CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%
According to the versions of the libtiff packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.(CVE-2016-5323)
The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the ‘-v’ option to -1.(CVE-2016-3624)
The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.(CVE-2016-3623)
An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.(CVE-2018-17100)
An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.(CVE-2018-17101)
LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write.(CVE-2018-18557)
In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.(CVE-2018-8905)
tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to ‘READ of size 78490’ and libtiff/tif_unix.c:115:23.(CVE-2016-10268)
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to ‘READ of size 512’ and libtiff/tif_unix.c:340:2.(CVE-2016-10269)
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to ‘READ of size 8’ and libtiff/tif_read.c:523:22.(CVE-2016-10270)
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to ‘WRITE of size 2048’ and libtiff/tif_next.c:64:9.(CVE-2016-10272)
Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.(CVE-2016-10092)
In LibTIFF 4.0.8, there is a assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function in tif_dirwrite.c. A crafted input will lead to a remote denial of service attack.(CVE-2017-10688)
The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation.(CVE-2017-12944)
tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100.(CVE-2016-9538)
tools/tiffcrop.c in libtiff 4.0.6 has an out-of-bounds read in readContigTilesIntoBuffer(). Reported as MSVR 35092.(CVE-2016-9539)
The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7592)
The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.(CVE-2017-7595)
LibTIFF 4.0.7 has an ‘outside the range of representable values of type float’ undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7596)
tif_dirread.c in LibTIFF 4.0.7 has an ‘outside the range of representable values of type float’ undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7597)
tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.(CVE-2017-7598)
LibTIFF 4.0.7 has an ‘outside the range of representable values of type short’ undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7599)
LibTIFF 4.0.7 has an ‘outside the range of representable values of type unsigned char’ undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7600)
LibTIFF 4.0.7 has a ‘shift exponent too large for 64-bit type long’ undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7601)
LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.(CVE-2017-7602)
In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff.(CVE-2017-9117)
The TIFFWriteDirectoryTagCheckedRational function in tif_dirwrite.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file.(CVE-2016-10371)
The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.(CVE-2016-3622)
The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.(CVE-2016-5321)
The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.(CVE-2018-10963)
There is a reachable assertion abort in the function TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.(CVE-2017-13726)
There is a reachable assertion abort in the function TIFFWriteDirectoryTagSubifd() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.(CVE-2017-13727)
In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c.
A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.(CVE-2017-9936)
In LibTIFF 4.0.7, a memory leak vulnerability was found in the function TIFFReadDirEntryLong8Array in tif_dirread.c, which allows attackers to cause a denial of service via a crafted file.(CVE-2017-9403)
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.(CVE-2016-10267)
tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.(CVE-2016-9273)
LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file.(CVE-2017-9147)
Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.(CVE-2016-5318)
An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.(CVE-2018-18661)
TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff.(CVE-2018-10779)
The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image.(CVE-2017-7594)
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.(CVE-2016-10266)
Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.(CVE-2016-5102)
tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.(CVE-2017-7593)
