Lucene search

K
nessusThis script is Copyright (C) 2004-2021 Tenable Network Security, Inc.DEBIAN_DSA-113.NASL
HistorySep 29, 2004 - 12:00 a.m.

Debian DSA-113-1 : ncurses - buffer overflow

2004-09-2900:00:00
This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.
www.tenable.com
11

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Several buffer overflows were fixed in the ‘ncurses’ library in November 2000. Unfortunately, one was missed. This can lead to crashes when using ncurses applications in large windows.

The Common Vulnerabilities and Exposures project has assigned the name CAN-2002-0062 to this issue.

This problem has been fixed for the stable release of Debian in version 5.0-6.0potato2. The testing and unstable releases contain ncurses 5.2, which is not affected by this problem.

There are no known exploits for this problem, but we recommend that all users upgrade ncurses immediately.

#%NASL_MIN_LEVEL 70300

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-113. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(14950);
  script_version("1.18");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");

  script_cve_id("CVE-2002-0062");
  script_xref(name:"DSA", value:"113");

  script_name(english:"Debian DSA-113-1 : ncurses - buffer overflow");
  script_summary(english:"Checks dpkg output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Several buffer overflows were fixed in the 'ncurses' library in
November 2000. Unfortunately, one was missed. This can lead to crashes
when using ncurses applications in large windows.

The Common Vulnerabilities and Exposures project has assigned the name
CAN-2002-0062 to this issue.

This problem has been fixed for the stable release of Debian in
version 5.0-6.0potato2. The testing and unstable releases contain
ncurses 5.2, which is not affected by this problem.

There are no known exploits for this problem, but we recommend that
all users upgrade ncurses immediately."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://cve.mitre.org/"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.debian.org/security/2002/dsa-113"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Upgrade the affected ncurses package."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ncurses");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2");

  script_set_attribute(attribute:"patch_publication_date", value:"2002/02/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"2.2", prefix:"libncurses5", reference:"5.0-6.0potato2")) flag++;
if (deb_check(release:"2.2", prefix:"libncurses5-dbg", reference:"5.0-6.0potato2")) flag++;
if (deb_check(release:"2.2", prefix:"libncurses5-dev", reference:"5.0-6.0potato2")) flag++;
if (deb_check(release:"2.2", prefix:"ncurses-base", reference:"5.0-6.0potato2")) flag++;
if (deb_check(release:"2.2", prefix:"ncurses-bin", reference:"5.0-6.0potato2")) flag++;
if (deb_check(release:"2.2", prefix:"ncurses-term", reference:"5.0-6.0potato2")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Related for DEBIAN_DSA-113.NASL