The remote host is missing an update for the 'libtiff' package(s) announced via the FEDORA-2023-8daf1023c7 advisory
Reporter | Title | Published | Views | Family All 125 |
---|---|---|---|---|
![]() | CVE-2023-0804 | 13 Feb 202323:15 | – | osv |
![]() | Moderate: libtiff security update | 5 Oct 202321:33 | – | osv |
![]() | Moderate: libtiff security update | 26 Sep 202300:00 | – | osv |
![]() | RHSA-2023:5353 Red Hat Security Advisory: libtiff security update | 16 Sep 202411:59 | – | osv |
![]() | tiff vulnerabilities | 6 Mar 202317:07 | – | osv |
![]() | OPENSUSE-SU-2024:12730-1 libtiff-devel-32bit-4.5.0-3.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | tiff - security update | 21 Feb 202300:00 | – | osv |
![]() | tiff - security update | 24 Feb 202300:00 | – | osv |
![]() | RHSA-2023:3711 Red Hat Security Advisory: libtiff security update | 16 Sep 202411:59 | – | osv |
![]() | Moderate: libtiff security update | 21 Jun 202300:00 | – | osv |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.884720");
script_version("2023-10-12T05:05:32+0000");
script_cve_id("CVE-2023-0804");
script_tag(name:"cvss_base", value:"4.9");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:N/I:N/A:C");
script_tag(name:"last_modification", value:"2023-10-12 05:05:32 +0000 (Thu, 12 Oct 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-02-15 16:07:00 +0000 (Wed, 15 Feb 2023)");
script_tag(name:"creation_date", value:"2023-09-02 01:13:26 +0000 (Sat, 02 Sep 2023)");
script_name("Fedora: Security Advisory for libtiff (FEDORA-2023-8daf1023c7)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC38");
script_xref(name:"Advisory-ID", value:"FEDORA-2023-8daf1023c7");
script_xref(name:"URL", value:"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBF3UUFSB6NB3NFTQSKOOIZGXJP3T34Z");
script_tag(name:"summary", value:"The remote host is missing an update for the 'libtiff'
package(s) announced via the FEDORA-2023-8daf1023c7 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files. TIFF is a widely
used file format for bitmapped images. TIFF files usually end in the
.tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF
format image files.");
script_tag(name:"affected", value:"'libtiff' package(s) on Fedora 38.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "FC38") {
if(!isnull(res = isrpmvuln(pkg:"libtiff", rpm:"libtiff~4.4.0~8.fc38", rls:"FC38"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo