Lucene search

K
nessusThis script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.GENTOO_GLSA-200710-19.NASL
HistoryOct 19, 2007 - 12:00 a.m.

GLSA-200710-19 : The Sleuth Kit: Integer underflow

2007-10-1900:00:00
This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
22

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.049

Percentile

92.8%

The remote host is affected by the vulnerability described in GLSA-200710-19 (The Sleuth Kit: Integer underflow)

Jean-Sebastien Guay-Leroux reported an integer underflow in the     file_printf() function of the 'file' utility which is bundled with The     Sleuth Kit (CVE-2007-1536, GLSA 200703-26). Note that Gentoo is not     affected by the improper fix for this vulnerability (identified as     CVE-2007-2799, see GLSA 200705-25) since version 4.20 of 'file' was     never shipped with The Sleuth Kit ebuilds.

Impact :

A remote attacker could entice a user to run The Sleuth Kit on a file     system containing a specially crafted file that would trigger a     heap-based buffer overflow possibly leading to the execution of     arbitrary code with the rights of the user running The Sleuth Kit.

Workaround :

There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200710-19.
#
# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(27517);
  script_version("1.18");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2007-1536", "CVE-2007-2799");
  script_xref(name:"GLSA", value:"200710-19");

  script_name(english:"GLSA-200710-19 : The Sleuth Kit: Integer underflow");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200710-19
(The Sleuth Kit: Integer underflow)

    Jean-Sebastien Guay-Leroux reported an integer underflow in the
    file_printf() function of the 'file' utility which is bundled with The
    Sleuth Kit (CVE-2007-1536, GLSA 200703-26). Note that Gentoo is not
    affected by the improper fix for this vulnerability (identified as
    CVE-2007-2799, see GLSA 200705-25) since version 4.20 of 'file' was
    never shipped with The Sleuth Kit ebuilds.
  
Impact :

    A remote attacker could entice a user to run The Sleuth Kit on a file
    system containing a specially crafted file that would trigger a
    heap-based buffer overflow possibly leading to the execution of
    arbitrary code with the rights of the user running The Sleuth Kit.
  
Workaround :

    There is no known workaround at this time."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200703-26"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200705-25"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200710-19"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All The Sleuth Kit users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=app-forensics/sleuthkit-2.0.9'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_cwe_id(189);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:sleuthkit");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2007/10/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/10/19");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"app-forensics/sleuthkit", unaffected:make_list("ge 2.0.9"), vulnerable:make_list("lt 2.0.9"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "The Sleuth Kit");
}

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.049

Percentile

92.8%