Huawei EulerOS: Security Advisory for gvfs (EulerOS-SA-2019-2156)
2020-01-23T00:00:00
ID OPENVAS:1361412562311220192156 Type openvas Reporter Copyright (C) 2020 Greenbone Networks GmbH Modified 2020-01-23T00:00:00
Description
The remote host is missing an update for the Huawei EulerOS
# Copyright (C) 2020 Greenbone Networks GmbH
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (C) the respective author(s)
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2019.2156");
script_version("2020-01-23T12:36:54+0000");
script_cve_id("CVE-2019-3827");
script_tag(name:"cvss_base", value:"3.3");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:P/I:P/A:N");
script_tag(name:"last_modification", value:"2020-01-23 12:36:54 +0000 (Thu, 23 Jan 2020)");
script_tag(name:"creation_date", value:"2020-01-23 12:36:54 +0000 (Thu, 23 Jan 2020)");
script_name("Huawei EulerOS: Security Advisory for gvfs (EulerOS-SA-2019-2156)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROS-2\.0SP5");
script_xref(name:"EulerOS-SA", value:"2019-2156");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2156");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS
'gvfs' package(s) announced via the EulerOS-SA-2019-2156 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.(CVE-2019-3827)");
script_tag(name:"affected", value:"'gvfs' package(s) on Huawei EulerOS V2.0SP5.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP5") {
if(!isnull(res = isrpmvuln(pkg:"gvfs", rpm:"gvfs~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-afc", rpm:"gvfs-afc~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-afp", rpm:"gvfs-afp~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-archive", rpm:"gvfs-archive~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-client", rpm:"gvfs-client~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-devel", rpm:"gvfs-devel~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-fuse", rpm:"gvfs-fuse~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-goa", rpm:"gvfs-goa~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-gphoto2", rpm:"gvfs-gphoto2~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-mtp", rpm:"gvfs-mtp~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"gvfs-smb", rpm:"gvfs-smb~1.30.4~5.h3.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
{"id": "OPENVAS:1361412562311220192156", "type": "openvas", "bulletinFamily": "scanner", "title": "Huawei EulerOS: Security Advisory for gvfs (EulerOS-SA-2019-2156)", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "published": "2020-01-23T00:00:00", "modified": "2020-01-23T00:00:00", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192156", "reporter": "Copyright (C) 2020 Greenbone Networks GmbH", "references": ["2019-2156", "https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2156"], "cvelist": ["CVE-2019-3827"], "lastseen": "2020-01-27T18:33:01", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2019-2156", "CVE-2019-3827"]}, {"type": "nessus", "idList": ["UBUNTU_USN-3888-1.NASL", "ORACLELINUX_ELSA-2019-1517.NASL", "SUSE_SU-2019-0438-1.NASL", "NEWSTART_CGSL_NS-SA-2019-0238_GVFS.NASL", "EULEROS_SA-2019-2156.NASL", "NEWSTART_CGSL_NS-SA-2019-0224_GVFS.NASL", "REDHAT-RHSA-2019-2145.NASL", "CENTOS_RHSA-2019-2145.NASL", "SL_20190806_GVFS_ON_SL7_X.NASL", "REDHAT-RHSA-2019-1517.NASL"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:0261-1"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-2145", "ELSA-2019-1517", "ELSA-2019-3553"]}, {"type": "redhat", "idList": ["RHSA-2019:1517", "RHSA-2019:2145"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310852321", "OPENVAS:1361412562310843906"]}, {"type": "centos", "idList": ["CESA-2019:2145"]}, {"type": "ubuntu", "idList": ["USN-3888-1"]}], "modified": "2020-01-27T18:33:01", "rev": 2}, "score": {"value": 7.1, "vector": "NONE", "modified": "2020-01-27T18:33:01", "rev": 2}, "vulnersScore": 7.1}, "pluginID": "1361412562311220192156", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2156\");\n script_version(\"2020-01-23T12:36:54+0000\");\n script_cve_id(\"CVE-2019-3827\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:36:54 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:36:54 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for gvfs (EulerOS-SA-2019-2156)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2156\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2156\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'gvfs' package(s) announced via the EulerOS-SA-2019-2156 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.(CVE-2019-3827)\");\n\n script_tag(name:\"affected\", value:\"'gvfs' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs\", rpm:\"gvfs~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-afc\", rpm:\"gvfs-afc~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-afp\", rpm:\"gvfs-afp~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-archive\", rpm:\"gvfs-archive~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-client\", rpm:\"gvfs-client~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-devel\", rpm:\"gvfs-devel~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-fuse\", rpm:\"gvfs-fuse~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-goa\", rpm:\"gvfs-goa~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-gphoto2\", rpm:\"gvfs-gphoto2~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-mtp\", rpm:\"gvfs-mtp~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-smb\", rpm:\"gvfs-smb~1.30.4~5.h3.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "naslFamily": "Huawei EulerOS Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T21:41:52", "description": "An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.", "edition": 9, "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.0, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-03-25T18:29:00", "title": "CVE-2019-3827", "type": "cve", "cwe": ["CWE-863"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.3, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-3827"], "modified": "2020-10-19T18:06:00", "cpe": [], "id": "CVE-2019-3827", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3827", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": []}], "centos": [{"lastseen": "2019-12-20T18:28:42", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "**CentOS Errata and Security Advisory** CESA-2019:2145\n\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es):\n\n* gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2019-August/005897.html\n\n**Affected packages:**\ngvfs\ngvfs-afc\ngvfs-afp\ngvfs-archive\ngvfs-client\ngvfs-devel\ngvfs-fuse\ngvfs-goa\ngvfs-gphoto2\ngvfs-mtp\ngvfs-smb\ngvfs-tests\n\n**Upstream details at:**\n", "edition": 2, "modified": "2019-08-30T02:58:14", "published": "2019-08-30T02:58:14", "id": "CESA-2019:2145", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2019-August/005897.html", "title": "gvfs security update", "type": "centos", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:32:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "description": "The remote host is missing an update for the ", "modified": "2019-04-01T00:00:00", "published": "2019-02-13T00:00:00", "id": "OPENVAS:1361412562310843906", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843906", "type": "openvas", "title": "Ubuntu Update for gvfs USN-3888-1", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843906\");\n script_version(\"2019-04-01T07:47:16+0000\");\n script_cve_id(\"CVE-2019-3827\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-04-01 07:47:16 +0000 (Mon, 01 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-02-13 04:04:28 +0100 (Wed, 13 Feb 2019)\");\n script_name(\"Ubuntu Update for gvfs USN-3888-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(18\\.04 LTS|18\\.10)\");\n\n script_xref(name:\"USN\", value:\"3888-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3888-1/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gvfs'\n package(s) announced via the USN-3888-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that GVfs incorrectly handled certain inputs. An\nattacker could possibly use this issue to access sensitive information.