Lucene search

K

Fedora: Security Advisory (FEDORA-2024-6d1d9f70d2)

🗓️ 25 Jan 2024 00:00:00Reported by Copyright (C) 2024 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 5 Views

Fedora: Security Advisory for fonttools (FEDORA-2024-6d1d9f70d2) The 'fonttools' package(s) on Fedora 39 are missing an update. fontTools is a Python library for manipulating fonts, which includes a tool to convert fonts to and from XML text format (TTX)

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Veracode
XML External Entity Injection
10 Jan 202406:41
veracode
Debian CVE
CVE-2023-45139
10 Jan 202416:15
debiancve
OSV
fonttools XML External Entity Injection (XXE) Vulnerability
9 Jan 202416:01
osv
OSV
CVE-2023-45139
10 Jan 202416:15
osv
NVD
CVE-2023-45139
10 Jan 202416:15
nvd
Tenable Nessus
Fedora 39 : fonttools (2024-6d1d9f70d2)
24 Jan 202400:00
nessus
Tenable Nessus
Linux Distros Unpatched Vulnerability : CVE-2023-45139
5 Mar 202500:00
nessus
UbuntuCve
CVE-2023-45139
10 Jan 202400:00
ubuntucve
RedhatCVE
CVE-2023-45139
11 Jan 202406:30
redhatcve
Cvelist
CVE-2023-45139 fonttools XML External Entity Injection (XXE) Vulnerability
10 Jan 202416:03
cvelist
Rows per page
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.885612");
  script_cve_id("CVE-2023-45139");
  script_tag(name:"creation_date", value:"2024-01-25 02:01:57 +0000 (Thu, 25 Jan 2024)");
  script_version("2024-09-13T05:05:46+0000");
  script_tag(name:"last_modification", value:"2024-09-13 05:05:46 +0000 (Fri, 13 Sep 2024)");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-01-10 16:15:46 +0000 (Wed, 10 Jan 2024)");

  script_name("Fedora: Security Advisory (FEDORA-2024-6d1d9f70d2)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Fedora Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC39");

  script_xref(name:"Advisory-ID", value:"FEDORA-2024-6d1d9f70d2");
  script_xref(name:"URL", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2024-6d1d9f70d2");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2257808");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2257809");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'fonttools' package(s) announced via the FEDORA-2024-6d1d9f70d2 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"Security fix for CVE-2023-45139");

  script_tag(name:"affected", value:"'fonttools' package(s) on Fedora 39.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "FC39") {

  if(!isnull(res = isrpmvuln(pkg:"fonttools", rpm:"fonttools~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"fonttools-debugsource", rpm:"fonttools-debugsource~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+graphite", rpm:"python3-fonttools+graphite~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+interpolatable", rpm:"python3-fonttools+interpolatable~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+lxml", rpm:"python3-fonttools+lxml~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+plot", rpm:"python3-fonttools+plot~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+symfont", rpm:"python3-fonttools+symfont~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+type1", rpm:"python3-fonttools+type1~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+ufo", rpm:"python3-fonttools+ufo~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+unicode", rpm:"python3-fonttools+unicode~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools+woff", rpm:"python3-fonttools+woff~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools", rpm:"python3-fonttools~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"python3-fonttools-debuginfo", rpm:"python3-fonttools-debuginfo~4.43.1~1.fc39", rls:"FC39"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo