Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.DEBIAN_DSA-4624.NASL
HistoryFeb 18, 2020 - 12:00 a.m.

Debian DSA-4624-1 : evince - security update

2020-02-1800:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.006

Percentile

77.9%

Several vulnerabilities were discovered in evince, a simple multi-page document viewer.

  • CVE-2017-1000159 Tobias Mueller reported that the DVI exporter in evince is susceptible to a command injection vulnerability via specially crafted filenames.

  • CVE-2019-11459 Andy Nguyen reported that the tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend did not handle errors from TIFFReadRGBAImageOriented(), leading to disclosure of uninitialized memory when processing TIFF image files.

  • CVE-2019-1010006 A buffer overflow vulnerability in the tiff backend could lead to denial of service, or potentially the execution of arbitrary code if a specially crafted PDF file is opened.

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-4624. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('compat.inc');

if (description)
{
  script_id(133731);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/27");

  script_cve_id("CVE-2017-1000159", "CVE-2019-1010006", "CVE-2019-11459");
  script_xref(name:"DSA", value:"4624");

  script_name(english:"Debian DSA-4624-1 : evince - security update");

  script_set_attribute(attribute:"synopsis", value:
"The remote Debian host is missing a security-related update.");
  script_set_attribute(attribute:"description", value:
"Several vulnerabilities were discovered in evince, a simple multi-page
document viewer.

  - CVE-2017-1000159
    Tobias Mueller reported that the DVI exporter in evince
    is susceptible to a command injection vulnerability via
    specially crafted filenames.

  - CVE-2019-11459
    Andy Nguyen reported that the tiff_document_render() and
    tiff_document_get_thumbnail() functions in the TIFF
    document backend did not handle errors from
    TIFFReadRGBAImageOriented(), leading to disclosure of
    uninitialized memory when processing TIFF image files.

  - CVE-2019-1010006
    A buffer overflow vulnerability in the tiff backend
    could lead to denial of service, or potentially the
    execution of arbitrary code if a specially crafted PDF
    file is opened.");
  script_set_attribute(attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927820");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2017-1000159");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-11459");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-1010006");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2019-11459");
  script_set_attribute(attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/evince");
  script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/stretch/evince");
  script_set_attribute(attribute:"see_also", value:"https://packages.debian.org/source/buster/evince");
  script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2020/dsa-4624");
  script_set_attribute(attribute:"solution", value:
"Upgrade the evince packages.

For the oldstable distribution (stretch), these problems have been
fixed in version 3.22.1-3+deb9u2.

For the stable distribution (buster), these problems have been fixed
in version 3.30.2-3+deb10u1. The stable distribution is only affected
by CVE-2019-11459.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1010006");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/11/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/02/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:evince");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Debian Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"10.0", prefix:"evince", reference:"3.30.2-3+deb10u1")) flag++;
if (deb_check(release:"10.0", prefix:"evince-common", reference:"3.30.2-3+deb10u1")) flag++;
if (deb_check(release:"10.0", prefix:"gir1.2-evince-3.0", reference:"3.30.2-3+deb10u1")) flag++;
if (deb_check(release:"10.0", prefix:"libevdocument3-4", reference:"3.30.2-3+deb10u1")) flag++;
if (deb_check(release:"10.0", prefix:"libevince-dev", reference:"3.30.2-3+deb10u1")) flag++;
if (deb_check(release:"10.0", prefix:"libevview3-3", reference:"3.30.2-3+deb10u1")) flag++;
if (deb_check(release:"9.0", prefix:"browser-plugin-evince", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"evince", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"evince-common", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"evince-gtk", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"gir1.2-evince-3.0", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"libevdocument3-4", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"libevince-dev", reference:"3.22.1-3+deb9u2")) flag++;
if (deb_check(release:"9.0", prefix:"libevview3-3", reference:"3.22.1-3+deb9u2")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
debiandebian_linuxevincep-cpe:/a:debian:debian_linux:evince
debiandebian_linux10.0cpe:/o:debian:debian_linux:10.0
debiandebian_linux9.0cpe:/o:debian:debian_linux:9.0

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.006

Percentile

77.9%