Lucene search

K
nessusThis script is Copyright (C) 2010-2021 Tenable Network Security, Inc.FEDORA_2010-5176.NASL
HistoryJul 01, 2010 - 12:00 a.m.

Fedora 11 : spamass-milter-0.3.1-18.fc11 (2010-5176)

2010-07-0100:00:00
This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.
www.tenable.com
8

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.188 Low

EPSS

Percentile

96.3%

This update includes a fix for a problem where if the milter is running using the ‘-x’ option to expand aliases before passing inbound mail through SpamAssassin, a malicious client using a carefully-crafted SMTP session could execute arbitrary code on the mail server. The fix avoids the use of a shell in the alias expansion and hence there is no longer a problem with having to sanitize input from the client. This problem has been assigned CVE-2010-1132, which is tracked upstream at https://savannah.nongnu.org/bugs/?29136 The update also contains improved Received-header-generation for message submission and a fix for a problem where the milter would erroneously log warnings about the mail server’s configuration when the first message from a non-authenticated client passed through. As part of the fix for this issue, the required milter macro configuration for the mail server has changed slightly: see the README file included in the package for details.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2010-5176.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(47381);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2010-1132");
  script_xref(name:"FEDORA", value:"2010-5176");

  script_name(english:"Fedora 11 : spamass-milter-0.3.1-18.fc11 (2010-5176)");
  script_summary(english:"Checks rpm output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This update includes a fix for a problem where if the milter is
running using the '-x' option to expand aliases before passing inbound
mail through SpamAssassin, a malicious client using a
carefully-crafted SMTP session could execute arbitrary code on the
mail server. The fix avoids the use of a shell in the alias expansion
and hence there is no longer a problem with having to sanitize input
from the client. This problem has been assigned CVE-2010-1132, which
is tracked upstream at https://savannah.nongnu.org/bugs/?29136 The
update also contains improved Received-header-generation for message
submission and a fix for a problem where the milter would erroneously
log warnings about the mail server's configuration when the first
message from a non-authenticated client passed through. As part of the
fix for this issue, the required milter macro configuration for the
mail server has changed slightly: see the README file included in the
package for details.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=572117"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2010-April/038572.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?5c90f580"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://savannah.nongnu.org/bugs/?29136"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected spamass-milter package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:spamass-milter");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:11");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/03/23");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^11([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 11.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC11", reference:"spamass-milter-0.3.1-18.fc11")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "spamass-milter");
}
VendorProductVersionCPE
fedoraprojectfedoraspamass-milterp-cpe:/a:fedoraproject:fedora:spamass-milter
fedoraprojectfedora11cpe:/o:fedoraproject:fedora:11

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.188 Low

EPSS

Percentile

96.3%