CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
EPSS
Percentile
79.9%
The remote Solaris system is missing necessary patches to address security updates :
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a ‘BEAST’ attack. (CVE-2011-3389)
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
(CVE-2012-3482)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Oracle Third Party software advisories.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(80605);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");
script_cve_id("CVE-2011-3389", "CVE-2012-3482");
script_xref(name:"CEA-ID", value:"CEA-2019-0547");
script_name(english:"Oracle Solaris Third-Party Patch Update : fetchmail (multiple_vulnerabilities_in_fetchmail) (BEAST)");
script_set_attribute(attribute:"synopsis", value:
"The remote Solaris system is missing a security patch for third-party
software.");
script_set_attribute(attribute:"description", value:
"The remote Solaris system is missing necessary patches to address
security updates :
- The SSL protocol, as used in certain configurations in
Microsoft Windows and Microsoft Internet Explorer,
Mozilla Firefox, Google Chrome, Opera, and other
products, encrypts data by using CBC mode with chained
initialization vectors, which allows man-in-the-middle
attackers to obtain plaintext HTTP headers via a
blockwise chosen-boundary attack (BCBA) on an HTTPS
session, in conjunction with JavaScript code that uses
(1) the HTML5 WebSocket API, (2) the Java URLConnection
API, or (3) the Silverlight WebClient API, aka a 'BEAST'
attack. (CVE-2011-3389)
- Fetchmail 5.0.8 through 6.3.21, when using NTLM
authentication in debug mode, allows remote NTLM servers
to (1) cause a denial of service (crash and delayed
delivery of inbound mail) via a crafted NTLM response
that triggers an out-of-bounds read in the base64
decoder, or (2) obtain sensitive information from memory
via an NTLM Type 2 message with a crafted Target Name
structure, which triggers an out-of-bounds read.
(CVE-2012-3482)");
# https://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4a913f44");
# https://blogs.oracle.com/sunsecurity/multiple-vulnerabilities-in-fetchmail
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?90390bc0");
script_set_attribute(attribute:"solution", value:
"Upgrade to Solaris 11/11 SRU 12.4.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"patch_publication_date", value:"2012/10/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/01/19");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:solaris:fetchmail");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Solaris Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2015-2022 Tenable Network Security, Inc.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release", "Host/Solaris11/pkg-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("solaris.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Solaris11/release");
if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11");
pkg_list = solaris_pkg_list_leaves();
if (isnull (pkg_list)) audit(AUDIT_PACKAGE_LIST_MISSING, "Solaris pkg-list packages");
if (empty_or_null(egrep(string:pkg_list, pattern:"^fetchmail$"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "fetchmail");
flag = 0;
if (solaris_check_release(release:"0.5.11-0.175.0.12.0.4.0", sru:"SRU 12.4") > 0) flag++;
if (flag)
{
error_extra = 'Affected package : fetchmail\n' + solaris_get_report2();
error_extra = ereg_replace(pattern:"version", replace:"OS version", string:error_extra);
if (report_verbosity > 0) security_warning(port:0, extra:error_extra);
else security_warning(0);
exit(0);
}
else audit(AUDIT_PACKAGE_NOT_AFFECTED, "fetchmail");