\");\n\n script_tag(name:\"affected\", value:\"gvfs on Ubuntu 18.10,\n Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU18.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gvfs\", ver:\"1.36.1-0ubuntu1.3\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"gvfs-backends\", ver:\"1.36.1-0ubuntu1.3\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU18.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"gvfs\", ver:\"1.38.1-0ubuntu1.2\", rls:\"UBUNTU18.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"gvfs-backends\", ver:\"1.38.1-0ubuntu1.2\", rls:\"UBUNTU18.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-01-31T16:51:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2019-02-28T00:00:00", "id": "OPENVAS:1361412562310852321", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852321", "type": "openvas", "title": "openSUSE: Security Advisory for gvfs (openSUSE-SU-2019:0261-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852321\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2019-3827\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-02-28 04:07:33 +0100 (Thu, 28 Feb 2019)\");\n script_name(\"openSUSE: Security Advisory for gvfs (openSUSE-SU-2019:0261-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2019:0261-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00072.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'gvfs'\n package(s) announced via the openSUSE-SU-2019:0261-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for gvfs fixes the following issues:\n\n Security vulnerability fixed:\n\n - CVE-2019-3827: Fixed an issue whereby an unprivileged user was not\n prompted to give a password when accessing root owned files. (bsc#1125084)\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2019-261=1\");\n\n script_tag(name:\"affected\", value:\"gvfs on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n if(!isnull(res = isrpmvuln(pkg:\"gvfs\", rpm:\"gvfs~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-backend-afc\", rpm:\"gvfs-backend-afc~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-backend-afc-debuginfo\", rpm:\"gvfs-backend-afc-debuginfo~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-backend-samba\", rpm:\"gvfs-backend-samba~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-backend-samba-debuginfo\", rpm:\"gvfs-backend-samba-debuginfo~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-backends\", rpm:\"gvfs-backends~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-backends-debuginfo\", rpm:\"gvfs-backends-debuginfo~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-debuginfo\", rpm:\"gvfs-debuginfo~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-debugsource\", rpm:\"gvfs-debugsource~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-devel\", rpm:\"gvfs-devel~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-fuse\", rpm:\"gvfs-fuse~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-fuse-debuginfo\", rpm:\"gvfs-fuse-debuginfo~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-lang\", rpm:\"gvfs-lang~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-32bit\", rpm:\"gvfs-32bit~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"gvfs-32bit-debuginfo\", rpm:\"gvfs-32bit-debuginfo~1.34.2.1~lp150.3.6.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}], "oraclelinux": [{"lastseen": "2019-08-19T21:11:48", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "[1.36.2-2.1]\n- CVE-2019-3827: Prevent access if any authentication agent isn't available (#1690470)\n[1.36.2-2]\n- rebuild", "edition": 1, "modified": "2019-07-30T00:00:00", "published": "2019-07-30T00:00:00", "id": "ELSA-2019-1517", "href": "http://linux.oracle.com/errata/ELSA-2019-1517.html", "title": "gvfs security update", "type": "oraclelinux", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-08-14T08:36:01", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "[1.36.2-3]\n- Force NT1 protocol version for workgroup support (#1619719)\n[1.36.2-2]\n- Prevent spawning new daemons if outgoing operation exists (#1632960)\n- CVE-2019-3827: Prevent access if any authentication agent isnt available (#1673887)", "edition": 1, "modified": "2019-08-13T00:00:00", "published": "2019-08-13T00:00:00", "id": "ELSA-2019-2145", "href": "http://linux.oracle.com/errata/ELSA-2019-2145.html", "title": "gvfs security and bug fix update", "type": "oraclelinux", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-10-22T17:14:56", "bulletinFamily": "unix", "cvelist": ["CVE-2019-12795", "CVE-2019-11459", "CVE-2019-3827"], "description": "accountsservice\n[0.6.50-7]\n- Dont send change updates for login history changes\n Resolves: #1713080\nappstream-data\n[8-20190805]\n- Regenerate the RHEL metadata to include the latest cockpit changes\n- Resolves: #1673011\n[8-20190719]\n- Regenerate the RHEL metadata\n- Resolves: #1673011\n[8-20180721]\n- Regenerate the RHEL metadata using rhel-8.0-appstream\n[8-20180720]\n- Regenerate the RHEL metadata using rhel-8.0-candidate\nbaobab\n[3.28.0-2]\n- Fix gschema translations (rhbz#1705583)\nchrome-gnome-shell\n[10.1-6]\n- Install icons in 'hicolor' instead of 'gnome'\n Related: #1694203\n[10.1-5]\n- bump release num to correctly start gating process\n Related: #1694203\n[10.1-4]\n- Adjust Fedora spec to build on RHEL:\n - build missing BuildRequire\n Related: #1694203\n[10.1-4]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild\n[10.1-3]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild\n[10.1-2]\n- Rebuilt for Python 3.7\n[10.1-1]\n- Update to 10.1\n[9-4]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild\n[9-3]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild\n[9-2]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild\n[9-1]\n- Update to 9\n[8.2-2]\n- Package review fixes (#1343710)\n- Validate the desktop file\n- Dont own /etc/opt directory\n- Depend on mozilla-filesystem instead of co-owning mozilla directories\n- Depend on dbus and gnome-icon-theme/hicolor-icon-theme for directory\n ownership\n[8.2-1]\n- Update to 8.2\n- Simplify files list\n- Build with Python 3 (#1343710)\n- Add missing python3-requests dependency (#1343710)\n- Update package description\n[6.1-1]\n- Update to 6.1\n[6-1]\n- Update to Ver.6\n- Fix 'orphaned directory'\n[5.2-1]\n- Initial package.\nevince\n[3.28.4-3]\n- Add requirement on evince-libs for nautilus and browser-plugin\n- subpackages (RPMDiff)\n- Related: #1717353\n[3.28.4-2]\n- Handle failure from TIFFReadRGBAImageOriented()\n- Resolves: #1717353\nfile-roller\n[3.28.1-2]\n- Remove nautilus extension subpackage (#1638813)\ngdk-pixbuf2\n[2.36.12-5]\n- Disable mmx support\n Resolves: #1630565\n[2.36.12-4]\n- Install missing test image\n Related: #1625683\n- Fix up tests.yml\n[2.36.12-3]\n- rebuild\ngdm\n[3.28.3-22]\n- Ensure user session is killed with its worker and that all\n user sessions are cleaned up on shutdown\n Resolves: #1690714\n[3.28.3-21]\n- Drop gdm-screenshot\n Resolves: #1680164\ngjs\n[1.56.2-3]\n- Rebuild for mozjs60 s390x fixes\n- Related: #1746889\n[1.56.2-1]\n- Update to 1.56.2\n Resolves: #1698923\ngnome-control-center\n[3.28.2-5]\n- Update wacom panel to newer 'output' setting\n- Resolves: #1718133\ngnome-desktop3\n[3.32.2-1]\n- Rebase to 3.32.2\n Resolves: #1719241\n[3.28.2-2]\n- rebuild\ngnome-remote-desktop\n[0.1.6-5]\n- Bump the version to make gating happy - thats bug 1681618\n- Resolves: rhbz#1713330\n[0.1.6-4]\n- Backport password override test helper (rhbz#1713330)\ngnome-settings-daemon\ngnome-shell\n[3.32.2-9]\n- Depend on correct gsettings-desktop-schemas version\n Related: #1704355\n[3.32.2-8]\n- Depend on required gsettings-desktop-schemas version\n Related: #1704355\n[3.32.2-7]\n- Make the hot corner optional\n Resolves: #1704355\n[3.32.2-6]\n- Fix warnings triggered by spurious allocations\n Resolves: #1719279\n[3.32.2-5]\n- Fix infinite loop in spinner animation\n Resolves: #1725555\n[3.32.2-4]\n- Adjust more shortcut handlers for horizontal workspaces\n Related: #1704360\n[3.32.2-3]\n- Support horizontal workspaces in gestures/keybindings/animations\n Related: #1704360\n[3.32.2-2]\n- Adjust downstream patch to mutter changes\n Resolves: #1715738\n[3.32.2-1]\n- Update to 3.32.2\n Resolves: #1698520\ngnome-shell-extensions\n[3.32.1-10]\n- Drop obsolete downstream style patch\n- Keep classic notification styling\n Related: #1731372\n[3.32.1-9]\n- Backport classic style improvements\n Resolves: #1726093\n[3.32.1-8]\n- Allow closing window picker with Escape\n Resolves: #1725854\n[3.32-1-7]\n- Add window thumbnails to workspace switcher\n Resolves: #1723467\n- Fix apps-menu not disabling itself entirely\n Resolves: #1722047\n[3.32-1-6]\n- Fix new classic mode issues:\n - stray signal handler with overlay key\n Resolves: #1722844\n - improve DND support:\n + dont consider regular windows\n (it doesnt work well, and GNOME 2 didnt support it either)\n + indicate that workspace thumbs are drop targets\n Related: #1704360\n[3.32.1-5]\n- Small refinements after design feedback:\n - use default icon size in picker button to avoid blurriness\n - use \n shortcut to open window picker\n Resolves: #1721195\n[3.32.1-4]\n- Dont add apps-menu logo when activities button is present\n Resolves: #1721195\n[3.32.1-3]\n- Make classic mode more classic\n Resolves: #1704360\n[3.32.1-2]\n- Fix top-icons sizing issue\n Resolves: #1715765\n[3.32.1-1]\n- Update to 3.32.1\n Resolves: #1713453\ngnome-software\n[3.30.6-2]\n- Hide addons that are not available in repos\n- Resolves: #1719779\ngnome-tweaks\n[3.28.1-6]\n- top-bar: Drop ApplicationMenu tweak\n- Resolves: #1726656\n[3.28.1-5]\n- settings: Drop override settings support\n- Resolves: #1725741\n[3.28.1-4]\n- extensions: Fix opening system installed extensions in gnome-software\n- Resolves: #1721575\n[3.28.1-3]\n- Fix reflect extension status in the UI\n- Resolves: #1679127\n[3.28.1-2]\n- Reflect extension status in the UI\n- Resolves: #1679127\ngsettings-desktop-schemas\n[3.32-0-3]\n- Backport 'enable-hot-corners' setting\n Resolves: #1704355\n[3.32.0-2]\n- Restore previous monospace font default\n Resolves: #1715761\n[3.32.0-1]\n- Update to 3.32.0\n Resolves: #1698930\n[3.28.1-2]\n- Add mount-removable-storage-devices-as-read-only option\n- Resovles: #1709937\ngtk3\n[3.22.30-4]\n- Include headerbar buttons in accessibility (rhbz#1723836)\ngvfs\n[1.36.2-6]\n- Prevent spawning new daemons if outgoing operation exists (#1739117)\n- Force NT1 protocol version for workgroup support (#1739116)\n[1.36.2-5]\n- CVE-2019-12795 Check that the connecting client is the same user (#1729885)\n[1.36.2-4]\n- Handle lockdown option to disable writing (#1662193)\n[1.36.2-3]\n- CVE-2019-3827: Prevent access if any authentication agent isnt available (#1673888)\nmozjs60\n[60.9.0-3]\n- Fix multilib conflicts in js-config.h\n[60.9.0-2]\n- Backport patches for s390x support\n- Resolves: #1746889\nmutter\n[3.32.2-10]\n- Dont focus or activate unmanaging windows\n Resolves: #1741547\n[3.32.2-9]\n- Another 16bpp graphics card crash\n Related: #1735382\n Resolves: #1737326\n[3.32.2-8]\n- Fix crash in window icon handling on 16bpp graphics cards\n Resolves: #1735382\n[3.32.2-7]\n- Fix bug leading to 100% cpu usage on suspend/resume\n Resolves: #1724551\n[3.32.2-6]\n- Dont ignore current mode when deriving current config\n Resolves: #1690506\n[3.32.2-5]\n- Ensure pad XDevices do not get buttons remapped\n Resolves: #1687949\n[3.32.2-4]\n- Expose workspace layout as properties\n Related: #1704360\n[3.32.2-3]\n- Avoid arch-specific bits in header comments\n Related: #1698884\n[3.32.2-2]\n- Fix a couple of issues pointed out by covscan\n Resolves: #1698884\n[3.32.2-1]\n- Update to 3.32.2\n Resolves: #1698884\nnautilus\n[3.28.1-10]\n- Add screenshots for GNOME Software in Appdata file (rhbz#1725107)\n- Add website link to About dialog (rhbz#1725101)\n- Use Files instead of Nautilus in Appdata file (rhbz#1725120)\n- Add nautilus-autorun-software man page (rhbz#1725766)\n[3.28.1-9]\n- Fix criticals when connecting to remote locations (rhbz#1643175)\n- Remove geometry option from man page (rhbz#1612852)\n[3.26.1-8]\n- Remove NFS support strings, since libnfs is not in RHEL\n Resolves: RHBZ#1704704\n[3.28.1-7]\n- Disable extension doc generation, since generated files differ and\n rpmlint fails when checking that both architectures of the -devel\n library generate the same files.\n Its an issue in docbook, used by gtk-doc, and althought fixed upstream\n they didnt have a new release yet.\n https://github.com/docbook/xslt10-stylesheets/issues/54\n Resolves: RHBZ#1667136\n[3.28.1-6]\n- Implement support for desktop icons renaming\n Resolves: RHBZ#1667136\npango\n[1.42.4-6]\n- Rebuild\n- Resolves: #1738462\npidgin\n[2.13.0-5]\n- Drop ICQ support in RHEL and port Jabber to GHmac\n- Update License\nResolves: #1637801\nplymouth\nSDL\n[1.2.15-35]\n- Rebuild after gating\n- Resolves: rhbz#1602687\n[1.2.15-34]\n- Rebuild\n- Resolves: rhbz#1602687\n[1.2.15-33]\n- Small fixes for problems found by coverity\n- Resolves: rhbz#1602687\nwayland-protocols\n[1.17-1]\n- Update to 1.17\n Resolves: #1713685\nwebkit2gtk3\n[2.24.3-1]\n- Resolves: rhbz#1728277 Update to 2.24.3\n[2.24.2-2]\n- Related: rhbz#1696708 Use enchant instead of enchant-2 on aarch64 and s390x\n[2.24.2-1]\n- Resolves: rhbz#1696708 Rebase to 2.24.2\n- Resolves: rhbz#1592271 Switch to Python 3 for build", "edition": 2, "modified": "2019-11-14T00:00:00", "published": "2019-11-14T00:00:00", "id": "ELSA-2019-3553", "href": "http://linux.oracle.com/errata/ELSA-2019-3553.html", "title": "GNOME security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:38:45", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "It was discovered that GVfs incorrectly handled certain inputs. An attacker \ncould possibly use this issue to access sensitive information.", "edition": 4, "modified": "2019-02-12T00:00:00", "published": "2019-02-12T00:00:00", "id": "USN-3888-1", "href": "https://ubuntu.com/security/notices/USN-3888-1", "title": "GVfs vulnerability", "type": "ubuntu", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}], "suse": [{"lastseen": "2019-02-27T15:30:10", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "This update for gvfs fixes the following issues:\n\n Security vulnerability fixed:\n\n - CVE-2019-3827: Fixed an issue whereby an unprivileged user was not\n prompted to give a password when acessing root owned files. (bsc#1125084)\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-02-27T12:18:13", "published": "2019-02-27T12:18:13", "id": "OPENSUSE-SU-2019:0261-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00072.html", "title": "Security update for gvfs (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}], "redhat": [{"lastseen": "2019-08-13T18:46:10", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es):\n\n* gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-06-18T21:01:00", "published": "2019-06-18T20:34:27", "id": "RHSA-2019:1517", "href": "https://access.redhat.com/errata/RHSA-2019:1517", "type": "redhat", "title": "(RHSA-2019:1517) Moderate: gvfs security update", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2019-08-15T00:44:28", "bulletinFamily": "unix", "cvelist": ["CVE-2019-3827"], "description": "GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es):\n\n* gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.", "modified": "2019-08-06T13:46:39", "published": "2019-08-06T12:06:27", "id": "RHSA-2019:2145", "href": "https://access.redhat.com/errata/RHSA-2019:2145", "type": "redhat", "title": "(RHSA-2019:2145) Moderate: gvfs security and bug fix update", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}], "nessus": [{"lastseen": "2021-01-01T06:16:00", "description": "This update for gvfs fixes the following issues :\n\nSecurity vulnerability fixed :\n\nCVE-2019-3827: Fixed an issue whereby an unprivileged user was not\nprompted to give a password when acessing root owned files.\n(bsc#1125084)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 18, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-02-20T00:00:00", "title": "SUSE SLED15 / SLES15 Security Update : gvfs (SUSE-SU-2019:0438-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:gvfs-backend-afc", "p-cpe:/a:novell:suse_linux:gvfs-backends-debuginfo", "p-cpe:/a:novell:suse_linux:gvfs", "cpe:/o:novell:suse_linux:15", "p-cpe:/a:novell:suse_linux:gvfs-debuginfo", "p-cpe:/a:novell:suse_linux:gvfs-backend-samba-debuginfo", "p-cpe:/a:novell:suse_linux:gvfs-debugsource", "p-cpe:/a:novell:suse_linux:gvfs-fuse", "p-cpe:/a:novell:suse_linux:gvfs-backend-samba", "p-cpe:/a:novell:suse_linux:gvfs-devel", "p-cpe:/a:novell:suse_linux:gvfs-backend-afc-debuginfo", "p-cpe:/a:novell:suse_linux:gvfs-fuse-debuginfo", "p-cpe:/a:novell:suse_linux:gvfs-backends"], "id": "SUSE_SU-2019-0438-1.NASL", "href": "https://www.tenable.com/plugins/nessus/122342", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:0438-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122342);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/02/10\");\n\n script_cve_id(\"CVE-2019-3827\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : gvfs (SUSE-SU-2019:0438-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for gvfs fixes the following issues :\n\nSecurity vulnerability fixed :\n\nCVE-2019-3827: Fixed an issue whereby an unprivileged user was not\nprompted to give a password when acessing root owned files.\n(bsc#1125084)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1125084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-3827/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20190438-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?135e0c7d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t\npatch SUSE-SLE-Module-Desktop-Applications-15-2019-438=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-backend-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-backend-afc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-backend-samba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-backend-samba-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-backends\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-backends-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gvfs-fuse-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-backend-afc-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-backend-afc-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-backend-samba-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-backend-samba-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-backends-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-backends-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-debugsource-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-devel-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-fuse-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gvfs-fuse-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-backend-afc-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-backend-afc-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-backend-samba-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-backend-samba-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-backends-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-backends-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-debuginfo-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-debugsource-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-devel-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-fuse-1.34.2.1-4.6.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gvfs-fuse-debuginfo-1.34.2.1-4.6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-01T01:30:28", "description": "An update for gvfs is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.7 Release Notes linked from the References section.", "edition": 16, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-08-30T00:00:00", "title": "CentOS 7 : gvfs (CESA-2019:2145)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:centos:centos:gvfs-afc", "p-cpe:/a:centos:centos:gvfs-tests", "p-cpe:/a:centos:centos:gvfs-mtp", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:gvfs-client", "p-cpe:/a:centos:centos:gvfs-goa", "p-cpe:/a:centos:centos:gvfs-devel", "p-cpe:/a:centos:centos:gvfs", "p-cpe:/a:centos:centos:gvfs-archive", "p-cpe:/a:centos:centos:gvfs-afp", "p-cpe:/a:centos:centos:gvfs-fuse", "p-cpe:/a:centos:centos:gvfs-smb", "p-cpe:/a:centos:centos:gvfs-gphoto2"], "id": "CENTOS_RHSA-2019-2145.NASL", "href": "https://www.tenable.com/plugins/nessus/128364", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:2145 and \n# CentOS Errata and Security Advisory 2019:2145 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(128364);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/12/31\");\n\n script_cve_id(\"CVE-2019-3827\");\n script_xref(name:\"RHSA\", value:\"2019:2145\");\n\n script_name(english:\"CentOS 7 : gvfs (CESA-2019:2145)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for gvfs is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.7 Release Notes linked from the References section.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2019-August/005897.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4dbd51e8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gvfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-3827\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-afp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-archive\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-goa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-gphoto2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-mtp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-smb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:gvfs-tests\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-afc-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-afp-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-archive-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-client-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-devel-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-fuse-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-goa-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-gphoto2-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-mtp-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-smb-1.36.2-3.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"gvfs-tests-1.36.2-3.el7\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs / gvfs-afc / gvfs-afp / gvfs-archive / gvfs-client / etc\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-01T05:18:19", "description": "An update for gvfs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.", "edition": 18, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-06-19T00:00:00", "title": "RHEL 8 : gvfs (RHSA-2019:1517)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:gvfs-fuse", "p-cpe:/a:redhat:enterprise_linux:gvfs-smb", "p-cpe:/a:redhat:enterprise_linux:gvfs-afp-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs", "p-cpe:/a:redhat:enterprise_linux:gvfs-afp", "p-cpe:/a:redhat:enterprise_linux:gvfs-client-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-debugsource", "p-cpe:/a:redhat:enterprise_linux:gvfs-mtp", "p-cpe:/a:redhat:enterprise_linux:gvfs-goa", "p-cpe:/a:redhat:enterprise_linux:gvfs-mtp-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2", "p-cpe:/a:redhat:enterprise_linux:gvfs-devel", "p-cpe:/a:redhat:enterprise_linux:gvfs-smb-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-afc", "p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2-debuginfo", "cpe:/o:redhat:enterprise_linux:8.0", "p-cpe:/a:redhat:enterprise_linux:gvfs-archive", "p-cpe:/a:redhat:enterprise_linux:gvfs-goa-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-fuse-debuginfo", "cpe:/o:redhat:enterprise_linux:8", "p-cpe:/a:redhat:enterprise_linux:gvfs-archive-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-afc-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs-client"], "id": "REDHAT-RHSA-2019-1517.NASL", "href": "https://www.tenable.com/plugins/nessus/126026", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:1517. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126026);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2020/01/30\");\n\n script_cve_id(\"CVE-2019-3827\");\n script_xref(name:\"RHSA\", value:\"2019:1517\");\n\n script_name(english:\"RHEL 8 : gvfs (RHSA-2019:1517)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for gvfs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:1517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-3827\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-afc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-afp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-afp-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-archive\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-archive-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-fuse-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-goa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-goa-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-mtp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-mtp-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-smb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-smb-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 8.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:1517\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL8\", sp:\"0\", cpu:\"i686\", reference:\"gvfs-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-afc-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-afc-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-afc-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-afp-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-afp-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-afp-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-afp-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-archive-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-archive-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-archive-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-archive-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-client-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-client-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-client-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-client-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-client-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-client-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-debugsource-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-debugsource-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-debugsource-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-devel-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-devel-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-devel-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-fuse-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-fuse-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-fuse-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-fuse-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-fuse-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-goa-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-goa-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-goa-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-goa-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-gphoto2-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-gphoto2-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-gphoto2-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-gphoto2-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-gphoto2-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-mtp-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-mtp-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-mtp-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-mtp-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-mtp-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-smb-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-smb-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"i686\", reference:\"gvfs-smb-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"s390x\", reference:\"gvfs-smb-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"gvfs-smb-debuginfo-1.36.2-2.el8_0.1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs / gvfs-afc / gvfs-afc-debuginfo / gvfs-afp / etc\");\n }\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-01T04:46:11", "description": "From Red Hat Security Advisory 2019:1517 :\n\nAn update for gvfs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.", "edition": 17, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-08-12T00:00:00", "title": "Oracle Linux 8 : gvfs (ELSA-2019-1517)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:gvfs-gphoto2", "p-cpe:/a:oracle:linux:gvfs-archive", "p-cpe:/a:oracle:linux:gvfs-smb", "cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:gvfs-afc", "p-cpe:/a:oracle:linux:gvfs-client", "p-cpe:/a:oracle:linux:gvfs-goa", "p-cpe:/a:oracle:linux:gvfs", "p-cpe:/a:oracle:linux:gvfs-mtp", "p-cpe:/a:oracle:linux:gvfs-afp", "p-cpe:/a:oracle:linux:gvfs-devel", "p-cpe:/a:oracle:linux:gvfs-fuse"], "id": "ORACLELINUX_ELSA-2019-1517.NASL", "href": "https://www.tenable.com/plugins/nessus/127591", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2019:1517 and \n# Oracle Linux Security Advisory ELSA-2019-1517 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127591);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2020/01/06\");\n\n script_cve_id(\"CVE-2019-3827\");\n script_xref(name:\"RHSA\", value:\"2019:1517\");\n\n script_name(english:\"Oracle Linux 8 : gvfs (ELSA-2019-1517)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2019:1517 :\n\nAn update for gvfs is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2019-August/008982.