Lucene search

K
openvasCopyright (C) 2013 Greenbone AGOPENVAS:1361412562310881568
HistoryJan 21, 2013 - 12:00 a.m.

CentOS Update for luci CESA-2013:0128 centos5

2013-01-2100:00:00
Copyright (C) 2013 Greenbone AG
plugins.openvas.org
9

6.5 Medium

AI Score

Confidence

Low

3.7 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

34.3%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2013-January/019202.html");
  script_oid("1.3.6.1.4.1.25623.1.0.881568");
  script_version("2023-07-10T08:07:43+0000");
  script_tag(name:"last_modification", value:"2023-07-10 08:07:43 +0000 (Mon, 10 Jul 2023)");
  script_tag(name:"creation_date", value:"2013-01-21 09:41:29 +0530 (Mon, 21 Jan 2013)");
  script_cve_id("CVE-2012-3359");
  script_tag(name:"cvss_base", value:"3.7");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:H/Au:N/C:P/I:P/A:P");
  script_xref(name:"CESA", value:"2013:0128");
  script_name("CentOS Update for luci CESA-2013:0128 centos5");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'luci'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_family("CentOS Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
  script_tag(name:"affected", value:"luci on CentOS 5");
  script_tag(name:"solution", value:"Please install the updated packages.");
  script_tag(name:"insight", value:"The Conga project is a management system for remote workstations. It
  consists of luci, which is a secure web-based front end, and ricci, which
  is a secure daemon that dispatches incoming messages to underlying
  management modules.

  It was discovered that luci stored usernames and passwords in session
  cookies. This issue prevented the session inactivity timeout feature from
  working correctly, and allowed attackers able to get access to a session
  cookie to obtain the victim's authentication credentials. (CVE-2012-3359)

  Red Hat would like to thank George Hedfors of Cybercom Sweden East AB for
  reporting this issue.

  This update also fixes the following bugs:

  * Prior to this update, luci did not allow the fence_apc_snmp agent to be
  configured. As a consequence, users could not configure or view an existing
  configuration for fence_apc_snmp. This update adds a new screen that allows
  fence_apc_snmp to be configured. (BZ#832181)

  * Prior to this update, luci did not allow the SSL operation of the
  fence_ilo fence agent to be enabled or disabled. As a consequence, users
  could not configure or view an existing configuration for the 'ssl'
  attribute for fence_ilo. This update adds a checkbox to show whether the
  SSL operation is enabled and allows users to edit that attribute.
  (BZ#832183)

  * Prior to this update, luci did not allow the 'identity_file' attribute of
  the fence_ilo_mp fence agent to be viewed or edited. As a consequence,
  users could not configure or view an existing configuration for the
  'identity_file' attribute of the fence_ilo_mp fence agent. This update adds
  a text input box to show the current state of the 'identity_file' attribute
  of fence_ilo_mp and allows users to edit that attribute. (BZ#832185)

  * Prior to this update, redundant files and directories remained on the
  file system at /var/lib/luci/var/pts and /usr/lib{, 64}/luci/zope/var/pts
  when the luci package was uninstalled. This update removes these files
  and directories when the luci package is uninstalled. (BZ#835649)

  * Prior to this update, the 'restart-disable' recovery policy was not
  displayed in the recovery policy list from which users could select when
  they configure a recovery policy for a failover domain. As a consequence,
  the 'restart-disable' recovery policy could not be set with the luci GUI.
  This update adds the 'restart-disable' recovery option to the recovery
  policy pulldown list. (BZ#839732)

  * Prior to this update, line breaks that were not anticipated in the 'yum ...

  Description truncated, please see the referenced URL(s) for more information.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";

if(release == "CentOS5")
{

  if ((res = isrpmvuln(pkg:"luci", rpm:"luci~0.12.2~64.el5.centos", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"ricci", rpm:"ricci~0.12.2~64.el5.centos", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"conga", rpm:"conga~0.12.2~64.el5.centos", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}

6.5 Medium

AI Score

Confidence

Low

3.7 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

34.3%