2013-255"]}, {"type": "oraclelinux", "idList": ["ELSA-2013-1752"]}], "modified": "2019-05-29T18:38:28", "rev": 2}, "score": {"value": 5.9, "vector": "NONE", "modified": "2019-05-29T18:38:28", "rev": 2}, "vulnersScore": 5.9}, "pluginID": "1361412562310871078", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for 389-ds-base RHSA-2013:1752-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871078\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-11-21 10:44:09 +0530 (Thu, 21 Nov 2013)\");\n script_cve_id(\"CVE-2013-4485\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_name(\"RedHat Update for 389-ds-base RHSA-2013:1752-01\");\n\n\n script_tag(name:\"affected\", value:\"389-ds-base on Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"insight\", value:\"The 389 Directory Server is an LDAPv3 compliant server. The base packages\ninclude the Lightweight Directory Access Protocol (LDAP) server and\ncommand-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly handle\ncertain Get Effective Rights (GER) search queries when the attribute list,\nwhich is a part of the query, included several names using the '@'\ncharacter. An attacker able to submit search queries to the 389 Directory\nServer could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, the 389 server service will be restarted automatically.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"RHSA\", value:\"2013:1752-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2013-November/msg00036.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the '389-ds-base'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.2.11.15~30.el6_5\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"389-ds-base-debuginfo\", rpm:\"389-ds-base-debuginfo~1.2.11.15~30.el6_5\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"389-ds-base-libs\", rpm:\"389-ds-base-libs~1.2.11.15~30.el6_5\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Red Hat Local Security Checks", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T06:06:56", "description": "389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.", "edition": 6, "cvss3": {}, "published": "2013-11-23T11:55:00", "title": "CVE-2013-4485", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-4485"], "modified": "2019-04-22T17:48:00", "cpe": ["cpe:/a:fedoraproject:389_directory_server:1.2.11.15", "cpe:/a:redhat:directory_server:8.2", "cpe:/a:redhat:directory_server:7.1", "cpe:/a:redhat:directory_server:8.1", "cpe:/o:redhat:enterprise_linux:6.0", "cpe:/a:redhat:directory_server:8.0"], "id": "CVE-2013-4485", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4485", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:fedoraproject:389_directory_server:1.2.11.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:directory_server:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:directory_server:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:directory_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:directory_server:8.1:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-03-17T23:01:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120548", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120548", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2013-255)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120548\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:29:21 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2013-255)\");\n script_tag(name:\"insight\", value:\"It was discovered that the 389 Directory Server did not properly handle certain Get Effective Rights (GER) search queries when the attribute list, which is a part of the query, included several names using the '@' character. An attacker able to submit search queries to the 389 Directory Server could cause it to crash.\");\n script_tag(name:\"solution\", value:\"Run yum update 389-ds-base to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2013-255.html\");\n script_cve_id(\"CVE-2013-4485\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"389-ds-base-devel\", rpm:\"389-ds-base-devel~1.3.1.16~1.8.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"389-ds-base-libs\", rpm:\"389-ds-base-libs~1.3.1.16~1.8.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.1.16~1.8.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"389-ds-base-debuginfo\", rpm:\"389-ds-base-debuginfo~1.3.1.16~1.8.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2018-01-18T11:08:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "description": "Check for the Version of 389-ds-base", "modified": "2018-01-17T00:00:00", "published": "2013-11-21T00:00:00", "id": "OPENVAS:871078", "href": "http://plugins.openvas.org/nasl.php?oid=871078", "type": "openvas", "title": "RedHat Update for 389-ds-base RHSA-2013:1752-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for 389-ds-base RHSA-2013:1752-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(871078);\n script_version(\"$Revision: 8448 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:18:06 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-11-21 10:44:09 +0530 (Thu, 21 Nov 2013)\");\n script_cve_id(\"CVE-2013-4485\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_name(\"RedHat Update for 389-ds-base RHSA-2013:1752-01\");\n\n tag_insight = \"The 389 Directory Server is an LDAPv3 compliant server. The base packages\ninclude the Lightweight Directory Access Protocol (LDAP) server and\ncommand-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly handle\ncertain Get Effective Rights (GER) search queries when the attribute list,\nwhich is a part of the query, included several names using the '@'\ncharacter. An attacker able to submit search queries to the 389 Directory\nServer could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, the 389 server service will be restarted automatically.\n\";\n\n tag_affected = \"389-ds-base on Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"RHSA\", value: \"2013:1752-01\");\n script_xref(name: \"URL\" , value: \"https://www.redhat.com/archives/rhsa-announce/2013-November/msg00036.html\");\n script_tag(name: \"summary\" , value: \"Check for the Version of 389-ds-base\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.2.11.15~30.el6_5\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"389-ds-base-debuginfo\", rpm:\"389-ds-base-debuginfo~1.2.11.15~30.el6_5\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"389-ds-base-libs\", rpm:\"389-ds-base-libs~1.2.11.15~30.el6_5\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "description": "Oracle Linux Local Security Checks ELSA-2013-1752", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310123519", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123519", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2013-1752", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2013-1752.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123519\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:04:58 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2013-1752\");\n script_tag(name:\"insight\", value:\"ELSA-2013-1752 - 389-ds-base security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2013-1752\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2013-1752.html\");\n script_cve_id(\"CVE-2013-4485\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.2.11.15~30.el6_5\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"389-ds-base-devel\", rpm:\"389-ds-base-devel~1.2.11.15~30.el6_5\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"389-ds-base-libs\", rpm:\"389-ds-base-libs~1.2.11.15~30.el6_5\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2017-07-25T10:52:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485", "CVE-2013-2219", "CVE-2013-4283"], "description": "Check for the Version of 389-ds-base", "modified": "2017-07-10T00:00:00", "published": "2013-12-04T00:00:00", "id": "OPENVAS:867098", "href": "http://plugins.openvas.org/nasl.php?oid=867098", "type": "openvas", "title": "Fedora Update for 389-ds-base FEDORA-2013-22012", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for 389-ds-base FEDORA-2013-22012\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867098);\n script_version(\"$Revision: 6628 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:32:47 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-12-04 10:03:32 +0530 (Wed, 04 Dec 2013)\");\n script_cve_id(\"CVE-2013-4485\", \"CVE-2013-4283\", \"CVE-2013-2219\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for 389-ds-base FEDORA-2013-22012\");\n\n tag_insight = \"389 Directory Server is an LDAPv3 compliant server. The base package includes\nthe LDAP server and command line utilities for server administration.\n\";\n\n tag_affected = \"389-ds-base on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2013-22012\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-December/123036.html\");\n script_summary(\"Check for the Version of 389-ds-base\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.1.16~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485", "CVE-2013-2219", "CVE-2013-4283"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-12-04T00:00:00", "id": "OPENVAS:1361412562310867098", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867098", "type": "openvas", "title": "Fedora Update for 389-ds-base FEDORA-2013-22012", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for 389-ds-base FEDORA-2013-22012\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867098\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-12-04 10:03:32 +0530 (Wed, 04 Dec 2013)\");\n script_cve_id(\"CVE-2013-4485\", \"CVE-2013-4283\", \"CVE-2013-2219\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for 389-ds-base FEDORA-2013-22012\");\n\n\n script_tag(name:\"affected\", value:\"389-ds-base on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2013-22012\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2013-December/123036.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the '389-ds-base'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.1.16~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-25T10:48:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485", "CVE-2013-2219", "CVE-2013-4283", "CVE-2014-0132"], "description": "Check for the Version of 389-ds-base", "modified": "2017-07-10T00:00:00", "published": "2014-03-17T00:00:00", "id": "OPENVAS:867594", "href": "http://plugins.openvas.org/nasl.php?oid=867594", "type": "openvas", "title": "Fedora Update for 389-ds-base FEDORA-2014-3936", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for 389-ds-base FEDORA-2014-3936\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867594);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-03-17 12:23:52 +0530 (Mon, 17 Mar 2014)\");\n script_cve_id(\"CVE-2013-4485\", \"CVE-2013-4283\", \"CVE-2013-2219\", \"CVE-2014-0132\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_name(\"Fedora Update for 389-ds-base FEDORA-2014-3936\");\n\n tag_insight = \"389 Directory Server is an LDAPv3 compliant server. The base package includes\nthe LDAP server and command line utilities for server administration.\n\";\n\n tag_affected = \"389-ds-base on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-3936\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-March/130178.html\");\n script_summary(\"Check for the Version of 389-ds-base\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.1.22~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:48:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485", "CVE-2013-0312", "CVE-2013-2219", "CVE-2013-4283"], "description": "Check for the Version of 389-ds-base", "modified": "2017-07-10T00:00:00", "published": "2014-01-20T00:00:00", "id": "OPENVAS:867241", "href": "http://plugins.openvas.org/nasl.php?oid=867241", "type": "openvas", "title": "Fedora Update for 389-ds-base FEDORA-2013-21875", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for 389-ds-base FEDORA-2013-21875\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867241);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-01-20 09:50:31 +0530 (Mon, 20 Jan 2014)\");\n script_cve_id(\"CVE-2013-4485\", \"CVE-2013-4283\", \"CVE-2013-2219\", \"CVE-2013-0312\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for 389-ds-base FEDORA-2013-21875\");\n\n tag_insight = \"389 Directory Server is an LDAPv3 compliant server. The base package includes\nthe LDAP server and command line utilities for server administration.\n\";\n\n tag_affected = \"389-ds-base on Fedora 18\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2013-21875\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-January/126479.html\");\n script_summary(\"Check for the Version of 389-ds-base\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.0.9~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485", "CVE-2013-2219", "CVE-2013-4283", "CVE-2014-0132"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-03-17T00:00:00", "id": "OPENVAS:1361412562310867594", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867594", "type": "openvas", "title": "Fedora Update for 389-ds-base FEDORA-2014-3936", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for 389-ds-base FEDORA-2014-3936\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867594\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-03-17 12:23:52 +0530 (Mon, 17 Mar 2014)\");\n script_cve_id(\"CVE-2013-4485\", \"CVE-2013-4283\", \"CVE-2013-2219\", \"CVE-2014-0132\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_name(\"Fedora Update for 389-ds-base FEDORA-2014-3936\");\n script_tag(name:\"affected\", value:\"389-ds-base on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-3936\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-March/130178.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the '389-ds-base'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.1.22~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485", "CVE-2013-0312", "CVE-2013-2219", "CVE-2013-4283"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-01-20T00:00:00", "id": "OPENVAS:1361412562310867241", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867241", "type": "openvas", "title": "Fedora Update for 389-ds-base FEDORA-2013-21875", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for 389-ds-base FEDORA-2013-21875\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867241\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-01-20 09:50:31 +0530 (Mon, 20 Jan 2014)\");\n script_cve_id(\"CVE-2013-4485\", \"CVE-2013-4283\", \"CVE-2013-2219\", \"CVE-2013-0312\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for 389-ds-base FEDORA-2013-21875\");\n script_tag(name:\"affected\", value:\"389-ds-base on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2013-21875\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-January/126479.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the '389-ds-base'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"389-ds-base\", rpm:\"389-ds-base~1.3.0.9~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:28:01", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4485"], "description": "**CentOS Errata and Security Advisory** CESA-2013:1752\n\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base packages\ninclude the Lightweight Directory Access Protocol (LDAP) server and\ncommand-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly handle\ncertain Get Effective Rights (GER) search queries when the attribute list,\nwhich is a part of the query, included several names using the '@'\ncharacter. An attacker able to submit search queries to the 389 Directory\nServer could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, the 389 server service will be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2013-November/007323.html\n\n**Affected packages:**\n389-ds-base\n389-ds-base-devel\n389-ds-base-libs\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2013-1752.html", "edition": 3, "modified": "2013-11-26T13:37:12", "published": "2013-11-26T13:37:12", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2013-November/007323.html", "id": "CESA-2013:1752", "title": "389 security update", "type": "centos", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:59", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4485"], "description": "The 389 Directory Server is an LDAPv3 compliant server. The base packages\ninclude the Lightweight Directory Access Protocol (LDAP) server and\ncommand-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly handle\ncertain Get Effective Rights (GER) search queries when the attribute list,\nwhich is a part of the query, included several names using the '@'\ncharacter. An attacker able to submit search queries to the 389 Directory\nServer could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue. After installing\nthis update, the 389 server service will be restarted automatically.\n", "modified": "2018-06-06T20:24:24", "published": "2013-11-21T05:00:00", "id": "RHSA-2013:1752", "href": "https://access.redhat.com/errata/RHSA-2013:1752", "type": "redhat", "title": "(RHSA-2013:1752) Important: 389-ds-base security update", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:46:48", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4485"], "description": "The redhat-ds-base packages provide Red Hat Directory Server, which is an\nLDAPv3 compliant server. The base packages include the Lightweight\nDirectory Access Protocol (LDAP) server and command-line utilities for\nserver administration.\n\nIt was discovered that the Red Hat Directory Server did not properly handle\ncertain Get Effective Rights (GER) search queries when the attribute list,\nwhich is a part of the query, included several names using the '@'\ncharacter. An attacker able to submit search queries to the Red Hat\nDirectory Server could cause it to crash. (CVE-2013-4485)\n\nAll Red Hat Directory Server 8 users are advised to upgrade to these\nupdated packages, which contain a backported patch to correct this issue.\nAfter installing this update, the dirsrv service will be restarted\nautomatically.\n", "modified": "2017-09-08T12:16:40", "published": "2013-11-21T05:00:00", "id": "RHSA-2013:1753", "href": "https://access.redhat.com/errata/RHSA-2013:1753", "type": "redhat", "title": "(RHSA-2013:1753) Important: redhat-ds-base security update", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4485"], "description": "389 Directory Server is an LDAPv3 compliant server. The base package inclu des the LDAP server and command line utilities for server administration. ", "modified": "2013-11-26T04:13:33", "published": "2013-11-26T04:13:33", "id": "FEDORA:1AC4F208F9", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: 389-ds-base-1.3.2.7-1.fc20", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-2219", "CVE-2013-4283", "CVE-2013-4485"], "description": "389 Directory Server is an LDAPv3 compliant server. The base package inclu des the LDAP server and command line utilities for server administration. ", "modified": "2013-12-03T10:31:53", "published": "2013-12-03T10:31:53", "id": "FEDORA:6154B21049", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: 389-ds-base-1.3.1.16-1.fc19", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-2219", "CVE-2013-4283", "CVE-2013-4485", "CVE-2014-0132"], "description": "389 Directory Server is an LDAPv3 compliant server. The base package inclu des the LDAP server and command line utilities for server administration. ", "modified": "2014-03-15T15:23:08", "published": "2014-03-15T15:23:08", "id": "FEDORA:0402722151", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: 389-ds-base-1.3.1.22-1.fc19", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-0312", "CVE-2013-2219", "CVE-2013-4283", "CVE-2013-4485"], "description": "389 Directory Server is an LDAPv3 compliant server. The base package inclu des the LDAP server and command line utilities for server administration. ", "modified": "2014-01-14T08:39:09", "published": "2014-01-14T08:39:09", "id": "FEDORA:18A1922140", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: 389-ds-base-1.3.0.9-1.fc18", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-17T12:48:23", "description": "From Red Hat Security Advisory 2013:1752 :\n\nUpdated 389-ds-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base\npackages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, the 389 server service will be restarted\nautomatically.", "edition": 22, "published": "2013-11-27T00:00:00", "title": "Oracle Linux 6 : 389-ds-base (ELSA-2013-1752)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2013-11-27T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:389-ds-base-devel", "p-cpe:/a:oracle:linux:389-ds-base-libs", "p-cpe:/a:oracle:linux:389-ds-base"], "id": "ORACLELINUX_ELSA-2013-1752.NASL", "href": "https://www.tenable.com/plugins/nessus/71114", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2013:1752 and \n# Oracle Linux Security Advisory ELSA-2013-1752 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71114);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_bugtraq_id(63850);\n script_xref(name:\"RHSA\", value:\"2013:1752\");\n\n script_name(english:\"Oracle Linux 6 : 389-ds-base (ELSA-2013-1752)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2013:1752 :\n\nUpdated 389-ds-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base\npackages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, the 389 server service will be restarted\nautomatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2013-November/003814.