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gvfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-afp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-archive\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-goa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-gphoto2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-mtp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-smb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 8\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-afc-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-afp-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-archive-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-client-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-devel-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-fuse-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-goa-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-gphoto2-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-mtp-1.36.2-2.el8_0.1\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"gvfs-smb-1.36.2-2.el8_0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs / gvfs-afc / gvfs-afp / gvfs-archive / gvfs-client / etc\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-01T05:19:08", "description": "An update for gvfs is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.7 Release Notes linked from the References section.", "edition": 17, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-08-12T00:00:00", "title": "RHEL 7 : gvfs (RHSA-2019:2145)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:gvfs-fuse", "p-cpe:/a:redhat:enterprise_linux:gvfs-smb", "p-cpe:/a:redhat:enterprise_linux:gvfs-tests", "p-cpe:/a:redhat:enterprise_linux:gvfs-debuginfo", "p-cpe:/a:redhat:enterprise_linux:gvfs", "p-cpe:/a:redhat:enterprise_linux:gvfs-afp", "p-cpe:/a:redhat:enterprise_linux:gvfs-mtp", "p-cpe:/a:redhat:enterprise_linux:gvfs-goa", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2", "p-cpe:/a:redhat:enterprise_linux:gvfs-devel", "p-cpe:/a:redhat:enterprise_linux:gvfs-afc", "p-cpe:/a:redhat:enterprise_linux:gvfs-archive", "p-cpe:/a:redhat:enterprise_linux:gvfs-client"], "id": "REDHAT-RHSA-2019-2145.NASL", "href": "https://www.tenable.com/plugins/nessus/127684", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:2145. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127684);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2020/01/06\");\n\n script_cve_id(\"CVE-2019-3827\");\n script_xref(name:\"RHSA\", value:\"2019:2145\");\n\n script_name(english:\"RHEL 7 : gvfs (RHSA-2019:2145)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for gvfs is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGVFS is the GNOME Desktop Virtual File System layer that allows users\nto easily access local and remote data using File Transfer Protocol\n(FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed\nAuthoring and Versioning (WebDAV), Common Internet File System (CIFS),\nServer Message Block (SMB), and other protocols. GVFS integrates with\nthe GNOME I/O (GIO) abstraction layer.\n\nSecurity Fix(es) :\n\n* gvfs: Incorrect authorization in admin backend allows privileged\nusers to read and modify arbitrary files without prompting for\npassword (CVE-2019-3827)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\n\nAdditional Changes :\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 7.7 Release Notes linked from the References section.\"\n );\n # https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3395ff0b\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:2145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-3827\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-afp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-archive\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-goa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-gphoto2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-mtp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-smb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gvfs-tests\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:2145\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", reference:\"gvfs-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-afc-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-afp-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-afp-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-archive-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-archive-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"gvfs-client-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"gvfs-debuginfo-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"gvfs-devel-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-fuse-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-fuse-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-goa-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-goa-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-gphoto2-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-gphoto2-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-mtp-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-mtp-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-smb-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-smb-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"gvfs-tests-1.36.2-3.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"gvfs-tests-1.36.2-3.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs / gvfs-afc / gvfs-afp / gvfs-archive / gvfs-client / etc\");\n }\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-07T08:59:51", "description": "According to the version of the gvfs packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - An incorrect permission check in the admin backend in\n gvfs before version 1.39.4 was found that allows\n reading and modify arbitrary files by privileged users\n without asking for password when no authentication\n agent is running. This vulnerability can be exploited\n by malicious programs running under privileges of users\n belonging to the wheel group to further escalate its\n privileges by modifying system files without user's\n knowledge. Successful exploitation requires uncommon\n system configuration.(CVE-2019-3827)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 11, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-11-12T00:00:00", "title": "EulerOS 2.0 SP5 : gvfs (EulerOS-SA-2019-2156)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2019-11-12T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:gvfs-goa", "p-cpe:/a:huawei:euleros:gvfs-afc", "p-cpe:/a:huawei:euleros:gvfs-devel", "p-cpe:/a:huawei:euleros:gvfs-mtp", "p-cpe:/a:huawei:euleros:gvfs", "p-cpe:/a:huawei:euleros:gvfs-afp", "p-cpe:/a:huawei:euleros:gvfs-smb", "p-cpe:/a:huawei:euleros:gvfs-archive", "p-cpe:/a:huawei:euleros:gvfs-client", "p-cpe:/a:huawei:euleros:gvfs-fuse", "p-cpe:/a:huawei:euleros:gvfs-gphoto2", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2156.NASL", "href": "https://www.tenable.com/plugins/nessus/130865", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(130865);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-3827\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : gvfs (EulerOS-SA-2019-2156)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the gvfs packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - An incorrect permission check in the admin backend in\n gvfs before version 1.39.4 was found that allows\n reading and modify arbitrary files by privileged users\n without asking for password when no authentication\n agent is running. This vulnerability can be exploited\n by malicious programs running under privileges of users\n belonging to the wheel group to further escalate its\n privileges by modifying system files without user's\n knowledge. Successful exploitation requires uncommon\n system configuration.