Lucene search

K
nessusThis script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.MANDRIVA_MDVSA-2013-032.NASL
HistoryApr 20, 2013 - 12:00 a.m.

Mandriva Linux Security Advisory : bash (MDVSA-2013:032)

2013-04-2000:00:00
This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability was found and corrected in bash :

A stack-based buffer overflow flaw was found in the way bash, the GNU Bourne Again shell, expanded certain /dev/fd file names when checking file names (‘test’ command) and evaluating /dev/fd file names in conditinal command expressions. A remote attacker could provide a specially crafted Bash script that, when executed, would cause the bash executable to crash (CVE-2012-3410).

Additionally the official patches 011 to 037 for bash-4.2 has been applied which resolves other issues found, including the CVE-2012-3410 vulnerability.

NOTE: This advisory was previousely given the MDVSA-2013:019 identifier by mistake.

#%NASL_MIN_LEVEL 70300

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Mandriva Linux Security Advisory MDVSA-2013:032. 
# The text itself is copyright (C) Mandriva S.A.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(66046);
  script_version("1.9");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2012-3410");
  script_bugtraq_id(54937);
  script_xref(name:"MDVSA", value:"2013:032");

  script_name(english:"Mandriva Linux Security Advisory : bash (MDVSA-2013:032)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Mandriva Linux host is missing one or more security
updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"A vulnerability was found and corrected in bash :

A stack-based buffer overflow flaw was found in the way bash, the GNU
Bourne Again shell, expanded certain /dev/fd file names when checking
file names ('test' command) and evaluating /dev/fd file names in
conditinal command expressions. A remote attacker could provide a
specially crafted Bash script that, when executed, would cause the
bash executable to crash (CVE-2012-3410).

Additionally the official patches 011 to 037 for bash-4.2 has been
applied which resolves other issues found, including the CVE-2012-3410
vulnerability.

NOTE: This advisory was previousely given the MDVSA-2013:019
identifier by mistake."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-011"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-012"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-013"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-014"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-015"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-016"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-017"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-018"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-019"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-020"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-021"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-022"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-023"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-024"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-025"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-026"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-027"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-028"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-029"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-030"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-031"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-032"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-033"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-034"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-035"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-036"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"ftp://ftp.gnu.org/gnu/bash/bash-4.2-patches/bash42-037"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected bash and / or bash-doc packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bash");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:bash-doc");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");

  script_set_attribute(attribute:"patch_publication_date", value:"2013/04/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/20");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Mandriva Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);


flag = 0;
if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"bash-4.2-6.1.mbs1")) flag++;
if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"bash-doc-4.2-6.1.mbs1")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
mandrivalinuxbashp-cpe:/a:mandriva:linux:bash
mandrivalinuxbash-docp-cpe:/a:mandriva:linux:bash-doc
mandrivabusiness_server1cpe:/o:mandriva:business_server:1

References

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

5.1%