7.1 High
AI Score
Confidence
High
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.006 Low
EPSS
Percentile
77.7%
The remote host is missing an update for the
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.871871");
script_version("2024-03-21T05:06:54+0000");
script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
script_tag(name:"creation_date", value:"2017-08-04 12:47:42 +0530 (Fri, 04 Aug 2017)");
script_cve_id("CVE-2014-9365");
script_tag(name:"cvss_base", value:"5.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:N");
script_tag(name:"qod_type", value:"package");
script_name("RedHat Update for python RHSA-2017:1868-01");
script_tag(name:"summary", value:"The remote host is missing an update for the 'python'
package(s) announced via the referenced advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Python is an interpreted, interactive,
object-oriented programming language, which includes modules, classes,
exceptions, very high level dynamic data types and dynamic typing. Python
supports interfaces to many system calls and libraries, as well as to various
windowing systems. Security Fix(es): * The Python standard library HTTP client
modules (such as httplib or urllib) did not perform verification of TLS/SSL
certificates when connecting to HTTPS servers. A man-in-the-middle attacker
could use this flaw to hijack connections and eavesdrop or modify transferred
data. (CVE-2014-9365) Note: The Python standard library was updated to enable
certificate verification by default. Refer to the Knowledgebase article 2039753
linked to in the References section for further details about this change.
(BZ#1219110) Additional Changes: For detailed information on changes in this
release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the
References section.");
script_tag(name:"affected", value:"python on Red Hat Enterprise Linux Server (v. 7)");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_xref(name:"RHSA", value:"2017:1868-01");
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2017-August/msg00021.html");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_7");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_7")
{
if ((res = isrpmvuln(pkg:"python", rpm:"python~2.7.5~58.el7", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"python-debuginfo", rpm:"python-debuginfo~2.7.5~58.el7", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"python-devel", rpm:"python-devel~2.7.5~58.el7", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"python-libs", rpm:"python-libs~2.7.5~58.el7", rls:"RHENT_7")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}