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 389-ds-base packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:389-ds-base-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:389-ds-base-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/11/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"389-ds-base-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"389-ds-base-devel-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"389-ds-base-libs-1.2.11.15-30.el6_5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base / 389-ds-base-devel / 389-ds-base-libs\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:47:55", "description": "It was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAfter installing this update, the 389 server service will be restarted\nautomatically.", "edition": 16, "published": "2013-12-04T00:00:00", "title": "Scientific Linux Security Update : 389-ds-base on SL6.x i386/x86_64 (20131121)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2013-12-04T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:openssl-devel", "p-cpe:/a:fermilab:scientific_linux:p11-kit", "p-cpe:/a:fermilab:scientific_linux:389-ds-base-devel", "p-cpe:/a:fermilab:scientific_linux:openssl", "p-cpe:/a:fermilab:scientific_linux:389-ds-base-debuginfo", "p-cpe:/a:fermilab:scientific_linux:p11-kit-devel", "p-cpe:/a:fermilab:scientific_linux:389-ds-base-libs", "p-cpe:/a:fermilab:scientific_linux:openssl-perl", "p-cpe:/a:fermilab:scientific_linux:p11-kit-trust", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:openssl-static", "p-cpe:/a:fermilab:scientific_linux:389-ds-base"], "id": "SL_20131121_389_DS_BASE_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/71191", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71191);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-4485\");\n\n script_name(english:\"Scientific Linux Security Update : 389-ds-base on SL6.x i386/x86_64 (20131121)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAfter installing this update, the 389 server service will be restarted\nautomatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1312&L=scientific-linux-errata&T=0&P=318\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f611ebab\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:389-ds-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:389-ds-base-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:389-ds-base-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:openssl-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:p11-kit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:p11-kit-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:p11-kit-trust\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/12/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"389-ds-base-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"389-ds-base-debuginfo-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"389-ds-base-devel-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"389-ds-base-libs-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"openssl-1.0.1e-15.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"openssl-devel-1.0.1e-15.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"openssl-perl-1.0.1e-15.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"openssl-static-1.0.1e-15.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"p11-kit-0.18.5-2.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"p11-kit-devel-0.18.5-2.el6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"p11-kit-trust-0.18.5-2.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base / 389-ds-base-debuginfo / 389-ds-base-devel / etc\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:13:48", "description": "Updated redhat-ds-base packages that fix one security issue are now\navailable for Red Hat Directory Server 8.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe redhat-ds-base packages provide Red Hat Directory Server, which is\nan LDAPv3 compliant server. The base packages include the Lightweight\nDirectory Access Protocol (LDAP) server and command-line utilities for\nserver administration.\n\nIt was discovered that the Red Hat Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe Red Hat Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll Red Hat Directory Server 8 users are advised to upgrade to these\nupdated packages, which contain a backported patch to correct this\nissue. After installing this update, the dirsrv service will be\nrestarted automatically.", "edition": 25, "published": "2014-11-08T00:00:00", "title": "RHEL 5 : redhat-ds-base (RHSA-2013:1753)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2014-11-08T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:redhat-ds-base-devel", "p-cpe:/a:redhat:enterprise_linux:redhat-ds-base"], "id": "REDHAT-RHSA-2013-1753.NASL", "href": "https://www.tenable.com/plugins/nessus/78980", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1753. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78980);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_xref(name:\"RHSA\", value:\"2013:1753\");\n\n script_name(english:\"RHEL 5 : redhat-ds-base (RHSA-2013:1753)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated redhat-ds-base packages that fix one security issue are now\navailable for Red Hat Directory Server 8.