6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.056 Low
EPSS
Percentile
93.3%
Update to upstream 6.29 release for security fixes
Upstream changelog for this release is available at https://drupal.org/drupal-6.29-release-notes
SA-CORE-2013-003 - Drupal core - Multiple vulnerabilities - http://drupal.org/SA-CORE-2013-003
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2013-22507.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(71358);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2013-6385", "CVE-2013-6386", "CVE-2013-6387", "CVE-2013-6388", "CVE-2013-6389");
script_bugtraq_id(63837, 63840, 63843, 63847, 63848);
script_xref(name:"FEDORA", value:"2013-22507");
script_name(english:"Fedora 19 : drupal6-6.29-1.fc19 (2013-22507)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Update to upstream 6.29 release for security fixes
- Upstream changelog for this release is available at
https://drupal.org/drupal-6.29-release-notes
- SA-CORE-2013-003 - Drupal core - Multiple
vulnerabilities - http://drupal.org/SA-CORE-2013-003
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# http://drupal.org/SA-CORE-2013-003
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?9a366273"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=1032973"
);
# https://drupal.org/drupal-6.29-release-notes
script_set_attribute(
attribute:"see_also",
value:"https://www.drupal.org/project/drupal/releases/6.29"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2013-December/123426.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d533adb4"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected drupal6 package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:drupal6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
script_set_attribute(attribute:"patch_publication_date", value:"2013/12/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/12");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC19", reference:"drupal6-6.29-1.fc19")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "drupal6");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | drupal6 | p-cpe:/a:fedoraproject:fedora:drupal6 |
fedoraproject | fedora | 19 | cpe:/o:fedoraproject:fedora:19 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6385
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6386
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6387
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6388
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6389
www.nessus.org/u?9a366273
www.nessus.org/u?d533adb4
bugzilla.redhat.com/show_bug.cgi?id=1032973
www.drupal.org/project/drupal/releases/6.29