Lucene search

K
nessusThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.GOOGLE_PICASA_3_9_137_69.NASL
HistoryJan 10, 2014 - 12:00 a.m.

Google Picasa < 3.9 Build 137.69 Multiple Vulnerabilities

2014-01-1000:00:00
This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.015

Percentile

87.1%

The version of Google Picasa installed on the remote host is earlier than 3.9 Build 137.69. As such, it is affected by the following vulnerabilities in the main executable (Picasa3.exe) :

  • An integer underflow vulnerability exists when parsing Canon RAW CR2 files containing a JPEG tag with the value greater than 0xFF00 and the size smaller than 2.
    (CVE-2013-5349)

  • An integer overflow vulnerability exists due to parsing Canon RAW CR2 files with excessively large ‘StripByteCounts’ TIFF tag. (CVE-2013-5357)

  • A memory corruption vulnerability exists due to a boundary error when parsing TIFF tags with the model set to ‘DSLR-A100’ and containing multiple sequences of 0x100 and 0x14A tags. (CVE-2013-5358)

  • A buffer overflow vulnerability exists due to an error when parsing a specially crafted KDC file with a size of 71 bytes. (CVE-2013-5359)

Exploitation of these vulnerabilities could result in a denial of service or arbitrary code execution.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(71897);
  script_version("1.3");
  script_cvs_date("Date: 2019/11/26");

  script_cve_id(
    "CVE-2013-5349",
    "CVE-2013-5357",
    "CVE-2013-5358",
    "CVE-2013-5359"
  );
  script_bugtraq_id(
    64466,
    64467,
    64468,
    64470
  );

  script_name(english:"Google Picasa < 3.9 Build 137.69 Multiple Vulnerabilities");
  script_summary(english:"Windows version check on Picasa");

  script_set_attribute(attribute:"synopsis", value:
"A photo organizer installed on the remote Windows host has multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Google Picasa installed on the remote host is earlier
than 3.9 Build 137.69.  As such, it is affected by the following
vulnerabilities in the main executable (Picasa3.exe) :

  - An integer underflow vulnerability exists when parsing
    Canon RAW CR2 files containing a JPEG tag with the value
    greater than 0xFF00 and the size smaller than 2.
    (CVE-2013-5349)

  - An integer overflow vulnerability exists due to parsing
    Canon RAW CR2 files with excessively large
    'StripByteCounts' TIFF tag. (CVE-2013-5357)

  - A memory corruption vulnerability exists due to a
    boundary error when parsing TIFF tags with the model set
    to 'DSLR-A100' and containing multiple sequences of
    0x100 and 0x14A tags. (CVE-2013-5358)

  - A buffer overflow vulnerability exists due to an error
    when parsing a specially crafted KDC file with a size
    of 71 bytes. (CVE-2013-5359)

Exploitation of these vulnerabilities could result in a denial of
service or arbitrary code execution.");
  script_set_attribute(attribute:"see_also", value:"http://support.google.com/picasa/answer/53209");
  script_set_attribute(attribute:"see_also", value:"http://secunia.com/secunia_research/2013-14/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Picasa 3.9.0 Build 137.69 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-5359");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/12/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/12/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/10");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:google:picasa");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("google_picasa_installed.nasl");
  script_require_keys("SMB/Google_Picasa/Installed");

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");

app_name = "Google Picasa";
kb_base = "SMB/Google_Picasa/";
get_kb_item_or_exit(kb_base+"Installed");

versions = get_kb_list_or_exit(kb_base+"Versions");

info = '';
info2 = '';
vuln = 0;
fixed_ver = "3.9.137.69";

foreach version (versions)
{
  version_ui = get_kb_item(kb_base+version+'/Version_UI');
  if (isnull(version_ui)) continue;

  # nb: fix parameter is actually the affected version
  if (ver_compare(ver:version, fix:fixed_ver, strict:FALSE) == -1)
  {
    path = get_kb_item(kb_base+version+'/Path');
    if (isnull(path)) path = 'n/a';

    vuln++;
    info +=
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version_ui +
      '\n  Fixed version     : 3.9 Build 137.69\n';
  }
  else info2 += ' and ' + version_ui;
}


if (info)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    if (vuln == 1) s = ' of ' + app_name + ' is';
    else s = 's of ' + app_name + ' are';

    report = '\n' + 'The following vulnerable instance'+s+' installed on the' +
             '\n' + 'remote host :' +
             '\n' +
             info;
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else if (info2)
{
  info2 -= " and ";
  if (" and " >< info2) be = "are";
  else be = "is";

  exit(0, "The host is not affected since "+app_name+" "+info2+" "+be+" installed.");
}
else exit(1, "An unexpected error was encountered - 'info2' is empty.");

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.015

Percentile

87.1%