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe redhat-ds-base packages provide Red Hat Directory Server, which is\nan LDAPv3 compliant server. The base packages include the Lightweight\nDirectory Access Protocol (LDAP) server and command-line utilities for\nserver administration.\n\nIt was discovered that the Red Hat Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe Red Hat Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll Red Hat Directory Server 8 users are advised to upgrade to these\nupdated packages, which contain a backported patch to correct this\nissue. After installing this update, the dirsrv service will be\nrestarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2013:1753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-4485\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected redhat-ds-base and / or redhat-ds-base-devel\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-ds-base-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2013:1753\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"redhat-ds-base-8.2.11-14.el5dsrv\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"redhat-ds-base-8.2.11-14.el5dsrv\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"redhat-ds-base-devel-8.2.11-14.el5dsrv\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"redhat-ds-base-devel-8.2.11-14.el5dsrv\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"redhat-ds-base / redhat-ds-base-devel\");\n }\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-17T13:13:48", "description": "Updated 389-ds-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base\npackages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, the 389 server service will be restarted\nautomatically.", "edition": 25, "published": "2013-11-21T00:00:00", "title": "RHEL 6 : 389-ds-base (RHSA-2013:1752)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2013-11-21T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:6.5", "p-cpe:/a:redhat:enterprise_linux:389-ds-base-debuginfo", "p-cpe:/a:redhat:enterprise_linux:389-ds-base-libs", "p-cpe:/a:redhat:enterprise_linux:389-ds-base", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:389-ds-base-devel"], "id": "REDHAT-RHSA-2013-1752.NASL", "href": "https://www.tenable.com/plugins/nessus/71019", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1752. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71019);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_xref(name:\"RHSA\", value:\"2013:1752\");\n\n script_name(english:\"RHEL 6 : 389-ds-base (RHSA-2013:1752)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated 389-ds-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base\npackages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, the 389 server service will be restarted\nautomatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2013:1752\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2013-4485\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:389-ds-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:389-ds-base-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:389-ds-base-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/11/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2013:1752\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"389-ds-base-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"389-ds-base-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"389-ds-base-debuginfo-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"389-ds-base-debuginfo-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"389-ds-base-devel-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"389-ds-base-devel-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"389-ds-base-libs-1.2.11.15-30.el6_5\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"389-ds-base-libs-1.2.11.15-30.el6_5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base / 389-ds-base-debuginfo / 389-ds-base-devel / etc\");\n }\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:11:22", "description": "Fixes Ticket 47599 - Reduce lock scope in retro changelog plug-in -\nprevious fix missing defition of retrocl_cn_lock\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2013-12-04T00:00:00", "title": "Fedora 19 : 389-ds-base-1.3.1.16-1.fc19 (2013-22012)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2013-12-04T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:389-ds-base"], "id": "FEDORA_2013-22012.NASL", "href": "https://www.tenable.com/plugins/nessus/71183", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-22012.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71183);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_bugtraq_id(63850);\n script_xref(name:\"FEDORA\", value:\"2013-22012\");\n\n script_name(english:\"Fedora 19 : 389-ds-base-1.3.1.16-1.fc19 (2013-22012)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Fixes Ticket 47599 - Reduce lock scope in retro changelog plug-in -\nprevious fix missing defition of retrocl_cn_lock\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1024552\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-December/123036.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?533d39cb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 389-ds-base package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/12/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"389-ds-base-1.3.1.16-1.