Lucene search

K
nessusThis script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.NEWSTART_CGSL_NS-SA-2021-0114_SAMBA.NASL
HistoryOct 28, 2021 - 12:00 a.m.

NewStart CGSL CORE 5.04 / MAIN 5.04 : samba Vulnerability (NS-SA-2021-0114)

2021-10-2800:00:00
This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

0.004 Low

EPSS

Percentile

74.4%

The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has samba packages installed that are affected by a vulnerability:

  • A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
    (CVE-2021-20254)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from ZTE advisory NS-SA-2021-0114. The text
# itself is copyright (C) ZTE, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(154613);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/01/26");

  script_cve_id("CVE-2021-20254");
  script_xref(name:"IAVA", value:"2021-A-0208-S");

  script_name(english:"NewStart CGSL CORE 5.04 / MAIN 5.04 : samba Vulnerability (NS-SA-2021-0114)");

  script_set_attribute(attribute:"synopsis", value:
"The remote NewStart CGSL host is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has samba packages installed that are affected by
a vulnerability:

  - A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix
    group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end
    of the array in the case where a negative cache entry had been added to the mapping cache. This could
    cause the calling code to return those values into the process token that stores the group membership for
    a user. The highest threat from this vulnerability is to data confidentiality and integrity.
    (CVE-2021-20254)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2021-0114");
  script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/info/CVE-2021-20254");
  script_set_attribute(attribute:"solution", value:
"Upgrade the vulnerable CGSL samba packages. Note that updated packages may not be available yet. Please contact ZTE for
more information.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-20254");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/04/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/09/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/10/28");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:ctdb");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:ctdb-tests");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:libsmbclient");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:libsmbclient-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:libwbclient");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:libwbclient-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-client");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-client-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-common-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-common-tools");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-dc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-dc-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-krb5-printing");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-pidl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-python");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-python-test");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-test");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-test-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-vfs-glusterfs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-winbind");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-winbind-clients");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-winbind-krb5-locator");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_core:samba-winbind-modules");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:ctdb");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:ctdb-tests");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:libsmbclient");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:libsmbclient-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:libwbclient");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:libwbclient-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-client");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-client-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-common-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-common-tools");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-dc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-dc-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-krb5-printing");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-pidl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-python");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-python-test");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-test");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-test-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-vfs-glusterfs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-winbind");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-winbind-clients");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-winbind-krb5-locator");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:zte:cgsl_main:samba-winbind-modules");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:zte:cgsl_core:5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:zte:cgsl_main:5");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"NewStart CGSL Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu");

  exit(0);
}

include('audit.inc');
include('global_settings.inc');
include('rpm.inc');

if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

var release = get_kb_item('Host/ZTE-CGSL/release');
if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, 'NewStart Carrier Grade Server Linux');

if (release !~ "CGSL CORE 5.04" &&
    release !~ "CGSL MAIN 5.04")
  audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.04 / NewStart CGSL MAIN 5.04');

if (!get_kb_item('Host/ZTE-CGSL/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);

var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'NewStart Carrier Grade Server Linux', cpu);

var flag = 0;

