CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.3%
Adobe flash-player was updated to 11.2.202.626 to fix the following security issues :
Security update to 11.2.202.626 (boo#984695) :
Please see https://helpx.adobe.com/security/products/flash-player/apsb16-18.html for more information.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2016:1613-1.
# The text itself is copyright (C) SUSE.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(93156);
script_version("2.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/03/28");
script_cve_id(
"CVE-2016-4122",
"CVE-2016-4123",
"CVE-2016-4124",
"CVE-2016-4125",
"CVE-2016-4127",
"CVE-2016-4128",
"CVE-2016-4129",
"CVE-2016-4130",
"CVE-2016-4131",
"CVE-2016-4132",
"CVE-2016-4133",
"CVE-2016-4134",
"CVE-2016-4135",
"CVE-2016-4136",
"CVE-2016-4137",
"CVE-2016-4138",
"CVE-2016-4139",
"CVE-2016-4140",
"CVE-2016-4141",
"CVE-2016-4142",
"CVE-2016-4143",
"CVE-2016-4144",
"CVE-2016-4145",
"CVE-2016-4146",
"CVE-2016-4147",
"CVE-2016-4148",
"CVE-2016-4149",
"CVE-2016-4150",
"CVE-2016-4151",
"CVE-2016-4152",
"CVE-2016-4153",
"CVE-2016-4154",
"CVE-2016-4155",
"CVE-2016-4156",
"CVE-2016-4166",
"CVE-2016-4171"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/04/15");
script_name(english:"SUSE SLED12 Security Update : flash-player (SUSE-SU-2016:1613-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"Adobe flash-player was updated to 11.2.202.626 to fix the following
security issues :
Security update to 11.2.202.626 (boo#984695) :
- APSB16-18, CVE-2016-4122, CVE-2016-4123, CVE-2016-4124,
CVE-2016-4125, CVE-2016-4127, CVE-2016-4128,
CVE-2016-4129, CVE-2016-4130, CVE-2016-4131,
CVE-2016-4132, CVE-2016-4133, CVE-2016-4134,
CVE-2016-4135, CVE-2016-4136, CVE-2016-4137,
CVE-2016-4138, CVE-2016-4139, CVE-2016-4140,
CVE-2016-4141, CVE-2016-4142, CVE-2016-4143,
CVE-2016-4144, CVE-2016-4145, CVE-2016-4146,
CVE-2016-4147, CVE-2016-4148, CVE-2016-4149,
CVE-2016-4150, CVE-2016-4151, CVE-2016-4152,
CVE-2016-4153, CVE-2016-4154, CVE-2016-4155,
CVE-2016-4156, CVE-2016-4166, CVE-2016-4171
Please see
https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
for more information.
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=984695");
script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb16-18.html");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4122/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4123/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4124/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4125/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4127/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4128/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4129/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4130/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4131/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4132/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4133/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4134/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4135/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4136/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4137/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4138/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4139/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4140/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4141/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4142/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4143/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4144/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4145/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4146/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4147/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4148/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4149/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4150/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4151/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4152/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4153/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4154/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4155/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4156/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4166/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-4171/");
# https://www.suse.com/support/update/announcement/2016/suse-su-20161613-1/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cf805102");
script_set_attribute(attribute:"solution", value:
"To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Workstation Extension 12-SP1 :
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-960=1
SUSE Linux Enterprise Workstation Extension 12 :
zypper in -t patch SUSE-SLE-WE-12-2016-960=1
SUSE Linux Enterprise Desktop 12-SP1 :
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-960=1
SUSE Linux Enterprise Desktop 12 :
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-960=1
To bring your system up-to-date, use 'zypper patch'.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/06/16");
script_set_attribute(attribute:"patch_publication_date", value:"2016/06/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/08/29");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:flash-player");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:flash-player-gnome");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2016-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
if (cpu >!< "x86_64") audit(AUDIT_ARCH_NOT, "x86_64", cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLED12" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP0/1", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLED12", sp:"1", cpu:"x86_64", reference:"flash-player-11.2.202.626-133.1")) flag++;
if (rpm_check(release:"SLED12", sp:"1", cpu:"x86_64", reference:"flash-player-gnome-11.2.202.626-133.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"flash-player-11.2.202.626-133.1")) flag++;
if (rpm_check(release:"SLED12", sp:"0", cpu:"x86_64", reference:"flash-player-gnome-11.2.202.626-133.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "flash-player");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4122
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4123
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4124
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4125
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4127
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4128
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4129
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4130
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4132
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4133
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4134
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4135
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4136
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4137
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4138
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4140
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4141
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4143
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4144
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4145
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4147
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4148
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4149
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4150
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4151
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4152
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4154
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4156
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4166
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4171
www.nessus.org/u?cf805102
bugzilla.suse.com/show_bug.cgi?id=984695
helpx.adobe.com/security/products/flash-player/apsb16-18.html
www.suse.com/security/cve/CVE-2016-4122/
www.suse.com/security/cve/CVE-2016-4123/
www.suse.com/security/cve/CVE-2016-4124/
www.suse.com/security/cve/CVE-2016-4125/
www.suse.com/security/cve/CVE-2016-4127/
www.suse.com/security/cve/CVE-2016-4128/
www.suse.com/security/cve/CVE-2016-4129/
www.suse.com/security/cve/CVE-2016-4130/
www.suse.com/security/cve/CVE-2016-4131/
www.suse.com/security/cve/CVE-2016-4132/
www.suse.com/security/cve/CVE-2016-4133/
www.suse.com/security/cve/CVE-2016-4134/
www.suse.com/security/cve/CVE-2016-4135/
www.suse.com/security/cve/CVE-2016-4136/
www.suse.com/security/cve/CVE-2016-4137/
www.suse.com/security/cve/CVE-2016-4138/
www.suse.com/security/cve/CVE-2016-4139/
www.suse.com/security/cve/CVE-2016-4140/
www.suse.com/security/cve/CVE-2016-4141/
www.suse.com/security/cve/CVE-2016-4142/
www.suse.com/security/cve/CVE-2016-4143/
www.suse.com/security/cve/CVE-2016-4144/
www.suse.com/security/cve/CVE-2016-4145/
www.suse.com/security/cve/CVE-2016-4146/
www.suse.com/security/cve/CVE-2016-4147/
www.suse.com/security/cve/CVE-2016-4148/
www.suse.com/security/cve/CVE-2016-4149/
www.suse.com/security/cve/CVE-2016-4150/
www.suse.com/security/cve/CVE-2016-4151/
www.suse.com/security/cve/CVE-2016-4152/
www.suse.com/security/cve/CVE-2016-4153/
www.suse.com/security/cve/CVE-2016-4154/
www.suse.com/security/cve/CVE-2016-4155/
www.suse.com/security/cve/CVE-2016-4156/
www.suse.com/security/cve/CVE-2016-4166/
www.suse.com/security/cve/CVE-2016-4171/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.3%