CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
85.5%
Fixed bnc#747657: CVE-2012-1053, CVE-2012-1054: improper privilege dropping and file handling flaws This was done by updating to the new version in stable branch. The stable branch receives only security fixes and this update does not provide any new features.
Fixed bnc#755869 CVE-2012-1988: Filebucket arbitrary code execution
Fixed bnc#755872 CVE-2012-1986: Arbitrary File Read
Fixed bnc#755870 CVE-2012-1987: Denial of Service
Fixed bnc#755871 CVE-2012-1989: Arbitrary File Write
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2012-369.
#
# The text description of this plugin is (C) SUSE LLC.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(74671);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2012-1053", "CVE-2012-1054", "CVE-2012-1986", "CVE-2012-1987", "CVE-2012-1988", "CVE-2012-1989");
script_name(english:"openSUSE Security Update : puppet (openSUSE-SU-2012:0835-1)");
script_summary(english:"Check for the openSUSE-2012-369 patch");
script_set_attribute(
attribute:"synopsis",
value:"The remote openSUSE host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Fixed bnc#747657: CVE-2012-1053, CVE-2012-1054: improper
privilege dropping and file handling flaws This was done
by updating to the new version in stable branch. The
stable branch receives only security fixes and this
update does not provide any new features.
- Fixed bnc#755869 CVE-2012-1988: Filebucket arbitrary
code execution
- Fixed bnc#755872 CVE-2012-1986: Arbitrary File Read
- Fixed bnc#755870 CVE-2012-1987: Denial of Service
- Fixed bnc#755871 CVE-2012-1989: Arbitrary File Write"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=747657"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=755869"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=755870"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=755871"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.novell.com/show_bug.cgi?id=755872"
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.opensuse.org/opensuse-updates/2012-07/msg00015.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected puppet packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:puppet");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:puppet-server");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.4");
script_set_attribute(attribute:"patch_publication_date", value:"2012/06/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE11\.4)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.4", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
flag = 0;
if ( rpm_check(release:"SUSE11.4", reference:"puppet-2.6.16-4.23.1") ) flag++;
if ( rpm_check(release:"SUSE11.4", reference:"puppet-server-2.6.16-4.23.1") ) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "puppet / puppet-server");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1054
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1989
bugzilla.novell.com/show_bug.cgi?id=747657
bugzilla.novell.com/show_bug.cgi?id=755869
bugzilla.novell.com/show_bug.cgi?id=755870
bugzilla.novell.com/show_bug.cgi?id=755871
bugzilla.novell.com/show_bug.cgi?id=755872
lists.opensuse.org/opensuse-updates/2012-07/msg00015.html