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)(CVE-2018-7456)
_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.(CVE-2019-14973)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(130671);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/15");
script_cve_id(
"CVE-2016-10092",
"CVE-2016-10266",
"CVE-2016-10267",
"CVE-2016-10268",
"CVE-2016-10269",
"CVE-2016-10270",
"CVE-2016-10272",
"CVE-2016-10371",
"CVE-2016-3622",
"CVE-2016-3623",
"CVE-2016-3624",
"CVE-2016-5102",
"CVE-2016-5318",
"CVE-2016-5321",
"CVE-2016-5323",
"CVE-2016-9273",
"CVE-2016-9538",
"CVE-2016-9539",
"CVE-2017-10688",
"CVE-2017-12944",
"CVE-2017-13726",
"CVE-2017-13727",
"CVE-2017-7592",
"CVE-2017-7593",
"CVE-2017-7594",
"CVE-2017-7595",
"CVE-2017-7596",
"CVE-2017-7597",
"CVE-2017-7598",
"CVE-2017-7599",
"CVE-2017-7600",
"CVE-2017-7601",
"CVE-2017-7602",
"CVE-2017-9117",
"CVE-2017-9147",
"CVE-2017-9403",
"CVE-2017-9936",
"CVE-2018-10779",
"CVE-2018-10963",
"CVE-2018-17100",
"CVE-2018-17101",
"CVE-2018-18557",
"CVE-2018-18661",
"CVE-2018-7456",
"CVE-2018-8905",
"CVE-2019-14973"
);
script_name(english:"EulerOS 2.0 SP5 : libtiff (EulerOS-SA-2019-2209)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing multiple security updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the libtiff packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :
- The _TIFFFax3fillruns function in libtiff before 4.0.6
allows remote attackers to cause a denial of service
(divide-by-zero error and application crash) via a
crafted Tiff image.The _TIFFFax3fillruns function in
libtiff before 4.0.6 allows remote attackers to cause a
denial of service (divide-by-zero error and application
crash) via a crafted Tiff image.(CVE-2016-5323)
- The cvtClump function in the rgb2ycbcr tool in LibTIFF
4.0.6 and earlier allows remote attackers to cause a
denial of service (out-of-bounds write) by setting the
'-v' option to -1.(CVE-2016-3624)
- The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows
remote attackers to cause a denial of service
(divide-by-zero) by setting the (1) v or (2) h
parameter to 0.(CVE-2016-3623)
- An issue was discovered in LibTIFF 4.0.9. There is a
int32 overflow in multiply_ms in tools/ppm2tiff.c,
which can cause a denial of service (crash) or possibly
have unspecified other impact via a crafted image
file.(CVE-2018-17100)
- An issue was discovered in LibTIFF 4.0.9. There are two
out-of-bounds writes in cpTags in tools/tiff2bw.c and
tools/pal2rgb.c, which can cause a denial of service
(application crash) or possibly have unspecified other
impact via a crafted image file.(CVE-2018-17101)
- LibTIFF 4.0.9 (with JBIG enabled) decodes
arbitrarily-sized JBIG into a buffer, ignoring the
buffer size, which leads to a tif_jbig.c JBIGDecode
out-of-bounds write.(CVE-2018-18557)
- In LibTIFF 4.0.9, a heap-based buffer overflow occurs
in the function LZWDecodeCompat in tif_lzw.c via a
crafted TIFF file, as demonstrated by
tiff2ps.(CVE-2018-8905)
- tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers
to cause a denial of service (integer underflow and
heap-based buffer under-read) or possibly have
unspecified other impact via a crafted TIFF image,
related to 'READ of size 78490' and
libtiff/tif_unix.c:115:23.(CVE-2016-10268)
- LibTIFF 4.0.7 allows remote attackers to cause a denial
of service (heap-based buffer over-read) or possibly
have unspecified other impact via a crafted TIFF image,
related to 'READ of size 512' and
libtiff/tif_unix.c:340:2.(CVE-2016-10269)
- LibTIFF 4.0.7 allows remote attackers to cause a denial
of service (heap-based buffer over-read) or possibly
have unspecified other impact via a crafted TIFF image,
related to 'READ of size 8' and
libtiff/tif_read.c:523:22.(CVE-2016-10270)
- LibTIFF 4.0.7 allows remote attackers to cause a denial
of service (heap-based buffer overflow) or possibly
have unspecified other impact via a crafted TIFF image,
related to 'WRITE of size 2048' and
libtiff/tif_next.c:64:9.(CVE-2016-10272)
- Heap-based buffer overflow in the
readContigStripsIntoBuffer function in tif_unix.c in
LibTIFF 4.0.7 allows remote attackers to have
unspecified impact via a crafted image.(CVE-2016-10092)
- In LibTIFF 4.0.8, there is a assertion abort in the
TIFFWriteDirectoryTagCheckedLong8Array function in
tif_dirwrite.c. A crafted input will lead to a remote
denial of service attack.(CVE-2017-10688)
- The TIFFReadDirEntryArray function in tif_read.c in
LibTIFF 4.0.8 mishandles memory allocation for short
files, which allows remote attackers to cause a denial
of service (allocation failure and application crash)
in the TIFFFetchStripThing function in tif_dirread.c
during a tiff2pdf invocation.(CVE-2017-12944)
- tools/tiffcrop.c in libtiff 4.0.6 reads an undefined
buffer in readContigStripsIntoBuffer() because of a
uint16 integer overflow. Reported as MSVR
35100.(CVE-2016-9538)
- tools/tiffcrop.c in libtiff 4.0.6 has an out-of-bounds
read in readContigTilesIntoBuffer(). Reported as MSVR
35092.(CVE-2016-9539)
- The putagreytile function in tif_getimage.c in LibTIFF
4.0.7 has a left-shift undefined behavior issue, which
might allow remote attackers to cause a denial of
service (application crash) or possibly have
unspecified other impact via a crafted
image.(CVE-2017-7592)
- The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF
4.0.7 allows remote attackers to cause a denial of
service (divide-by-zero error and application crash)
via a crafted image.(CVE-2017-7595)
- LibTIFF 4.0.7 has an 'outside the range of
representable values of type float' undefined behavior
issue, which might allow remote attackers to cause a
denial of service (application crash) or possibly have
unspecified other impact via a crafted
image.(CVE-2017-7596)
- tif_dirread.c in LibTIFF 4.0.7 has an 'outside the
range of representable values of type float' undefined
behavior issue, which might allow remote attackers to
cause a denial of service (application crash) or
possibly have unspecified other impact via a crafted
image.(CVE-2017-7597)
- tif_dirread.c in LibTIFF 4.0.7 might allow remote
attackers to cause a denial of service (divide-by-zero
error and application crash) via a crafted
image.(CVE-2017-7598)
- LibTIFF 4.0.7 has an 'outside the range of
representable values of type short' undefined behavior
issue, which might allow remote attackers to cause a
denial of service (application crash) or possibly have
unspecified other impact via a crafted
image.(CVE-2017-7599)
- LibTIFF 4.0.7 has an 'outside the range of
representable values of type unsigned char' undefined
behavior issue, which might allow remote attackers to
cause a denial of service (application crash) or
possibly have unspecified other impact via a crafted
image.(CVE-2017-7600)
- LibTIFF 4.0.7 has a 'shift exponent too large for
64-bit type long' undefined behavior issue, which might
allow remote attackers to cause a denial of service
(application crash) or possibly have unspecified other
impact via a crafted image.(CVE-2017-7601)
- LibTIFF 4.0.7 has a signed integer overflow, which
might allow remote attackers to cause a denial of
service (application crash) or possibly have
unspecified other impact via a crafted
image.(CVE-2017-7602)
- In LibTIFF 4.0.7, the program processes BMP images
without verifying that biWidth and biHeight in the
bitmap-information header match the actual input,
leading to a heap-based buffer over-read in
bmp2tiff.(CVE-2017-9117)
- The TIFFWriteDirectoryTagCheckedRational function in
tif_dirwrite.c in LibTIFF 4.0.6 allows remote attackers
to cause a denial of service (assertion failure and
application exit) via a crafted TIFF
file.(CVE-2016-10371)
- The fpAcc function in tif_predict.c in the tiff2rgba
tool in LibTIFF 4.0.6 and earlier allows remote
attackers to cause a denial of service (divide-by-zero
error) via a crafted TIFF image.(CVE-2016-3622)
- The DumpModeDecode function in libtiff 4.0.6 and
earlier allows attackers to cause a denial of service
(invalid read and crash) via a crafted tiff
image.(CVE-2016-5321)
- The TIFFWriteDirectorySec() function in tif_dirwrite.c
in LibTIFF through 4.0.9 allows remote attackers to
cause a denial of service (assertion failure and
application crash) via a crafted file, a different
vulnerability than CVE-2017-13726.(CVE-2018-10963)
- There is a reachable assertion abort in the function
TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to
tif_dirwrite.c and a SubIFD tag. A crafted input will
lead to a remote denial of service
attack.(CVE-2017-13726)
- There is a reachable assertion abort in the function
TIFFWriteDirectoryTagSubifd() in LibTIFF 4.0.8, related
to tif_dirwrite.c and a SubIFD tag. A crafted input
will lead to a remote denial of service
attack.(CVE-2017-13727)
- In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c.
A crafted TIFF document can lead to a memory leak
resulting in a remote denial of service
attack.(CVE-2017-9936)
- In LibTIFF 4.0.7, a memory leak vulnerability was found
in the function TIFFReadDirEntryLong8Array in
tif_dirread.c, which allows attackers to cause a denial
of service via a crafted file.(CVE-2017-9403)
- LibTIFF 4.0.7 allows remote attackers to cause a denial
of service (divide-by-zero error and application crash)
via a crafted TIFF image, related to
libtiff/tif_ojpeg.c:816:8.(CVE-2016-10267)
- tiffsplit in libtiff 4.0.6 allows remote attackers to
cause a denial of service (out-of-bounds read) via a
crafted file, related to changing td_nstrips in
TIFF_STRIPCHOP mode.(CVE-2016-9273)
- LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField
function in tif_dir.c, which might allow remote
attackers to cause a denial of service (crash) via a
crafted TIFF file.(CVE-2017-9147)
- Stack-based buffer overflow in the _TIFFVGetField
function in libtiff 4.0.6 and earlier allows remote
attackers to crash the application via a crafted
tiff.(CVE-2016-5318)
- An issue was discovered in LibTIFF 4.0.9. There is a
NULL pointer dereference in the function LZWDecode in
the file tif_lzw.c.(CVE-2018-18661)
- TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a
heap-based buffer over-read, as demonstrated by
bmp2tiff.(CVE-2018-10779)
- The OJPEGReadHeaderInfoSecTablesDcTable function in
tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to
cause a denial of service (memory leak) via a crafted
image.(CVE-2017-7594)
- LibTIFF 4.0.7 allows remote attackers to cause a denial
of service (divide-by-zero error and application crash)
via a crafted TIFF image, related to
libtiff/tif_read.c:351:22.(CVE-2016-10266)
- Buffer overflow in the readgifimage function in
gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows
remote attackers to cause a denial of service
(segmentation fault) via a crafted gif
file.(CVE-2016-5102)
- tif_read.c in LibTIFF 4.0.7 does not ensure that
tif_rawdata is properly initialized, which might allow
remote attackers to obtain sensitive information from
process memory via a crafted image.(CVE-2017-7593)
- A NULL Pointer Dereference occurs in the function
TIFFPrintDirectory in tif_print.c in LibTIFF 4.0.9 when
using the tiffinfo tool to print crafted TIFF
information, a different vulnerability than
CVE-2017-18013. (This affects an earlier part of the
TIFFPrintDirectory function that was not addressed by
the CVE-2017-18013 patch.)(CVE-2018-7456)
- _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in
LibTIFF through 4.0.10 mishandle Integer Overflow
checks because they rely on compiler behavior that is
undefined by the applicable C standards. This can, for
example, lead to an application crash.(CVE-2019-14973)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2209
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1833399b");
script_set_attribute(attribute:"solution", value:
"Update the affected libtiff packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-9117");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2019/10/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libtiff");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libtiff-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0");
sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(5)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP5", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
flag = 0;
pkgs = ["libtiff-4.0.3-27.h22.eulerosv2r7",
"libtiff-devel-4.0.3-27.h22.eulerosv2r7"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"5", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libtiff");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10092
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10268
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10371
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5102
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12944
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13726
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13727
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9147
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9403
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10963
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17100
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17101
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973
www.nessus.org/u?1833399b
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.8%