6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.075 Low
EPSS
Percentile
94.2%
Hanno Bock discovered that libarchive contained multiple security issues when processing certain malformed archive files. A remote attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2015-8916, CVE-2015-8917 CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8922, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8930, CVE-2015-8931, CVE-2015-8932, CVE-2015-8933, CVE-2015-8934, CVE-2016-5844)
Marcin ‘Icewall’ Noga discovered that libarchive contained multiple security issues when processing certain malformed archive files. A remote attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-4300, CVE-2016-4302)
It was discovered that libarchive incorrectly handled memory allocation with large cpio symlinks. A remote attacker could use this issue to possibly cause libarchive to crash, resulting in a denial of service. (CVE-2016-4809).
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-3033-1. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include('compat.inc');
if (description)
{
script_id(92312);
script_version("2.11");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/20");
script_cve_id(
"CVE-2015-8916",
"CVE-2015-8917",
"CVE-2015-8919",
"CVE-2015-8920",
"CVE-2015-8921",
"CVE-2015-8922",
"CVE-2015-8923",
"CVE-2015-8924",
"CVE-2015-8925",
"CVE-2015-8926",
"CVE-2015-8928",
"CVE-2015-8930",
"CVE-2015-8931",
"CVE-2015-8932",
"CVE-2015-8933",
"CVE-2015-8934",
"CVE-2016-4300",
"CVE-2016-4302",
"CVE-2016-4809",
"CVE-2016-5844"
);
script_xref(name:"USN", value:"3033-1");
script_name(english:"Ubuntu 14.04 LTS / 16.04 LTS : libarchive vulnerabilities (USN-3033-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote Ubuntu host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"Hanno Bock discovered that libarchive contained multiple security
issues when processing certain malformed archive files. A remote
attacker could use this issue to cause libarchive to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2015-8916, CVE-2015-8917 CVE-2015-8919, CVE-2015-8920,
CVE-2015-8921, CVE-2015-8922, CVE-2015-8923, CVE-2015-8924,
CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8930,
CVE-2015-8931, CVE-2015-8932, CVE-2015-8933, CVE-2015-8934,
CVE-2016-5844)
Marcin 'Icewall' Noga discovered that libarchive contained multiple
security issues when processing certain malformed archive files. A
remote attacker could use this issue to cause libarchive to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-4300, CVE-2016-4302)
It was discovered that libarchive incorrectly handled memory
allocation with large cpio symlinks. A remote attacker could use this
issue to possibly cause libarchive to crash, resulting in a denial of
service. (CVE-2016-4809).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://ubuntu.com/security/notices/USN-3033-1");
script_set_attribute(attribute:"solution", value:
"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-4302");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/09/20");
script_set_attribute(attribute:"patch_publication_date", value:"2016/07/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/07/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libarchive13");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04:-:lts");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:bsdcpio");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:bsdtar");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libarchive-dev");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Ubuntu Local Security Checks");
script_copyright(english:"Ubuntu Security Notice (C) 2016-2023 Canonical, Inc. / NASL script (C) 2016-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include('debian_package.inc');
if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/Ubuntu/release');
if ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');
os_release = chomp(os_release);
if (! ('14.04' >< os_release || '16.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 14.04 / 16.04', 'Ubuntu ' + os_release);
if ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);
var pkgs = [
{'osver': '14.04', 'pkgname': 'bsdcpio', 'pkgver': '3.1.2-7ubuntu2.3'},
{'osver': '14.04', 'pkgname': 'bsdtar', 'pkgver': '3.1.2-7ubuntu2.3'},
{'osver': '14.04', 'pkgname': 'libarchive-dev', 'pkgver': '3.1.2-7ubuntu2.3'},
{'osver': '14.04', 'pkgname': 'libarchive13', 'pkgver': '3.1.2-7ubuntu2.3'},
{'osver': '16.04', 'pkgname': 'bsdcpio', 'pkgver': '3.1.2-11ubuntu0.16.04.2'},
{'osver': '16.04', 'pkgname': 'bsdtar', 'pkgver': '3.1.2-11ubuntu0.16.04.2'},
{'osver': '16.04', 'pkgname': 'libarchive-dev', 'pkgver': '3.1.2-11ubuntu0.16.04.2'},
{'osver': '16.04', 'pkgname': 'libarchive13', 'pkgver': '3.1.2-11ubuntu0.16.04.2'}
];
var flag = 0;
foreach package_array ( pkgs ) {
var osver = NULL;
var pkgname = NULL;
var pkgver = NULL;
if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];
if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];
if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];
if (osver && pkgname && pkgver) {
if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;
}
}
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
var tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bsdcpio / bsdtar / libarchive-dev / libarchive13');
}
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | ubuntu_linux | libarchive13 | p-cpe:/a:canonical:ubuntu_linux:libarchive13 |
canonical | ubuntu_linux | 14.04 | cpe:/o:canonical:ubuntu_linux:14.04:-:lts |
canonical | ubuntu_linux | 16.04 | cpe:/o:canonical:ubuntu_linux:16.04:-:lts |
canonical | ubuntu_linux | bsdcpio | p-cpe:/a:canonical:ubuntu_linux:bsdcpio |
canonical | ubuntu_linux | bsdtar | p-cpe:/a:canonical:ubuntu_linux:bsdtar |
canonical | ubuntu_linux | libarchive-dev | p-cpe:/a:canonical:ubuntu_linux:libarchive-dev |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8917
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8922
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8926
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8931
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4300
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4302
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844
ubuntu.com/security/notices/USN-3033-1
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.075 Low
EPSS
Percentile
94.2%