Lucene search

K
openvasCopyright (C) 2022 Greenbone AGOPENVAS:13614125623114202237471
HistoryOct 27, 2022 - 12:00 a.m.

SUSE: Security Advisory (SUSE-SU-2022:3747-1)

2022-10-2700:00:00
Copyright (C) 2022 Greenbone AG
plugins.openvas.org

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

10 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

79.4%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.4.2022.3747.1");
  script_cve_id("CVE-2022-21698", "CVE-2022-31097", "CVE-2022-31107");
  script_tag(name:"creation_date", value:"2022-10-27 04:38:58 +0000 (Thu, 27 Oct 2022)");
  script_version("2024-02-02T14:37:51+0000");
  script_tag(name:"last_modification", value:"2024-02-02 14:37:51 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2022-11-23 14:24:29 +0000 (Wed, 23 Nov 2022)");

  script_name("SUSE: Security Advisory (SUSE-SU-2022:3747-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2022 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES12\.0SP3|SLES12\.0SP4|SLES12\.0SP5)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2022:3747-1");
  script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2022/suse-su-20223747-1/");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'SUSE Manager Client Tools' package(s) announced via the SUSE-SU-2022:3747-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

Update to upstream release 0.11.0 (jsc#SLE-24791)
 * Add TLS support
 * Switch to logger, please check --log.level and --log.format flags

Update to version 0.10.1
 * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data

Update to version 0.10.0
 * Add Apache Proxy and other metrics

Update to version 0.8.0
 * Change commandline flags
 * Add metrics: Apache version, request duration total

Adapted to build on Enterprise Linux 8

Require building with Go 1.15

Add %license macro for LICENSE file

golang-github-prometheus-alertmanager:

Do not include sources (bsc#1200725)

golang-github-prometheus-node_exporter:

CVE-2022-21698: Denial of service using InstrumentHandlerCounter.
 (bsc#1196338, jsc#SLE-24243, jsc#SUMA-114)

grafana:

Update to version 8.3.10
 + Security:
 * CVE-2022-31097: Cross Site Scripting vulnerability in the Unified
 Alerting (bsc#1201535)
 * CVE-2022-31107: OAuth account takeover vulnerability (bsc#1201539)

Update to version 8.3.9
 + Bug fixes:
 * Geomap: Display legend
 * Prometheus: Fix timestamp truncation

Update to version 8.3.7
 + Bug fix:
 * Provisioning: Ensure that the default value for orgID is set when
 provisioning datasources to be deleted.

Update to version 8.3.6
 + Features and enhancements:
 * Cloud Monitoring: Reduce request size when listing labels.
 * Explore: Show scalar data result in a table instead of graph.
 * Snapshots: Updates the default external snapshot server URL.
 * Table: Makes footer not overlap table content.
 * Tempo: Add request histogram to service graph datalink.
 * Tempo: Add time range to tempo search query behind a feature flag.
 * Tempo: Auto-clear results when changing query type.
 * Tempo: Display start time in search results as relative time.
 * CloudMonitoring: Fix resource labels in query editor.
 * Cursor sync: Apply the settings without saving the dashboard.
 * LibraryPanels: Fix for Error while cleaning library panels.
 * Logs Panel: Fix timestamp parsing for string dates without timezone.
 * Prometheus: Fix some of the alerting queries that use reduce/math
 operation.
 * TablePanel: Fix ad-hoc variables not working on default datasources.
 * Text Panel: Fix alignment of elements.
 * Variables: Fix for constant variables in self referencing links.

Update to version 8.3.5 (jsc#SLE-23439, jsc#SLE-23422, jsc#SLE-24565)

kiwi-desc-saltboot:

Update to version 0.1.1661440542.6cbe0da
 * Use standard susemanager.conf
 * Use salt bundle
 * Add support fo VirtIO disks

mgr-daemon:

Version 4.3.6-1
 * Update translation strings

spacecmd:

Version 4.3.15-1
 * Process date values in spacecmd api calls (bsc#1198903)

spacewalk-client-tools:

Version 4.3.12-1
 * Update translation strings

uyuni-common-libs:

Version 4.3.6-1
 * Do not allow creating path if nonexistent user or group in fileutils.");

  script_tag(name:"affected", value:"'SUSE Manager Client Tools' package(s) on SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server for SAP 12-SP4, SUSE Manager Tools 12, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 9.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "SLES12.0SP3") {

  if(!isnull(res = isrpmvuln(pkg:"golang-github-prometheus-node_exporter", rpm:"golang-github-prometheus-node_exporter~1.3.0~1.21.1", rls:"SLES12.0SP3"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "SLES12.0SP4") {

  if(!isnull(res = isrpmvuln(pkg:"golang-github-prometheus-node_exporter", rpm:"golang-github-prometheus-node_exporter~1.3.0~1.21.1", rls:"SLES12.0SP4"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "SLES12.0SP5") {

  if(!isnull(res = isrpmvuln(pkg:"golang-github-prometheus-node_exporter", rpm:"golang-github-prometheus-node_exporter~1.3.0~1.21.1", rls:"SLES12.0SP5"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

10 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

79.4%