Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OPENSUSE-2012-853.NASL
HistoryJun 13, 2014 - 12:00 a.m.

openSUSE Security Update : bind (openSUSE-SU-2012:1649-1)

2014-06-1300:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
23

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.035

Percentile

91.6%

bind received updates to fix bugs and security issues.

On openSUSE 12.2, bind was updated to 9.9.2-P1. On openSUSE 12.1, bind was updated to 9.8.4-P1.

Main security fix: CVE-2012-5688: Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).
[CVE-2012-5688] [RT #30792]

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update openSUSE-2012-853.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(74845);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2012-5688");

  script_name(english:"openSUSE Security Update : bind (openSUSE-SU-2012:1649-1)");
  script_summary(english:"Check for the openSUSE-2012-853 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"bind received updates to fix bugs and security issues.

On openSUSE 12.2, bind was updated to 9.9.2-P1. On openSUSE 12.1, bind
was updated to 9.8.4-P1.

Main security fix: CVE-2012-5688: Prevents named from aborting with a
require assertion failure on servers with DNS64 enabled. These crashes
might occur as a result of specific queries that are received. (Note
that this fix is a subset of a series of updates that will be included
in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).
[CVE-2012-5688] [RT #30792]"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=792926"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://lists.opensuse.org/opensuse-updates/2012-12/msg00030.html"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected bind packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-chrootenv");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-debugsource");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-libs-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-libs-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-lwresd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-lwresd-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-utils");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:bind-utils-debuginfo");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.2");

  script_set_attribute(attribute:"patch_publication_date", value:"2012/12/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE12\.1|SUSE12\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.1 / 12.2", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE12.1", reference:"bind-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-chrootenv-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-debuginfo-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-debugsource-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-devel-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-libs-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-libs-debuginfo-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-lwresd-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-lwresd-debuginfo-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-utils-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", reference:"bind-utils-debuginfo-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", cpu:"x86_64", reference:"bind-libs-32bit-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.1", cpu:"x86_64", reference:"bind-libs-debuginfo-32bit-9.8.4P1-4.28.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-chrootenv-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-debuginfo-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-debugsource-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-devel-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-libs-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-libs-debuginfo-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-lwresd-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-lwresd-debuginfo-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-utils-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", reference:"bind-utils-debuginfo-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", cpu:"x86_64", reference:"bind-libs-32bit-9.9.2P1-1.12.1") ) flag++;
if ( rpm_check(release:"SUSE12.2", cpu:"x86_64", reference:"bind-libs-debuginfo-32bit-9.9.2P1-1.12.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bind");
}
VendorProductVersionCPE
novellopensusebindp-cpe:/a:novell:opensuse:bind
novellopensusebind-chrootenvp-cpe:/a:novell:opensuse:bind-chrootenv
novellopensusebind-debuginfop-cpe:/a:novell:opensuse:bind-debuginfo
novellopensusebind-debugsourcep-cpe:/a:novell:opensuse:bind-debugsource
novellopensusebind-develp-cpe:/a:novell:opensuse:bind-devel
novellopensusebind-libsp-cpe:/a:novell:opensuse:bind-libs
novellopensusebind-libs-32bitp-cpe:/a:novell:opensuse:bind-libs-32bit
novellopensusebind-libs-debuginfop-cpe:/a:novell:opensuse:bind-libs-debuginfo
novellopensusebind-libs-debuginfo-32bitp-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit
novellopensusebind-lwresdp-cpe:/a:novell:opensuse:bind-lwresd
Rows per page:
1-10 of 151

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.035

Percentile

91.6%