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:11:21", "description": "Each release has bug fixes in addition to the CVE fix\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2014-01-15T00:00:00", "title": "Fedora 18 : 389-ds-base-1.3.0.9-1.fc18 (2013-21875)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2014-01-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:18", "p-cpe:/a:fedoraproject:fedora:389-ds-base"], "id": "FEDORA_2013-21875.NASL", "href": "https://www.tenable.com/plugins/nessus/71956", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-21875.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71956);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_bugtraq_id(63850);\n script_xref(name:\"FEDORA\", value:\"2013-21875\");\n\n script_name(english:\"Fedora 18 : 389-ds-base-1.3.0.9-1.fc18 (2013-21875)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Each release has bug fixes in addition to the CVE fix\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1024552\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-January/126479.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a73edc64\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 389-ds-base package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"389-ds-base-1.3.0.9-1.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-04-01T01:23:01", "description": "It was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash.", "edition": 27, "published": "2013-12-14T00:00:00", "title": "Amazon Linux AMI : 389-ds-base (ALAS-2013-255)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2021-04-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:389-ds-base", "p-cpe:/a:amazon:linux:389-ds-base-devel", "p-cpe:/a:amazon:linux:389-ds-base-libs", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:389-ds-base-debuginfo"], "id": "ALA_ALAS-2013-255.NASL", "href": "https://www.tenable.com/plugins/nessus/71395", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2013-255.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(71395);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_xref(name:\"ALAS\", value:\"2013-255\");\n\n script_name(english:\"Amazon Linux AMI : 389-ds-base (ALAS-2013-255)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2013-255.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update 389-ds-base' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:389-ds-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:389-ds-base-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:389-ds-base-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/12/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"389-ds-base-1.3.1.16-1.8.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"389-ds-base-debuginfo-1.3.1.16-1.8.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"389-ds-base-devel-1.3.1.16-1.8.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"389-ds-base-libs-1.3.1.16-1.8.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base / 389-ds-base-debuginfo / 389-ds-base-devel / etc\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T09:29:10", "description": "Updated 389-ds-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base\npackages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, the 389 server service will be restarted\nautomatically.", "edition": 25, "published": "2014-11-12T00:00:00", "title": "CentOS 6 : 389-ds-base (CESA-2013:1752)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2014-11-12T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:389-ds-base", "p-cpe:/a:centos:centos:389-ds-base-libs", "p-cpe:/a:centos:centos:389-ds-base-devel"], "id": "CENTOS_RHSA-2013-1752.NASL", "href": "https://www.tenable.com/plugins/nessus/79175", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2013:1752 and \n# CentOS Errata and Security Advisory 2013:1752 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(79175);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_xref(name:\"RHSA\", value:\"2013:1752\");\n\n script_name(english:\"CentOS 6 : 389-ds-base (CESA-2013:1752)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated 389-ds-base packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe 389 Directory Server is an LDAPv3 compliant server. The base\npackages include the Lightweight Directory Access Protocol (LDAP)\nserver and command-line utilities for server administration.\n\nIt was discovered that the 389 Directory Server did not properly\nhandle certain Get Effective Rights (GER) search queries when the\nattribute list, which is a part of the query, included several names\nusing the '@' character. An attacker able to submit search queries to\nthe 389 Directory Server could cause it to crash. (CVE-2013-4485)\n\nAll 389-ds-base users are advised to upgrade to these updated\npackages, which contain a backported patch to correct this issue.\nAfter installing this update, the 389 server service will be restarted\nautomatically.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2013-November/001123.