Lucene search

K
openvasCopyright (C) 2008 E-Soft Inc.OPENVAS:136141256231053571
HistoryJan 17, 2008 - 12:00 a.m.

Debian Security Advisory DSA 080-1 (htdig)

2008-01-1700:00:00
Copyright (C) 2008 E-Soft Inc.
plugins.openvas.org
7

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

7.1 High

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.3%

The remote host is missing an update to htdig
announced via advisory DSA 080-1.

# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.53571");
  script_cve_id("CVE-2001-0834");
  script_version("2023-07-19T05:05:15+0000");
  script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:P");
  script_name("Debian Security Advisory DSA 080-1 (htdig)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Debian Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB2\.2");
  script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20080-1");
  script_tag(name:"insight", value:"Nergal reported a vulnerability in the htsearch program which is
distributed as part of the ht://Dig package, an indexing and searching
system for small domains or intranets.  Using former versions it was
able to pass the parameter `-c' to the cgi program in order to use a
different configuration file.

A malicious user could point htsearch to a file like `/dev/zero' and
let the server run in an endless loop, trying to read config
parameters.  If the user has write permission on the server he can
point the program to it and retrieve any file readable by the webserver
user id.

This problem has been fixed in version of 3.1.5-2.1 for Debian
GNU/Linux 2.2.");

  script_tag(name:"solution", value:"We recommend that you upgrade your htdig package immediately.");
  script_tag(name:"summary", value:"The remote host is missing an update to htdig
announced via advisory DSA 080-1.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

res = "";
report = "";
if((res = isdpkgvuln(pkg:"htdig-doc", ver:"3.1.5-2.0potato.1", rls:"DEB2.2")) != NULL) {
  report += res;
}
if((res = isdpkgvuln(pkg:"htdig", ver:"3.1.5-2.0potato.1", rls:"DEB2.2")) != NULL) {
  report += res;
}

if(report != "") {
  security_message(data:report);
} else if(__pkg_match) {
  exit(99);
}

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

7.1 High

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.3%

Related for OPENVAS:136141256231053571