(CVE-2019-3827)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2156\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6fa4a56c\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected gvfs package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-afp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-archive\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-goa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-gphoto2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-mtp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gvfs-smb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"gvfs-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-afc-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-afp-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-archive-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-client-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-devel-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-fuse-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-goa-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-gphoto2-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-mtp-1.30.4-5.h3.eulerosv2r7\",\n \"gvfs-smb-1.30.4-5.h3.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2020-09-18T10:58:38", "description": "It was discovered that GVfs incorrectly handled certain inputs. An\nattacker could possibly use this issue to access sensitive\ninformation.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 16, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-02-13T00:00:00", "title": "Ubuntu 18.04 LTS / 18.10 : GVfs vulnerability (USN-3888-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2019-02-13T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:gvfs", "p-cpe:/a:canonical:ubuntu_linux:gvfs-backends", "cpe:/o:canonical:ubuntu_linux:18.10", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts"], "id": "UBUNTU_USN-3888-1.NASL", "href": "https://www.tenable.com/plugins/nessus/122153", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3888-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122153);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2019-3827\");\n script_xref(name:\"USN\", value:\"3888-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 18.10 : GVfs vulnerability (USN-3888-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that GVfs incorrectly handled certain inputs. An\nattacker could possibly use this issue to access sensitive\ninformation.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3888-1/\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected gvfs and / or gvfs-backends packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:gvfs-backends\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(18\\.04|18\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 18.04 / 18.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"18.04\", pkgname:\"gvfs\", pkgver:\"1.36.1-0ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"gvfs-backends\", pkgver:\"1.36.1-0ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"18.10\", pkgname:\"gvfs\", pkgver:\"1.38.1-0ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"18.10\", pkgname:\"gvfs-backends\", pkgver:\"1.38.1-0ubuntu1.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs / gvfs-backends\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-17T12:05:25", "description": "The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has gvfs packages installed that are affected by a\nvulnerability:\n\n - An incorrect permission check in the admin backend in\n gvfs before version 1.39.4 was found that allows reading\n and modify arbitrary files by privileged users without\n asking for password when no authentication agent is\n running. This vulnerability can be exploited by\n malicious programs running under privileges of users\n belonging to the wheel group to further escalate its\n privileges by modifying system files without user's\n knowledge. Successful exploitation requires uncommon\n system configuration. (CVE-2019-3827)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 15, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-12-02T00:00:00", "title": "NewStart CGSL CORE 5.04 / MAIN 5.04 : gvfs Vulnerability (NS-SA-2019-0224)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2019-12-02T00:00:00", "cpe": [], "id": "NEWSTART_CGSL_NS-SA-2019-0224_GVFS.NASL", "href": "https://www.tenable.com/plugins/nessus/131423", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2019-0224. The text\n# itself is copyright (C) ZTE, Inc.\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131423);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2019-3827\");\n\n script_name(english:\"NewStart CGSL CORE 5.04 / MAIN 5.04 : gvfs Vulnerability (NS-SA-2019-0224)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote machine is affected by a vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has gvfs packages installed that are affected by a\nvulnerability:\n\n - An incorrect permission check in the admin backend in\n gvfs before version 1.39.4 was found that allows reading\n and modify arbitrary files by privileged users without\n asking for password when no authentication agent is\n running. This vulnerability can be exploited by\n malicious programs running under privileges of users\n belonging to the wheel group to further escalate its\n privileges by modifying system files without user's\n knowledge. Successful exploitation requires uncommon\n system configuration. (CVE-2019-3827)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2019-0224\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL gvfs packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-3827\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/ZTE-CGSL/release\");\nif (isnull(release) || release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, \"NewStart Carrier Grade Server Linux\");\n\nif (release !~ \"CGSL CORE 5.04\" &&\n release !~ \"CGSL MAIN 5.04\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.04 / NewStart CGSL MAIN 5.04');\n\nif (!get_kb_item(\"Host/ZTE-CGSL/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"NewStart Carrier Grade Server Linux\", cpu);\n\nflag = 0;\n\npkgs = {\n \"CGSL CORE 5.04\": [\n \"gvfs-1.36.2-3.el7\",\n \"gvfs-afc-1.36.2-3.el7\",\n \"gvfs-afp-1.36.2-3.el7\",\n \"gvfs-archive-1.36.2-3.el7\",\n \"gvfs-client-1.36.2-3.el7\",\n \"gvfs-debuginfo-1.36.2-3.el7\",\n \"gvfs-devel-1.36.2-3.el7\",\n \"gvfs-fuse-1.36.2-3.el7\",\n \"gvfs-goa-1.36.2-3.el7\",\n \"gvfs-gphoto2-1.36.2-3.el7\",\n \"gvfs-mtp-1.36.2-3.el7\",\n \"gvfs-smb-1.36.2-3.el7\",\n \"gvfs-tests-1.36.2-3.el7\"\n ],\n \"CGSL MAIN 5.04\": [\n \"gvfs-1.36.2-3.el7\",\n \"gvfs-afc-1.36.2-3.el7\",\n \"gvfs-afp-1.36.2-3.el7\",\n \"gvfs-archive-1.36.2-3.el7\",\n \"gvfs-client-1.36.2-3.el7\",\n \"gvfs-debuginfo-1.36.2-3.el7\",\n \"gvfs-devel-1.36.2-3.el7\",\n \"gvfs-fuse-1.36.2-3.el7\",\n \"gvfs-goa-1.36.2-3.el7\",\n \"gvfs-gphoto2-1.36.2-3.el7\",\n \"gvfs-mtp-1.36.2-3.el7\",\n \"gvfs-smb-1.36.2-3.el7\",\n \"gvfs-tests-1.36.2-3.el7\"\n ]\n};\npkg_list = pkgs[release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:\"ZTE \" + release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-17T12:05:28", "description": "The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has gvfs packages installed that are affected by a\nvulnerability:\n\n - An incorrect permission check in the admin backend in\n gvfs before version 1.39.4 was found that allows reading\n and modify arbitrary files by privileged users without\n asking for password when no authentication agent is\n running. This vulnerability can be exploited by\n malicious programs running under privileges of users\n belonging to the wheel group to further escalate its\n privileges by modifying system files without user's\n knowledge. Successful exploitation requires uncommon\n system configuration. (CVE-2019-3827)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 15, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-12-31T00:00:00", "title": "NewStart CGSL CORE 5.05 / MAIN 5.05 : gvfs Vulnerability (NS-SA-2019-0238)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2019-12-31T00:00:00", "cpe": [], "id": "NEWSTART_CGSL_NS-SA-2019-0238_GVFS.NASL", "href": "https://www.tenable.com/plugins/nessus/132442", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2019-0238. The text\n# itself is copyright (C) ZTE, Inc.\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132442);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2019-3827\");\n\n script_name(english:\"NewStart CGSL CORE 5.05 / MAIN 5.05 : gvfs Vulnerability (NS-SA-2019-0238)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote machine is affected by a vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has gvfs packages installed that are affected by a\nvulnerability:\n\n - An incorrect permission check in the admin backend in\n gvfs before version 1.39.4 was found that allows reading\n and modify arbitrary files by privileged users without\n asking for password when no authentication agent is\n running. This vulnerability can be exploited by\n malicious programs running under privileges of users\n belonging to the wheel group to further escalate its\n privileges by modifying system files without user's\n knowledge. Successful exploitation requires uncommon\n system configuration. (CVE-2019-3827)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2019-0238\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL gvfs packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-3827\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/31\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/ZTE-CGSL/release\");\nif (isnull(release) || release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, \"NewStart Carrier Grade Server Linux\");\n\nif (release !~ \"CGSL CORE 5.05\" &&\n release !~ \"CGSL MAIN 5.05\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.05 / NewStart CGSL MAIN 5.05');\n\nif (!get_kb_item(\"Host/ZTE-CGSL/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"NewStart Carrier Grade Server Linux\", cpu);\n\nflag = 0;\n\npkgs = {\n \"CGSL CORE 5.05\": [\n \"gvfs-1.36.2-3.el7\",\n \"gvfs-afc-1.36.2-3.el7\",\n \"gvfs-afp-1.36.2-3.el7\",\n \"gvfs-archive-1.36.2-3.el7\",\n \"gvfs-client-1.36.2-3.el7\",\n \"gvfs-debuginfo-1.36.2-3.el7\",\n \"gvfs-devel-1.36.2-3.el7\",\n \"gvfs-fuse-1.36.2-3.el7\",\n \"gvfs-goa-1.36.2-3.el7\",\n \"gvfs-gphoto2-1.36.2-3.el7\",\n \"gvfs-mtp-1.36.2-3.el7\",\n \"gvfs-smb-1.36.2-3.el7\",\n \"gvfs-tests-1.36.2-3.el7\"\n ],\n \"CGSL MAIN 5.05\": [\n \"gvfs-1.36.2-3.el7\",\n \"gvfs-afc-1.36.2-3.el7\",\n \"gvfs-afp-1.36.2-3.el7\",\n \"gvfs-archive-1.36.2-3.el7\",\n \"gvfs-client-1.36.2-3.el7\",\n \"gvfs-debuginfo-1.36.2-3.el7\",\n \"gvfs-devel-1.36.2-3.el7\",\n \"gvfs-fuse-1.36.2-3.el7\",\n \"gvfs-goa-1.36.2-3.el7\",\n \"gvfs-gphoto2-1.36.2-3.el7\",\n \"gvfs-mtp-1.36.2-3.el7\",\n \"gvfs-smb-1.36.2-3.el7\",\n \"gvfs-tests-1.36.2-3.el7\"\n ]\n};\npkg_list = pkgs[release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:\"ZTE \" + release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-20T12:50:24", "description": "This update for gvfs fixes the following issues :\n\nSecurity vulnerability fixed :\n\n - CVE-2019-3827: Fixed an issue whereby an unprivileged\n user was not prompted to give a password when acessing\n root owned files. (bsc#1125084)\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "edition": 15, "cvss3": {"score": 6.3, "vector": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}, "published": "2019-02-28T00:00:00", "title": "openSUSE Security Update : gvfs (openSUSE-2019-261)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-3827"], "modified": "2019-02-28T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:gvfs-debuginfo", "cpe:/o:novell:opensuse:15.0", "p-cpe:/a:novell:opensuse:gvfs-devel", "p-cpe:/a:novell:opensuse:gvfs-32bit-debuginfo", "p-cpe:/a:novell:opensuse:gvfs-fuse-debuginfo", "p-cpe:/a:novell:opensuse:gvfs-backend-samba", "p-cpe:/a:novell:opensuse:gvfs-backend-afc-debuginfo", "p-cpe:/a:novell:opensuse:gvfs-backends-debuginfo", "p-cpe:/a:novell:opensuse:gvfs-debugsource", "p-cpe:/a:novell:opensuse:gvfs-backend-samba-debuginfo", "p-cpe:/a:novell:opensuse:gvfs-lang", "p-cpe:/a:novell:opensuse:gvfs-backend-afc", "p-cpe:/a:novell:opensuse:gvfs", "p-cpe:/a:novell:opensuse:gvfs-32bit", "p-cpe:/a:novell:opensuse:gvfs-fuse", "p-cpe:/a:novell:opensuse:gvfs-backends"], "id": "OPENSUSE-2019-261.NASL", "href": "https://www.tenable.com/plugins/nessus/122497", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-261.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(122497);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2019-3827\");\n\n script_name(english:\"openSUSE Security Update : gvfs (openSUSE-2019-261)\");\n script_summary(english:\"Check for the openSUSE-2019-261 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for gvfs fixes the following issues :\n\nSecurity vulnerability fixed :\n\n - CVE-2019-3827: Fixed an issue whereby an unprivileged\n user was not prompted to give a password when acessing\n root owned files. (bsc#1125084)\n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1125084\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gvfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-backend-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-backend-afc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-backend-samba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-backend-samba-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-backends\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-backends-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-fuse-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gvfs-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-backend-afc-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-backend-afc-debuginfo-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-backend-samba-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-backend-samba-debuginfo-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-backends-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-backends-debuginfo-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-debuginfo-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-debugsource-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-devel-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-fuse-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-fuse-debuginfo-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gvfs-lang-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gvfs-32bit-1.34.2.1-lp150.3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gvfs-32bit-debuginfo-1.34.2.1-lp150.3.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gvfs / gvfs-32bit / gvfs-32bit-debuginfo / gvfs-backend-afc / etc\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:N"}}]}