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b102dc97\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 389-ds-base packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-4485\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:389-ds-base-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:389-ds-base-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/11/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"389-ds-base-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"389-ds-base-devel-1.2.11.15-30.el6_5\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"389-ds-base-libs-1.2.11.15-30.el6_5\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base / 389-ds-base-devel / 389-ds-base-libs\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:11:24", "description": "Updated plugin API Here is where you give an explanation of your\nupdate. There are additional fixes on top of the CVE Fixes Ticket\n47599 - Reduce lock scope in retro changelog plug-in - previous fix\nmissing defition of retrocl_cn_lock\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 13, "published": "2013-11-26T00:00:00", "title": "Fedora 20 : 389-ds-base-1.3.2.7-1.fc20 (2013-22139)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-4485"], "modified": "2013-11-26T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:389-ds-base", "cpe:/o:fedoraproject:fedora:20"], "id": "FEDORA_2013-22139.NASL", "href": "https://www.tenable.com/plugins/nessus/71087", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-22139.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(71087);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-4485\");\n script_bugtraq_id(63850);\n script_xref(name:\"FEDORA\", value:\"2013-22139\");\n\n script_name(english:\"Fedora 20 : 389-ds-base-1.3.2.7-1.fc20 (2013-22139)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated plugin API Here is where you give an explanation of your\nupdate. There are additional fixes on top of the CVE Fixes Ticket\n47599 - Reduce lock scope in retro changelog plug-in - previous fix\nmissing defition of retrocl_cn_lock\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1024552\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-November/122757.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cd604102\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 389-ds-base package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:389-ds-base\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/11/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/11/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"389-ds-base-1.3.2.7-1.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"389-ds-base\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "amazon": [{"lastseen": "2020-11-10T12:36:10", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4485"], "description": "**Issue Overview:**\n\nIt was discovered that the 389 Directory Server did not properly handle certain Get Effective Rights (GER) search queries when the attribute list, which is a part of the query, included several names using the '@' character. An attacker able to submit search queries to the 389 Directory Server could cause it to crash.\n\n \n**Affected Packages:** \n\n\n389-ds-base\n\n \n**Issue Correction:** \nRun _yum update 389-ds-base_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n 389-ds-base-devel-1.3.1.16-1.8.amzn1.i686 \n 389-ds-base-libs-1.3.1.16-1.8.amzn1.i686 \n 389-ds-base-1.3.1.16-1.8.amzn1.i686 \n 389-ds-base-debuginfo-1.3.1.16-1.8.amzn1.i686 \n \n src: \n 389-ds-base-1.3.1.16-1.8.amzn1.src \n \n x86_64: \n 389-ds-base-1.3.1.16-1.8.amzn1.x86_64 \n 389-ds-base-debuginfo-1.3.1.16-1.8.amzn1.x86_64 \n 389-ds-base-libs-1.3.1.16-1.8.amzn1.x86_64 \n 389-ds-base-devel-1.3.1.16-1.8.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2013-12-11T20:32:00", "published": "2013-12-11T20:32:00", "id": "ALAS-2013-255", "href": "https://alas.aws.amazon.com/ALAS-2013-255.html", "title": "Important: 389-ds-base", "type": "amazon", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:09", "bulletinFamily": "unix", "cvelist": ["CVE-2013-4485", "CVE-2013-4283"], "description": "[1.2.11.15-30]\r\n- Resolves: bug 1024977 CVE-2013-4485 389-ds-base: DoS due to improper handling of ger attr searches\r\n \n[1.2.11.15-29]\r\n- Bump version to 1.2.11.15-29\r\n- Resolves: bug 1008013: DS91: ns-slapd stuck in DS_Sleep\r\n \n[1.2.11.15-28]\r\n- Bump version to 1.2.11.15-28\r\n- Resolves: Bug 1016038 - Users from AD sub OU does not sync to IPA (ticket 47488)\r\n \n[1.2.11.15-27]\r\n- Bump version to 1.2.11.15-27\r\n- Resolves: Bug 1013735 - CLEANALLRUV doesnt run across all replicas (ticket 47509)\r\n \n[1.2.11.15-26]\r\n- Bump version to 1.2.11.15-26\r\n- Resolves: Bug 947583 - ldapdelete returns non-leaf entry error while trying to remove a leaf entry (ticket 47534)\r\n \n[1.2.11.15-25]\r\n- Bump version to 1.2.11.15-25\r\n- Resolves: Bug 1006846 - 2Master replication with SASL/GSSAPI auth broken (ticket 47523)\r\n- Resolves: Bug 1007452 - Under specific values of nsDS5ReplicaName, replication may get broken or updates (ticket 47489)\r\n \n[1.2.11.15-24]\r\n- Bump version to 1.2.11.15-24\r\n- Resolves: Bug 982325 - Overflow in nsslapd-disk-monitoring-threshold; Changed CONFIG_INT to CONFIG_LONG for nsslapd-disk-monioring-threshold (ticket 47427)\r\n \n[1.2.11.15-23]\r\n- Bump version to 1.2.11.15-23\r\n- Resolves: Bug 1000632 - CVE-2013-4283 389-ds-base: ns-slapd crash due to bogus DN\r\n- Resolves: Bug 1002260 - server fails to start after upgrade(schema error) (ticket 47318)", "edition": 4, "modified": "2013-11-25T00:00:00", "published": "2013-11-25T00:00:00", "id": "ELSA-2013-1752", "href": "http://linux.oracle.com/errata/ELSA-2013-1752.html", "title": "389-ds-base security update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}