Lucene search

K
nessusThis script is Copyright (C) 2013-2021 Tenable Network Security, Inc.REDHAT-RHSA-2012-0101.NASL
HistoryJan 24, 2013 - 12:00 a.m.

RHEL 5 / 6 : spacewalk-backend (RHSA-2012:0101)

2013-01-2400:00:00
This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.
www.tenable.com
11

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.001

Percentile

50.4%

Updated spacewalk-backend packages that fix one security issue and two bugs are now available for Red Hat Network Satellite 5.4.

The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

Red Hat Network (RHN) Satellite is a systems management tool for Linux-based infrastructures. It allows for provisioning, monitoring, and remote management of multiple Linux deployments with a single, centralized tool.

If a user submitted a system registration XML-RPC call to an RHN Satellite server (for example, by running ‘rhnreg_ks’) and that call failed, their RHN user password was included in plain text in the error messages both stored in the server log and mailed to the server administrator. With this update, user passwords are excluded from these error messages to avoid the exposure of authentication credentials. (CVE-2012-0059)

This update also fixes the following bugs :

  • When activating a new RHN Satellite certificate that has less entitlements than is currently used or allotted on the Satellite server, the error message notified the user only about the first problem encountered and did not include directions for resolution.
    With this update, more verbose error messages are shown in this scenario. (BZ#209514, BZ#704623)

All users of Red Hat Network Satellite are advised to upgrade to these updated packages, which correct these issues. For this update to take effect, Red Hat Network Satellite must be restarted. Refer to the Solution section for details.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# Disabled on 2013/07/05.
#
# The descriptive text and package checks in this plugin were  
# extracted from Red Hat Security Advisory RHSA-2012:0101. The text 
# itself is copyright (C) Red Hat, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(64024);
  script_version("1.12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");

  script_cve_id("CVE-2012-0059");
  script_bugtraq_id(51569);
  script_xref(name:"RHSA", value:"2012:0101");

  script_name(english:"RHEL 5 / 6 : spacewalk-backend (RHSA-2012:0101)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Red Hat host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Updated spacewalk-backend packages that fix one security issue and two
bugs are now available for Red Hat Network Satellite 5.4.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Red Hat Network (RHN) Satellite is a systems management tool for
Linux-based infrastructures. It allows for provisioning, monitoring,
and remote management of multiple Linux deployments with a single,
centralized tool.

If a user submitted a system registration XML-RPC call to an RHN
Satellite server (for example, by running 'rhnreg_ks') and that call
failed, their RHN user password was included in plain text in the
error messages both stored in the server log and mailed to the server
administrator. With this update, user passwords are excluded from
these error messages to avoid the exposure of authentication
credentials. (CVE-2012-0059)

This update also fixes the following bugs :

* When activating a new RHN Satellite certificate that has less
entitlements than is currently used or allotted on the Satellite
server, the error message notified the user only about the first
problem encountered and did not include directions for resolution.
With this update, more verbose error messages are shown in this
scenario. (BZ#209514, BZ#704623)

All users of Red Hat Network Satellite are advised to upgrade to these
updated packages, which correct these issues. For this update to take
effect, Red Hat Network Satellite must be restarted. Refer to the
Solution section for details."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.redhat.com/security/data/cve/CVE-2012-0059.html"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://rhn.redhat.com/errata/RHSA-2012-0101.html"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-app");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-applet");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-config-files");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-config-files-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-config-files-tool");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-iss");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-iss-export");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-package-push-server");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-server");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-sql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-sql-oracle");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-tools");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-upload-server");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-xml-export-libs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-xmlrpc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:spacewalk-backend-xp");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");

  script_set_attribute(attribute:"patch_publication_date", value:"2012/02/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/24");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.");
  script_family(english:"Red Hat Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


# Deprecated
exit(0, "This plugin has been temporarily deprecated.");

include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);

flag = 0;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-app-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-applet-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-config-files-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-config-files-common-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-config-files-tool-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-iss-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-iss-export-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-libs-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-package-push-server-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-server-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-sql-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-sql-oracle-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-tools-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-upload-server-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-xml-export-libs-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-xmlrpc-1.2.13-66.el5sat")) flag++;
if (rpm_check(release:"RHEL5", reference:"spacewalk-backend-xp-1.2.13-66.el5sat")) flag++;

if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-app-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-applet-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-config-files-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-config-files-common-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-config-files-tool-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-iss-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-iss-export-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-libs-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-package-push-server-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-server-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-sql-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-sql-oracle-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-tools-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-upload-server-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-xml-export-libs-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-xmlrpc-1.2.13-66.el6sat")) flag++;
if (rpm_check(release:"RHEL6", reference:"spacewalk-backend-xp-1.2.13-66.el6sat")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.001

Percentile

50.4%

Related for REDHAT-RHSA-2012-0101.NASL