{"id": "OPENVAS:1361412562310872614", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for collectd FEDORA-2017-6b639afc9c", "description": "The remote host is missing an update for the ", "published": "2017-04-26T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872614", "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "references": ["2017-6b639afc9c", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XS3PSVBCTQOOREZRPG7E72YL6VRPWJNN"], "cvelist": ["CVE-2017-7401"], "lastseen": "2019-05-29T18:34:09", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "amazon", "idList": ["ALAS-2017-829"]}, {"type": "cve", "idList": ["CVE-2017-7401"]}, {"type": "debian", "idList": ["DEBIAN:DLA-884-1:54244"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-7401"]}, {"type": "fedora", "idList": ["FEDORA:A27D36087980", "FEDORA:B28756049474", "FEDORA:BF09460321DD"]}, {"type": "freebsd", "idList": ["08A2DF48-6C6A-11E7-9B01-2047478F2F70"]}, {"type": "nessus", "idList": ["ALA_ALAS-2017-829.NASL", "DEBIAN_DLA-884.NASL", "FEDORA_2017-6B639AFC9C.NASL", "FEDORA_2017-80763C8C03.NASL", "FEDORA_2017-822D460AE2.NASL", "FREEBSD_PKG_08A2DF486C6A11E79B012047478F2F70.NASL", "REDHAT-RHSA-2017-1285.NASL", "REDHAT-RHSA-2018-2615.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310872612", "OPENVAS:1361412562310890884"]}, {"type": "osv", "idList": ["OSV:DLA-884-1"]}, {"type": "redhat", "idList": ["RHSA-2017:1285", "RHSA-2017:1787", "RHSA-2018:2615"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2017-7401"]}]}, "score": {"value": 0.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS-2017-829"]}, {"type": "cve", "idList": ["CVE-2017-7401"]}, {"type": "debian", "idList": ["DEBIAN:DLA-884-1:54244"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-7401"]}, {"type": "fedora", "idList": ["FEDORA:A27D36087980", "FEDORA:B28756049474", "FEDORA:BF09460321DD"]}, {"type": "freebsd", "idList": ["08A2DF48-6C6A-11E7-9B01-2047478F2F70"]}, {"type": "nessus", "idList": ["ALA_ALAS-2017-829.NASL", "DEBIAN_DLA-884.NASL", "FEDORA_2017-822D460AE2.NASL", "FREEBSD_PKG_08A2DF486C6A11E79B012047478F2F70.NASL", "REDHAT-RHSA-2017-1285.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310872612"]}, {"type": "redhat", "idList": ["RHSA-2017:1285"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2017-7401"]}]}, "exploitation": null, "vulnersScore": 0.0}, "pluginID": "1361412562310872614", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for collectd FEDORA-2017-6b639afc9c\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872614\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-26 06:50:11 +0200 (Wed, 26 Apr 2017)\");\n script_cve_id(\"CVE-2017-7401\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for collectd FEDORA-2017-6b639afc9c\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'collectd'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"collectd on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-6b639afc9c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XS3PSVBCTQOOREZRPG7E72YL6VRPWJNN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"collectd\", rpm:\"collectd~5.6.2~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1660012827, "score": 1660013489}, "_internal": {"score_hash": "cf38a510d27774aa378a39e9016c22c3"}}
{"openvas": [{"lastseen": "2020-01-29T20:07:21", "description": "It was discovered that there was an infinite loop vulnerability in collectd, a\nstatistics collection and monitoring daemon.\n\nWhen a correct ", "cvss3": {}, "published": "2018-01-17T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for collectd (DLA-884-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7401"], "modified": "2020-01-29T00:00:00", "id": "OPENVAS:1361412562310890884", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310890884", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.890884\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2017-7401\");\n script_name(\"Debian LTS: Security Advisory for collectd (DLA-884-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-01-17 00:00:00 +0100 (Wed, 17 Jan 2018)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2017/04/msg00003.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n\n script_tag(name:\"affected\", value:\"collectd on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 7 'Wheezy', this issue has been fixed in collectd version\n5.1.0-3+deb7u3.\n\nWe recommend that you upgrade your collectd packages.\");\n\n script_tag(name:\"summary\", value:\"It was discovered that there was an infinite loop vulnerability in collectd, a\nstatistics collection and monitoring daemon.\n\nWhen a correct 'Signature part' is received by an instance configured without\nthe AuthFile option, an endless loop occurs in the parse_packet routine due to\na missing pointer increment to the next unprocessed part.\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"collectd\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"collectd-core\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"collectd-dbg\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"collectd-dev\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"collectd-utils\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcollectdclient-dev\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcollectdclient0\", ver:\"5.1.0-3+deb7u3\", rls:\"DEB7\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:34:13", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2017-04-25T00:00:00", "type": "openvas", "title": "Fedora Update for collectd FEDORA-2017-80763c8c03", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-7401"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310872612", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872612", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for collectd FEDORA-2017-80763c8c03\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872612\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2017-04-25 06:43:09 +0200 (Tue, 25 Apr 2017)\");\n script_cve_id(\"CVE-2017-7401\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for collectd FEDORA-2017-80763c8c03\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'collectd'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"collectd on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2017-80763c8c03\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF6ZZ4RFRPHNNVE3WGWARPWNFZES637D\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"collectd\", rpm:\"collectd~5.7.1~3.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "redhat": [{"lastseen": "2021-10-21T04:46:15", "description": "collectd is a small C-language daemon, which reads various system metrics periodically and updates RRD files (creating them if necessary). Because the daemon does not start up each time it updates files, it has a low system footprint.\n\nThe following packages have been upgraded to a later upstream version: collectd (5.7.2). (BZ#1460080)\n\nSecurity Fix(es):\n\n* collectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with \"SecurityLevel None\" and empty \"AuthFile\" options, an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service. (CVE-2017-7401)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-07-19T22:32:11", "type": "redhat", "title": "(RHSA-2017:1787) Moderate: collectd security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-07-19T22:33:35", "id": "RHSA-2017:1787", "href": "https://access.redhat.com/errata/RHSA-2017:1787", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-10-21T04:46:58", "description": "collectd is a small C-language daemon, which reads various system metrics periodically and updates RRD files (creating them if necessary). Because the daemon does not start up each time it updates files, it has a low system footprint.\n\nThe following packages have been upgraded to a newer upstream version: collectd (5.7.1). (BZ#1446472)\n\nSecurity Fix(es):\n\n* collectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with \"SecurityLevel None\" and with empty \"AuthFile\" options an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service. (CVE-2017-7401)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-05-24T09:19:41", "type": "redhat", "title": "(RHSA-2017:1285) Moderate: collectd security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2018-03-19T12:29:42", "id": "RHSA-2017:1285", "href": "https://access.redhat.com/errata/RHSA-2017:1285", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-10-19T20:41:03", "description": "collectd is a host-based system statistics collection daemon that gathers metrics from various sources periodically, such as the operating system, applications, log files and devices, and storage clusters. As the daemon does not start up each time it updates files, it has a low system footprint.\n\nFor Red Hat Gluster Storage Web Administration 3.4, collectd service is responsible for gathering metrics from Red Hat Gluster Storage clusters. \n\nThe updated collectd package includes the following security bug fixes.\n\nSecurity Fix(es):\n\n* collectd: Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions (CVE-2017-7401)\n\n* collectd: double free in csnmp_read_table function in snmp.c (CVE-2017-16820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis updated package contains a number of bug fixes and enhancements, which are documented in detail in the Release Notes, linked in the References.\n\nAll users of collectd are advised to upgrade to these updated packages, which resolve these issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-09-04T06:28:01", "type": "redhat", "title": "(RHSA-2018:2615) Moderate: collectd security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-16820", "CVE-2017-7401"], "modified": "2018-09-04T06:31:31", "id": "RHSA-2018:2615", "href": "https://access.redhat.com/errata/RHSA-2018:2615", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "osv": [{"lastseen": "2022-07-21T08:12:05", "description": "\nIt was discovered that there was an infinite loop vulnerability in collectd, a\nstatistics collection and monitoring daemon.\n\n\nWhen a correct Signature part is received by an instance configured without\nthe AuthFile option, an endless loop occurs in the parse\\_packet routine due to\na missing pointer increment to the next unprocessed part.\n\n\nFor Debian 7 Wheezy, this issue has been fixed in collectd version\n5.1.0-3+deb7u3.\n\n\nWe recommend that you upgrade your collectd packages.\n\n\n", "edition": 1, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-04T00:00:00", "type": "osv", "title": "collectd - security update", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2022-07-21T05:54:57", "id": "OSV:DLA-884-1", "href": "https://osv.dev/vulnerability/DLA-884-1", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "amazon": [{"lastseen": "2022-11-01T21:14:10", "description": "**Issue Overview:**\n\nInfinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions: \nCollectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with \"SecurityLevel None\" and with empty \"AuthFile\" options an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service. (CVE-2017-7401)\n\n \n**Affected Packages:** \n\n\ncollectd\n\n \n**Issue Correction:** \nRun _yum update collectd_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 collectd-rrdtool-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-memcachec-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-rrdcached-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-curl_xml-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-hugepages-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-python-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 libcollectdclient-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-chrony-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-gmond-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-email-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-netlink-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-generic-jmx-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-write_http-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-postgresql-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-amqp-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-zookeeper-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-dns-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-apache-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-dbi-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-lvm-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-web-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-bind-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-java-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-varnish-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-iptables-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-debuginfo-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-write_sensu-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-write_tsdb-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-snmp-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-utils-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-ipmi-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-curl-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-drbd-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 libcollectdclient-devel-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-nginx-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-notify_email-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-mysql-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 perl-Collectd-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-lua-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-ipvs-5.7.1-3.18.amzn1.i686 \n \u00a0\u00a0\u00a0 collectd-openldap-5.7.1-3.18.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 collectd-5.7.1-3.18.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 collectd-memcachec-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-curl_xml-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-bind-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-lua-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-java-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-snmp-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-write_sensu-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-dns-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 libcollectdclient-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-apache-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-ipmi-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-lvm-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-chrony-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-mysql-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-nginx-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-netlink-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-varnish-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-amqp-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-iptables-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 perl-Collectd-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-drbd-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-python-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-generic-jmx-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-email-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-postgresql-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-write_http-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-web-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-debuginfo-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-dbi-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-openldap-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-rrdcached-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-notify_email-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 libcollectdclient-devel-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-zookeeper-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-rrdtool-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-utils-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-write_tsdb-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-curl-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-ipvs-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-hugepages-5.7.1-3.18.amzn1.x86_64 \n \u00a0\u00a0\u00a0 collectd-gmond-5.7.1-3.18.amzn1.x86_64 \n \n \n\n### Additional References\n\nRed Hat: [CVE-2017-7401](<https://access.redhat.com/security/cve/CVE-2017-7401>)\n\nMitre: [CVE-2017-7401](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7401>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-05-18T18:58:00", "type": "amazon", "title": "Medium: collectd", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-05-19T03:37:00", "id": "ALAS-2017-829", "href": "https://alas.aws.amazon.com/ALAS-2017-829.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:54", "description": "collectd is a daemon which collects system performance statistics periodica lly and provides mechanisms to store the values in a variety of ways, for example in RRD files. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-19T17:02:48", "type": "fedora", "title": "[SECURITY] Fedora 26 Update: collectd-5.7.1-3.fc26", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-04-19T17:02:48", "id": "FEDORA:A27D36087980", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UPT2ESAQQZUBHM2IZIDGKOG3XIHVSWXS/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "description": "collectd is a daemon which collects system performance statistics periodica lly and provides mechanisms to store the values in a variety of ways, for example in RRD files. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-25T02:26:29", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: collectd-5.7.1-3.fc25", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-04-25T02:26:29", "id": "FEDORA:BF09460321DD", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NF6ZZ4RFRPHNNVE3WGWARPWNFZES637D/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:54", "description": "collectd is a daemon which collects system performance statistics periodica lly and provides mechanisms to store the values in a variety of ways, for example in RRD files. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-25T17:24:29", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: collectd-5.6.2-1.fc24", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-04-25T17:24:29", "id": "FEDORA:B28756049474", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XS3PSVBCTQOOREZRPG7E72YL6VRPWJNN/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "debian": [{"lastseen": "2021-10-22T13:39:39", "description": "Package : collectd\nVersion : 5.1.0-3+deb7u3\nCVE ID : CVE-2017-7401\nDebian Bug : #859494\n\nIt was discovered that there was an infinite loop vulnerability in collectd, a\nstatistics collection and monitoring daemon.\n\nWhen a correct "Signature part" is received by an instance configured without\nthe AuthFile option, an endless loop occurs in the parse_packet routine due to\na missing pointer increment to the next unprocessed part.\n\nFor Debian 7 "Wheezy", this issue has been fixed in collectd version\n5.1.0-3+deb7u3.\n\nWe recommend that you upgrade your collectd packages.\n\n\nRegards,\n\n- -- \n ,''`.\n : :' : Chris Lamb\n `. `'` lamby@debian.org / chris-lamb.co.uk\n `-", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-04-04T15:23:57", "type": "debian", "title": "[SECURITY] [DLA 884-1] collectd security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-04-04T15:23:57", "id": "DEBIAN:DLA-884-1:54244", "href": "https://lists.debian.org/debian-lts-announce/2017/04/msg00003.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:31", "description": "\n\nmarcinguy reports:\n\nAfter sending this payload, collectd seems to be entering endless while()\n\t loop in packet_parse consuming high CPU resources, possibly crash/gets killed after a while.\n\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2017-02-13T00:00:00", "type": "freebsd", "title": "collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-02-13T00:00:00", "id": "08A2DF48-6C6A-11E7-9B01-2047478F2F70", "href": "https://vuxml.freebsd.org/freebsd/08a2df48-6c6a-11e7-9b01-2047478f2f70.html", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2023-01-11T14:30:47", "description": "Fix CVE-2017-7401 collectd: Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions. This is a bug in the network plugin.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-07-17T00:00:00", "type": "nessus", "title": "Fedora 26 : collectd (2017-822d460ae2)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:collectd", "cpe:/o:fedoraproject:fedora:26"], "id": "FEDORA_2017-822D460AE2.NASL", "href": "https://www.tenable.com/plugins/nessus/101671", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-822d460ae2.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101671);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-7401\");\n script_xref(name:\"FEDORA\", value:\"2017-822d460ae2\");\n\n script_name(english:\"Fedora 26 : collectd (2017-822d460ae2)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Fix CVE-2017-7401 collectd: Infinite loop due to incorrect interaction\nof parse_packet() and parse_part_sign_sha256() functions. This is a\nbug in the network plugin.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-822d460ae2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected collectd package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:26\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^26([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 26\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC26\", reference:\"collectd-5.7.1-3.fc26\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"collectd\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:31:35", "description": "marcinguy reports :\n\nAfter sending this payload, collectd seems to be entering endless while() loop in packet_parse consuming high CPU resources, possibly crash/gets killed after a while.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-07-20T00:00:00", "type": "nessus", "title": "FreeBSD : collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures (08a2df48-6c6a-11e7-9b01-2047478f2f70)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:collectd5", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_08A2DF486C6A11E79B012047478F2F70.NASL", "href": "https://www.tenable.com/plugins/nessus/101826", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(101826);\n script_version(\"3.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2017-7401\");\n\n script_name(english:\"FreeBSD : collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures (08a2df48-6c6a-11e7-9b01-2047478f2f70)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"marcinguy reports :\n\nAfter sending this payload, collectd seems to be entering endless\nwhile() loop in packet_parse consuming high CPU resources, possibly\ncrash/gets killed after a while.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/collectd/collectd/issues/2174\"\n );\n # https://vuxml.freebsd.org/freebsd/08a2df48-6c6a-11e7-9b01-2047478f2f70.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?056ac1e7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:collectd5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/02/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"collectd5<5.7.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:23:34", "description": "Fix CVE-2017-7401 collectd: Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions. This is a bug in the network plugin.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-25T00:00:00", "type": "nessus", "title": "Fedora 25 : collectd (2017-80763c8c03)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:collectd", "cpe:/o:fedoraproject:fedora:25"], "id": "FEDORA_2017-80763C8C03.NASL", "href": "https://www.tenable.com/plugins/nessus/99644", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-80763c8c03.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99644);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-7401\");\n script_xref(name:\"FEDORA\", value:\"2017-80763c8c03\");\n\n script_name(english:\"Fedora 25 : collectd (2017-80763c8c03)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Fix CVE-2017-7401 collectd: Infinite loop due to incorrect interaction\nof parse_packet() and parse_part_sign_sha256() functions. This is a\nbug in the network plugin.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-80763c8c03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected collectd package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"collectd-5.7.1-3.fc25\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"collectd\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:23:39", "description": "It was discovered that there was an infinite loop vulnerability in collectd, a statistics collection and monitoring daemon.\n\nWhen a correct 'Signature part' is received by an instance configured without the AuthFile option, an endless loop occurs in the parse_packet routine due to a missing pointer increment to the next unprocessed part.\n\nFor Debian 7 'Wheezy', this issue has been fixed in collectd version 5.1.0-3+deb7u3.\n\nWe recommend that you upgrade your collectd packages.\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-05T00:00:00", "type": "nessus", "title": "Debian DLA-884-1 : collectd security update", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:collectd", "p-cpe:/a:debian:debian_linux:collectd-core", "p-cpe:/a:debian:debian_linux:collectd-dbg", "p-cpe:/a:debian:debian_linux:collectd-dev", "p-cpe:/a:debian:debian_linux:collectd-utils", "p-cpe:/a:debian:debian_linux:libcollectdclient-dev", "p-cpe:/a:debian:debian_linux:libcollectdclient0", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-884.NASL", "href": "https://www.tenable.com/plugins/nessus/99189", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-884-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99189);\n script_version(\"3.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2017-7401\");\n\n script_name(english:\"Debian DLA-884-1 : collectd security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that there was an infinite loop vulnerability in\ncollectd, a statistics collection and monitoring daemon.\n\nWhen a correct 'Signature part' is received by an instance configured\nwithout the AuthFile option, an endless loop occurs in the\nparse_packet routine due to a missing pointer increment to the next\nunprocessed part.\n\nFor Debian 7 'Wheezy', this issue has been fixed in collectd version\n5.1.0-3+deb7u3.\n\nWe recommend that you upgrade your collectd packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2017/04/msg00003.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/collectd\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:collectd-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:collectd-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:collectd-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:collectd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcollectdclient-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcollectdclient0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"collectd\", reference:\"5.1.0-3+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"collectd-core\", reference:\"5.1.0-3+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"collectd-dbg\", reference:\"5.1.0-3+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"collectd-dev\", reference:\"5.1.0-3+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"collectd-utils\", reference:\"5.1.0-3+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libcollectdclient-dev\", reference:\"5.1.0-3+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libcollectdclient0\", reference:\"5.1.0-3+deb7u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:24:24", "description": "Fix CVE-2017-7401 collectd: Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions. This is a bug in the network plugin.