var pkgs = {
  'CGSL CORE 5.04': [
    'ctdb-4.10.16-15.el7_9',
    'ctdb-tests-4.10.16-15.el7_9',
    'libsmbclient-4.10.16-15.el7_9',
    'libsmbclient-devel-4.10.16-15.el7_9',
    'libwbclient-4.10.16-15.el7_9',
    'libwbclient-devel-4.10.16-15.el7_9',
    'samba-4.10.16-15.el7_9',
    'samba-client-4.10.16-15.el7_9',
    'samba-client-libs-4.10.16-15.el7_9',
    'samba-common-4.10.16-15.el7_9',
    'samba-common-libs-4.10.16-15.el7_9',
    'samba-common-tools-4.10.16-15.el7_9',
    'samba-dc-4.10.16-15.el7_9',
    'samba-dc-libs-4.10.16-15.el7_9',
    'samba-debuginfo-4.10.16-15.el7_9',
    'samba-devel-4.10.16-15.el7_9',
    'samba-krb5-printing-4.10.16-15.el7_9',
    'samba-libs-4.10.16-15.el7_9',
    'samba-pidl-4.10.16-15.el7_9',
    'samba-python-4.10.16-15.el7_9',
    'samba-python-test-4.10.16-15.el7_9',
    'samba-test-4.10.16-15.el7_9',
    'samba-test-libs-4.10.16-15.el7_9',
    'samba-vfs-glusterfs-4.10.16-15.el7_9',
    'samba-winbind-4.10.16-15.el7_9',
    'samba-winbind-clients-4.10.16-15.el7_9',
    'samba-winbind-krb5-locator-4.10.16-15.el7_9',
    'samba-winbind-modules-4.10.16-15.el7_9'
  ],
  'CGSL MAIN 5.04': [
    'ctdb-4.10.16-15.el7_9',
    'ctdb-tests-4.10.16-15.el7_9',
    'libsmbclient-4.10.16-15.el7_9',
    'libsmbclient-devel-4.10.16-15.el7_9',
    'libwbclient-4.10.16-15.el7_9',
    'libwbclient-devel-4.10.16-15.el7_9',
    'samba-4.10.16-15.el7_9',
    'samba-client-4.10.16-15.el7_9',
    'samba-client-libs-4.10.16-15.el7_9',
    'samba-common-4.10.16-15.el7_9',
    'samba-common-libs-4.10.16-15.el7_9',
    'samba-common-tools-4.10.16-15.el7_9',
    'samba-dc-4.10.16-15.el7_9',
    'samba-dc-libs-4.10.16-15.el7_9',
    'samba-debuginfo-4.10.16-15.el7_9',
    'samba-devel-4.10.16-15.el7_9',
    'samba-krb5-printing-4.10.16-15.el7_9',
    'samba-libs-4.10.16-15.el7_9',
    'samba-pidl-4.10.16-15.el7_9',
    'samba-python-4.10.16-15.el7_9',
    'samba-python-test-4.10.16-15.el7_9',
    'samba-test-4.10.16-15.el7_9',
    'samba-test-libs-4.10.16-15.el7_9',
    'samba-vfs-glusterfs-4.10.16-15.el7_9',
    'samba-winbind-4.10.16-15.el7_9',
    'samba-winbind-clients-4.10.16-15.el7_9',
    'samba-winbind-krb5-locator-4.10.16-15.el7_9',
    'samba-winbind-modules-4.10.16-15.el7_9'
  ]
};
var pkg_list = pkgs[release];

foreach (pkg in pkg_list)
  if (rpm_check(release:'ZTE ' + release, reference:pkg)) flag++;

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  var tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'samba');
}
VendorProductVersionCPE
ztecgsl_corectdbp-cpe:/a:zte:cgsl_core:ctdb
ztecgsl_corectdb-testsp-cpe:/a:zte:cgsl_core:ctdb-tests
ztecgsl_corelibsmbclientp-cpe:/a:zte:cgsl_core:libsmbclient
ztecgsl_corelibsmbclient-develp-cpe:/a:zte:cgsl_core:libsmbclient-devel
ztecgsl_corelibwbclientp-cpe:/a:zte:cgsl_core:libwbclient
ztecgsl_corelibwbclient-develp-cpe:/a:zte:cgsl_core:libwbclient-devel
ztecgsl_coresambap-cpe:/a:zte:cgsl_core:samba
ztecgsl_coresamba-clientp-cpe:/a:zte:cgsl_core:samba-client
ztecgsl_coresamba-client-libsp-cpe:/a:zte:cgsl_core:samba-client-libs
ztecgsl_coresamba-commonp-cpe:/a:zte:cgsl_core:samba-common
Rows per page:
1-10 of 581

4.9 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

0.004 Low

EPSS

Percentile

74.4%