The remote host is missing an update for the Huawei EulerOS 'curl' package(s) announced via the EulerOS-SA-2024-2322 advisory. When an application allows HTTP/2 server push, and the received headers surpass the maximum limit, libcurl aborts the server push and leaks memory (CVE-2024-2398). Please install the updated package(s)
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-2662) | 28 Oct 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-2208) | 21 Aug 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-2114) | 20 Aug 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-1902) | 16 Jul 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-2189) | 20 Aug 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-1808) | 25 Jun 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-1829) | 25 Jun 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-2164) | 20 Aug 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-1878) | 16 Jul 202400:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-6718-2) | 28 Mar 202400:00 | – | openvas |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2024.2322");
script_cve_id("CVE-2024-2398");
script_tag(name:"creation_date", value:"2024-09-03 13:47:15 +0000 (Tue, 03 Sep 2024)");
script_version("2024-09-04T05:16:32+0000");
script_tag(name:"last_modification", value:"2024-09-04 05:16:32 +0000 (Wed, 04 Sep 2024)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_name("Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-2322)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRT\-2\.12\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2024-2322");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2024-2322");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'curl' package(s) announced via the EulerOS-SA-2024-2322 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.(CVE-2024-2398)");
script_tag(name:"affected", value:"'curl' package(s) on Huawei EulerOS Virtualization release 2.12.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRT-2.12.0") {
if(!isnull(res = isrpmvuln(pkg:"curl", rpm:"curl~7.79.1~14.h26.eulerosv2r12", rls:"EULEROSVIRT-2.12.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"libcurl", rpm:"libcurl~7.79.1~14.h26.eulerosv2r12", rls:"EULEROSVIRT-2.12.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo