CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
92.4%
According to the versions of the icu package installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities :
International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.(CVE-2017-7868)
A vulnerability was found in the International Components for Unicode (ICU). Specially crafted invalid utf-8 text, when parsed or manipulated using particular functions in libicu, could cause out-of-bounds heap reads and writes potentially leading to a crash, memory disclosure, or possibly code execution.(CVE-2017-7867)
The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.(CVE-2014-9654)
Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string.(CVE-2016-7415)
The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a ‘\0’ character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.(CVE-2016-6293)
The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence.(CVE-2014-7940)
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.(CVE-2014-7926)
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression.(CVE-2014-7923)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(134550);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/22");
script_cve_id(
"CVE-2014-7923",
"CVE-2014-7926",
"CVE-2014-7940",
"CVE-2014-9654",
"CVE-2016-6293",
"CVE-2016-7415",
"CVE-2017-7867",
"CVE-2017-7868"
);
script_bugtraq_id(72288, 72980);
script_name(english:"EulerOS Virtualization for ARM 64 3.0.2.0 : icu (EulerOS-SA-2020-1261)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization for ARM 64 host is missing multiple security
updates.");
script_set_attribute(attribute:"description", value:
"According to the versions of the icu package installed, the EulerOS
Virtualization for ARM 64 installation on the remote host is affected
by the following vulnerabilities :
- International Components for Unicode (ICU) for C/C++
before 2017-02-13 has an out-of-bounds write caused by
a heap-based buffer overflow related to the
utf8TextAccess function in common/utext.cpp and the
utext_moveIndex32* function.(CVE-2017-7868)
- A vulnerability was found in the International
Components for Unicode (ICU). Specially crafted invalid
utf-8 text, when parsed or manipulated using particular
functions in libicu, could cause out-of-bounds heap
reads and writes potentially leading to a crash, memory
disclosure, or possibly code execution.(CVE-2017-7867)
- The Regular Expressions package in International
Components for Unicode (ICU) for C/C++ before
2014-12-03, as used in Google Chrome before
40.0.2214.91, calculates certain values without
ensuring that they can be represented in a 24-bit
field, which allows remote attackers to cause a denial
of service (memory corruption) or possibly have
unspecified other impact via a crafted string, a
related issue to CVE-2014-7923.(CVE-2014-9654)
- Stack-based buffer overflow in the Locale class in
common/locid.cpp in International Components for
Unicode (ICU) through 57.1 for C/C++ allows remote
attackers to cause a denial of service (application
crash) or possibly have unspecified other impact via a
long locale string.(CVE-2016-7415)
- The uloc_acceptLanguageFromHTTP function in
common/uloc.cpp in International Components for Unicode
(ICU) through 57.1 for C/C++ does not ensure that there
is a '\\0' character at the end of a certain temporary
array, which allows remote attackers to cause a denial
of service (out-of-bounds read) or possibly have
unspecified other impact via a call with a long
httpAcceptLanguage argument.(CVE-2016-6293)
- The collator implementation in i18n/ucol.cpp in
International Components for Unicode (ICU) 52 through
SVN revision 293126, as used in Google Chrome before
40.0.2214.91, does not initialize memory for a data
structure, which allows remote attackers to cause a
denial of service or possibly have unspecified other
impact via a crafted character sequence.(CVE-2014-7940)
- The Regular Expressions package in International
Components for Unicode (ICU) 52 before SVN revision
292944, as used in Google Chrome before 40.0.2214.91,
allows remote attackers to cause a denial of service
(memory corruption) or possibly have unspecified other
impact via vectors related to a zero-length
quantifier.(CVE-2014-7926)
- The Regular Expressions package in International
Components for Unicode (ICU) 52 before SVN revision
292944, as used in Google Chrome before 40.0.2214.91,
allows remote attackers to cause a denial of service
(memory corruption) or possibly have unspecified other
impact via vectors related to a look-behind
expression.(CVE-2014-7923)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1261
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?eaf315c3");
script_set_attribute(attribute:"solution", value:
"Update the affected icu packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-7415");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2020/03/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/13");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:libicu");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.2.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.2.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
flag = 0;
pkgs = ["libicu-50.1.2-15.h6"];
foreach (pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "icu");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7868
www.nessus.org/u?eaf315c3
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
92.4%