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-26T00:00:00", "type": "nessus", "title": "Fedora 24 : collectd (2017-6b639afc9c)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:collectd", "cpe:/o:fedoraproject:fedora:24"], "id": "FEDORA_2017-6B639AFC9C.NASL", "href": "https://www.tenable.com/plugins/nessus/99678", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2017-6b639afc9c.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99678);\n script_version(\"3.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2017-7401\");\n script_xref(name:\"FEDORA\", value:\"2017-6b639afc9c\");\n\n script_name(english:\"Fedora 24 : collectd (2017-6b639afc9c)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Fix CVE-2017-7401 collectd: Infinite loop due to incorrect interaction\nof parse_packet() and parse_part_sign_sha256() functions. This is a\nbug in the network plugin.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2017-6b639afc9c\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected collectd package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:24\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^24([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 24\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC24\", reference:\"collectd-5.6.2-1.fc24\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"collectd\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:25:20", "description": "Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions :\n\nCollectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with 'SecurityLevel None' and with empty 'AuthFile' options an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service.\n(CVE-2017-7401)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-05-19T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : collectd (ALAS-2017-829)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2018-04-18T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:collectd", "p-cpe:/a:amazon:linux:collectd-amqp", "p-cpe:/a:amazon:linux:collectd-apache", "p-cpe:/a:amazon:linux:collectd-bind", "p-cpe:/a:amazon:linux:collectd-chrony", "p-cpe:/a:amazon:linux:collectd-curl", "p-cpe:/a:amazon:linux:collectd-curl_xml", "p-cpe:/a:amazon:linux:collectd-dbi", "p-cpe:/a:amazon:linux:collectd-debuginfo", "p-cpe:/a:amazon:linux:collectd-dns", "p-cpe:/a:amazon:linux:collectd-drbd", "p-cpe:/a:amazon:linux:collectd-email", "p-cpe:/a:amazon:linux:collectd-generic-jmx", "p-cpe:/a:amazon:linux:collectd-gmond", "p-cpe:/a:amazon:linux:collectd-hugepages", "p-cpe:/a:amazon:linux:collectd-ipmi", "p-cpe:/a:amazon:linux:collectd-iptables", "p-cpe:/a:amazon:linux:collectd-ipvs", "p-cpe:/a:amazon:linux:collectd-java", "p-cpe:/a:amazon:linux:collectd-lua", "p-cpe:/a:amazon:linux:collectd-lvm", "p-cpe:/a:amazon:linux:collectd-memcachec", "p-cpe:/a:amazon:linux:collectd-mysql", "p-cpe:/a:amazon:linux:collectd-netlink", "p-cpe:/a:amazon:linux:collectd-nginx", "p-cpe:/a:amazon:linux:collectd-notify_email", "p-cpe:/a:amazon:linux:collectd-openldap", "p-cpe:/a:amazon:linux:collectd-postgresql", "p-cpe:/a:amazon:linux:collectd-python", "p-cpe:/a:amazon:linux:collectd-rrdcached", "p-cpe:/a:amazon:linux:collectd-rrdtool", "p-cpe:/a:amazon:linux:collectd-snmp", "p-cpe:/a:amazon:linux:collectd-utils", "p-cpe:/a:amazon:linux:collectd-varnish", "p-cpe:/a:amazon:linux:collectd-web", "p-cpe:/a:amazon:linux:collectd-write_http", "p-cpe:/a:amazon:linux:collectd-write_sensu", "p-cpe:/a:amazon:linux:collectd-write_tsdb", "p-cpe:/a:amazon:linux:collectd-zookeeper", "p-cpe:/a:amazon:linux:libcollectdclient", "p-cpe:/a:amazon:linux:libcollectdclient-devel", "p-cpe:/a:amazon:linux:perl-Collectd", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2017-829.NASL", "href": "https://www.tenable.com/plugins/nessus/100274", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2017-829.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100274);\n script_version(\"3.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:36\");\n\n script_cve_id(\"CVE-2017-7401\");\n script_xref(name:\"ALAS\", value:\"2017-829\");\n\n script_name(english:\"Amazon Linux AMI : collectd (ALAS-2017-829)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Infinite loop due to incorrect interaction of parse_packet() and\nparse_part_sign_sha256() functions :\n\nCollectd contains an infinite loop due to how the parse_packet() and\nparse_part_sign_sha256() functions interact. If an instance of\ncollectd is configured with 'SecurityLevel None' and with empty\n'AuthFile' options an attacker can send crafted UDP packets that\ntrigger the infinite loop, causing a denial of service.\n(CVE-2017-7401)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2017-829.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update collectd' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-amqp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-apache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-chrony\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-curl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-curl_xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-dbi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-dns\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-drbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-email\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-generic-jmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-gmond\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-hugepages\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-ipmi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-iptables\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-ipvs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-lua\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-lvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-memcachec\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-netlink\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-nginx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-notify_email\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-openldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-rrdcached\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-rrdtool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-varnish\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-web\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-write_http\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-write_sensu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-write_tsdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:collectd-zookeeper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:libcollectdclient\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:libcollectdclient-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perl-Collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"collectd-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-amqp-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-apache-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-bind-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-chrony-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-curl-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-curl_xml-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-dbi-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-debuginfo-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-dns-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-drbd-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-email-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-generic-jmx-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-gmond-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-hugepages-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-ipmi-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-iptables-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-ipvs-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-java-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-lua-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-lvm-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-memcachec-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-mysql-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-netlink-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-nginx-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-notify_email-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-openldap-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-postgresql-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-python-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-rrdcached-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-rrdtool-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-snmp-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-utils-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-varnish-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-web-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-write_http-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-write_sensu-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-write_tsdb-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"collectd-zookeeper-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"libcollectdclient-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"libcollectdclient-devel-5.7.1-3.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perl-Collectd-5.7.1-3.18.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"collectd / collectd-amqp / collectd-apache / collectd-bind / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:26:37", "description": "An update for collectd is now available for RHEV 4.X RHEV-H and Agents for RHEL-7 and RHEV Engine version 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\ncollectd is a small C-language daemon, which reads various system metrics periodically and updates RRD files (creating them if necessary). Because the daemon does not start up each time it updates files, it has a low system footprint.\n\nThe following packages have been upgraded to a newer upstream version:\ncollectd (5.7.1). (BZ#1446472)\n\nSecurity Fix(es) :\n\n* collectd contains an infinite loop due to how the parse_packet() and parse_part_sign_sha256() functions interact. If an instance of collectd is configured with 'SecurityLevel None' and with empty 'AuthFile' options an attacker can send crafted UDP packets that trigger the infinite loop, causing a denial of service.\n(CVE-2017-7401)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-05-26T00:00:00", "type": "nessus", "title": "RHEL 7 : collectd (RHSA-2017:1285)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2019-10-24T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:collectd", "p-cpe:/a:redhat:enterprise_linux:collectd-apache", "p-cpe:/a:redhat:enterprise_linux:collectd-ascent", "p-cpe:/a:redhat:enterprise_linux:collectd-bind", "p-cpe:/a:redhat:enterprise_linux:collectd-ceph", "p-cpe:/a:redhat:enterprise_linux:collectd-chrony", "p-cpe:/a:redhat:enterprise_linux:collectd-curl", "p-cpe:/a:redhat:enterprise_linux:collectd-curl_json", "p-cpe:/a:redhat:enterprise_linux:collectd-curl_xml", "p-cpe:/a:redhat:enterprise_linux:collectd-dbi", "p-cpe:/a:redhat:enterprise_linux:collectd-debuginfo", "p-cpe:/a:redhat:enterprise_linux:collectd-disk", "p-cpe:/a:redhat:enterprise_linux:collectd-dns", "p-cpe:/a:redhat:enterprise_linux:collectd-drbd", "p-cpe:/a:redhat:enterprise_linux:collectd-email", "p-cpe:/a:redhat:enterprise_linux:collectd-generic-jmx", "p-cpe:/a:redhat:enterprise_linux:collectd-hugepages", "p-cpe:/a:redhat:enterprise_linux:collectd-ipmi", "p-cpe:/a:redhat:enterprise_linux:collectd-iptables", "p-cpe:/a:redhat:enterprise_linux:collectd-ipvs", "p-cpe:/a:redhat:enterprise_linux:collectd-java", "p-cpe:/a:redhat:enterprise_linux:collectd-log_logstash", "p-cpe:/a:redhat:enterprise_linux:collectd-lvm", "p-cpe:/a:redhat:enterprise_linux:collectd-mysql", "p-cpe:/a:redhat:enterprise_linux:collectd-netlink", "p-cpe:/a:redhat:enterprise_linux:collectd-nginx", "p-cpe:/a:redhat:enterprise_linux:collectd-notify_desktop", "p-cpe:/a:redhat:enterprise_linux:collectd-notify_email", "p-cpe:/a:redhat:enterprise_linux:collectd-openldap", "p-cpe:/a:redhat:enterprise_linux:collectd-ping", "p-cpe:/a:redhat:enterprise_linux:collectd-postgresql", "p-cpe:/a:redhat:enterprise_linux:collectd-rrdcached", "p-cpe:/a:redhat:enterprise_linux:collectd-rrdtool", "p-cpe:/a:redhat:enterprise_linux:collectd-sensors", "p-cpe:/a:redhat:enterprise_linux:collectd-smart", "p-cpe:/a:redhat:enterprise_linux:collectd-snmp", "p-cpe:/a:redhat:enterprise_linux:collectd-turbostat", "p-cpe:/a:redhat:enterprise_linux:collectd-utils", "p-cpe:/a:redhat:enterprise_linux:collectd-virt", "p-cpe:/a:redhat:enterprise_linux:collectd-write_http", "p-cpe:/a:redhat:enterprise_linux:collectd-write_riemann", "p-cpe:/a:redhat:enterprise_linux:collectd-write_sensu", "p-cpe:/a:redhat:enterprise_linux:collectd-write_tsdb", "p-cpe:/a:redhat:enterprise_linux:collectd-zookeeper", "p-cpe:/a:redhat:enterprise_linux:libcollectdclient", "p-cpe:/a:redhat:enterprise_linux:libcollectdclient-devel", "cpe:/o:redhat:enterprise_linux:7"], "id": "REDHAT-RHSA-2017-1285.NASL", "href": "https://www.tenable.com/plugins/nessus/100454", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2017:1285. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(100454);\n script_version(\"3.12\");\n script_cvs_date(\"Date: 2019/10/24 15:35:43\");\n\n script_cve_id(\"CVE-2017-7401\");\n script_xref(name:\"RHSA\", value:\"2017:1285\");\n\n script_name(english:\"RHEL 7 : collectd (RHSA-2017:1285)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for collectd is now available for RHEV 4.X RHEV-H and Agents\nfor RHEL-7 and RHEV Engine version 4.1.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\ncollectd is a small C-language daemon, which reads various system\nmetrics periodically and updates RRD files (creating them if\nnecessary). Because the daemon does not start up each time it updates\nfiles, it has a low system footprint.\n\nThe following packages have been upgraded to a newer upstream version:\ncollectd (5.7.1). (BZ#1446472)\n\nSecurity Fix(es) :\n\n* collectd contains an infinite loop due to how the parse_packet() and\nparse_part_sign_sha256() functions interact. If an instance of\ncollectd is configured with 'SecurityLevel None' and with empty\n'AuthFile' options an attacker can send crafted UDP packets that\ntrigger the infinite loop, causing a denial of service.\n(CVE-2017-7401)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2017:1285\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-7401\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-apache\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-ascent\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-ceph\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-chrony\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-curl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-curl_json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-curl_xml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-dbi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-disk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-dns\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-drbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-email\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-generic-jmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-hugepages\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-ipmi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-iptables\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-ipvs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-log_logstash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-lvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-netlink\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-nginx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-notify_desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-notify_email\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-openldap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-ping\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-rrdcached\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-rrdtool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-sensors\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-smart\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-snmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-turbostat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-virt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-write_http\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-write_riemann\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-write_sensu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-write_tsdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-zookeeper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcollectdclient\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcollectdclient-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/07/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/05/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2017:1285\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-apache-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-ascent-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-bind-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-ceph-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-chrony-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-curl-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-curl_json-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-curl_xml-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-dbi-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-debuginfo-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-disk-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-dns-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-drbd-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-email-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-generic-jmx-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-hugepages-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-ipmi-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-iptables-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-ipvs-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-java-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-log_logstash-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-lvm-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-mysql-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-netlink-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-nginx-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-notify_desktop-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-notify_email-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-openldap-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-ping-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-postgresql-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-rrdcached-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-rrdtool-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-sensors-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-smart-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-snmp-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-turbostat-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-utils-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-virt-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-write_http-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-write_riemann-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-write_sensu-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-write_tsdb-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-zookeeper-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcollectdclient-5.7.1-4.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcollectdclient-devel-5.7.1-4.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"collectd / collectd-apache / collectd-ascent / collectd-bind / etc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-01-11T14:49:24", "description": "An update for collectd is now available for Red Hat Gluster Storage 3.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\ncollectd is a host-based system statistics collection daemon that gathers metrics from various sources periodically, such as the operating system, applications, log files and devices, and storage clusters. As the daemon does not start up each time it updates files, it has a low system footprint.\n\nFor Red Hat Gluster Storage Web Administration 3.4, collectd service is responsible for gathering metrics from Red Hat Gluster Storage clusters.\n\nThe updated collectd package includes the following security bug fixes.\n\nSecurity Fix(es) :\n\n* collectd: Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions (CVE-2017-7401)\n\n* collectd: double free in csnmp_read_table function in snmp.c (CVE-2017-16820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis updated package contains a number of bug fixes and enhancements, which are documented in detail in the Release Notes, linked in the References.\n\nAll users of collectd are advised to upgrade to these updated packages, which resolve these issues.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2018-09-06T00:00:00", "type": "nessus", "title": "RHEL 7 : Storage Server (RHSA-2018:2615)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-16820", "CVE-2017-7401"], "modified": "2019-10-24T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:collectd", "p-cpe:/a:redhat:enterprise_linux:collectd-debuginfo", "p-cpe:/a:redhat:enterprise_linux:collectd-ping", "p-cpe:/a:redhat:enterprise_linux:libcollectdclient", "cpe:/o:redhat:enterprise_linux:7"], "id": "REDHAT-RHSA-2018-2615.NASL", "href": "https://www.tenable.com/plugins/nessus/117321", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2615. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(117321);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/24 15:35:45\");\n\n script_cve_id(\"CVE-2017-16820\", \"CVE-2017-7401\");\n script_xref(name:\"RHSA\", value:\"2018:2615\");\n\n script_name(english:\"RHEL 7 : Storage Server (RHSA-2018:2615)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for collectd is now available for Red Hat Gluster Storage\n3.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\ncollectd is a host-based system statistics collection daemon that\ngathers metrics from various sources periodically, such as the\noperating system, applications, log files and devices, and storage\nclusters. As the daemon does not start up each time it updates files,\nit has a low system footprint.\n\nFor Red Hat Gluster Storage Web Administration 3.4, collectd service\nis responsible for gathering metrics from Red Hat Gluster Storage\nclusters.\n\nThe updated collectd package includes the following security bug\nfixes.\n\nSecurity Fix(es) :\n\n* collectd: Infinite loop due to incorrect interaction of\nparse_packet() and parse_part_sign_sha256() functions (CVE-2017-7401)\n\n* collectd: double free in csnmp_read_table function in snmp.c\n(CVE-2017-16820)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nThis updated package contains a number of bug fixes and enhancements,\nwhich are documented in detail in the Release Notes, linked in the\nReferences.\n\nAll users of collectd are advised to upgrade to these updated\npackages, which resolve these issues.\"\n );\n # https://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d6c2aef9\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:2615\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-7401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-16820\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:collectd-ping\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libcollectdclient\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/09/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:2615\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL7\", rpm:\"glusterfs-3.12.2\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Storage Server\");\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-5.7.2-3.1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-debuginfo-5.7.2-3.1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"collectd-ping-5.7.2-3.1.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"libcollectdclient-5.7.2-3.1.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"collectd / collectd-debuginfo / collectd-ping / libcollectdclient\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T18:36:10", "description": "Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with \"SecurityLevel None\" and with empty \"AuthFile\" options) via a crafted UDP packet.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-03T14:59:00", "type": "cve", "title": "CVE-2017-7401", "cwe": ["CWE-835"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/a:collectd:collectd:5.7.1"], "id": "CVE-2017-7401", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7401", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:collectd:collectd:5.7.1:*:*:*:*:*:*:*"]}], "ubuntucve": [{"lastseen": "2023-01-26T14:59:49", "description": "Incorrect interaction of the parse_packet() and parse_part_sign_sha256()\nfunctions in network.c in collectd 5.7.1 and earlier allows remote\nattackers to cause a denial of service (infinite loop) of a collectd\ninstance (configured with \"SecurityLevel None\" and with empty \"AuthFile\"\noptions) via a crafted UDP packet.\n\n#### Bugs\n\n * <https://github.com/collectd/collectd/issues/2174>\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859494>\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-03T00:00:00", "type": "ubuntucve", "title": "CVE-2017-7401", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-04-03T00:00:00", "id": "UB:CVE-2017-7401", "href": "https://ubuntu.com/security/CVE-2017-7401", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "debiancve": [{"lastseen": "2023-01-27T18:03:59", "description": "Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with \"SecurityLevel None\" and with empty \"AuthFile\" options) via a crafted UDP packet.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2017-04-03T14:59:00", "type": "debiancve", "title": "CVE-2017-7401", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-7401"], "modified": "2017-04-03T14:59:00", "id": "DEBIANCVE:CVE-2017-7401", "href": "https://security-tracker.debian.org/tracker/CVE-2017-7401", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "ubuntu": [{"lastseen": "2023-01-26T15:25:59", "description": "## Releases\n\n * Ubuntu 16.04 ESM\n * Ubuntu 14.04 ESM\n\n## Packages\n\n * collectd \\- statistics collection and monitoring daemon\n\nIt was discovered that collectd mishandled certain malformed packets. A \nremote attacker could use this vulnerability to cause collectd to crash or \npossibly execute arbitrary code. (CVE-2016-6254)\n\nIt was discovered that collectd failed to handle certain input. An attacker \ncould use this vulnerability to cause collectd to crash. (CVE-2017-16820)\n\nIt was discovered that collectd mishandles certain malformed network \npackets. A remote attacker could use this vulnerability to cause a Denial of \nService or consume system resources. (CVE-2017-7401)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-03-15T00:00:00", "type": "ubuntu", "title": "collectd vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6254", "CVE-2017-16820", "CVE-2017-7401"], "modified": "2021-03-15T00:00:00", "id": "USN-4793-1", "href": "https://ubuntu.com/security/notices/USN-4793-1", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}