Vulnerabilities > CVE-2006-1721 - Improper Input Validation vulnerability in Cyrus Sasl

047910
CVSS 2.6 - LOW
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
high complexity
cyrus
CWE-20
nessus

Summary

digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.

Vulnerable Configurations

Part Description Count
Application
Cyrus
5

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SA_2006_025.NASL
    descriptionThe remote host is missing the patch for the advisory SUSE-SA:2006:025 (cyrus-sasl-digestmd5). If a server or client is using DIGEST-MD5 authentication via the cyrus-sasl libraries it is possible to cause a denial of service attack against the other side (client or server) by leaving out the
    last seen2019-10-28
    modified2006-05-13
    plugin id21370
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21370
    titleSUSE-SA:2006:025: cyrus-sasl-digestmd5
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # This plugin text was extracted from SuSE Security Advisory SUSE-SA:2006:025
    #
    
    
    if ( ! defined_func("bn_random") ) exit(0);
    
    include("compat.inc");
    
    if(description)
    {
     script_id(21370);
     script_version ("1.6");
     
     name["english"] = "SUSE-SA:2006:025: cyrus-sasl-digestmd5";
     
     script_name(english:name["english"]);
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote host is missing a vendor-supplied security patch" );
     script_set_attribute(attribute:"description", value:
    "The remote host is missing the patch for the advisory SUSE-SA:2006:025 (cyrus-sasl-digestmd5).
    
    
    If a server or client is using DIGEST-MD5 authentication via the cyrus-sasl
    libraries it is possible to cause a denial of service attack against the other
    side (client or server) by leaving out the 'realm=' header in the authentication.
    
    This is tracked by the Mitre CVE ID CVE-2006-1721." );
     script_set_attribute(attribute:"solution", value:
    "http://www.suse.de/security/advisories/2006_05_05.html" );
     script_set_attribute(attribute:"risk_factor", value:"Medium" );
    
    
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/05/13");
     script_end_attributes();
    
     
     summary["english"] = "Check for the version of the cyrus-sasl-digestmd5 package";
     script_summary(english:summary["english"]);
     
     script_category(ACT_GATHER_INFO);
     
     script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
     family["english"] = "SuSE Local Security Checks";
     script_family(english:family["english"]);
     
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/SuSE/rpm-list");
     exit(0);
    }
    
    include("rpm.inc");
    if ( rpm_check( reference:"cyrus-sasl-digestmd5-2.1.18-33.11", release:"SUSE9.1") )
    {
     security_warning(0);
     exit(0);
    }
    if ( rpm_check( reference:"cyrus-sasl-digestmd5-2.1.19-7.4", release:"SUSE9.2") )
    {
     security_warning(0);
     exit(0);
    }
    if ( rpm_check( reference:"cyrus-sasl-digestmd5-2.1.20-7.2", release:"SUSE9.3") )
    {
     security_warning(0);
     exit(0);
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20070904_CYRUS_SASL_ON_SL4_X.NASL
    descriptionA bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id60245
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60245
    titleScientific Linux Security Update : cyrus-sasl on SL4.x, SL3.x i386/x86_64
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(60245);
      script_version("1.4");
      script_cvs_date("Date: 2019/10/25 13:36:17");
    
      script_cve_id("CVE-2006-1721");
    
      script_name(english:"Scientific Linux Security Update : cyrus-sasl on SL4.x, SL3.x i386/x86_64");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
    As part of the DIGEST-MD5 authentication exchange, the client is
    expected to send a specific set of information to the server. If one
    of these items (the 'realm') was not sent or was malformed, it was
    possible for a remote unauthenticated attacker to cause a denial of
    service (segmentation fault) on the server. (CVE-2006-1721)
    
    This errata also fixes the following bugs in Scientific Linux 4 :
    
      - the Kerberos 5 library included in Red Hat Enterprise
        Linux 4 was not thread safe. This update adds
        functionality which allows it to be used safely in a
        threaded application.
    
      - several memory leak bugs were fixed in cyrus-sasl's
        DIGEST-MD5 authentication plug-in.
    
      - /dev/urandom is now used by default on systems which
        don't support hwrandom. Previously, dev/random was the
        default.
    
      - cyrus-sasl needs zlib-devel to build properly. This
        dependency information is now included in the package."
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0709&L=scientific-linux-errata&T=0&P=429
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?2788f60d"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/09/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL3", reference:"cyrus-sasl-2.1.15-15")) flag++;
    if (rpm_check(release:"SL3", reference:"cyrus-sasl-devel-2.1.15-15")) flag++;
    if (rpm_check(release:"SL3", reference:"cyrus-sasl-gssapi-2.1.15-15")) flag++;
    if (rpm_check(release:"SL3", reference:"cyrus-sasl-md5-2.1.15-15")) flag++;
    if (rpm_check(release:"SL3", reference:"cyrus-sasl-plain-2.1.15-15")) flag++;
    
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-2.1.19-14")) flag++;
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-devel-2.1.19-14")) flag++;
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-gssapi-2.1.19-14")) flag++;
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-md5-2.1.19-14")) flag++;
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-ntlm-2.1.19-14")) flag++;
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-plain-2.1.19-14")) flag++;
    if (rpm_check(release:"SL4", reference:"cyrus-sasl-sql-2.1.19-14")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200604-09.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200604-09 (Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service) Cyrus-SASL contains an unspecified vulnerability in the DIGEST-MD5 process that could lead to a Denial of Service. Impact : An attacker could possibly exploit this vulnerability by sending specially crafted data stream to the Cyrus-SASL server, resulting in a Denial of Service even if the attacker is not able to authenticate. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21255
    published2006-04-21
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21255
    titleGLSA-200604-09 : Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200604-09.
    #
    # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21255);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:43");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"GLSA", value:"200604-09");
    
      script_name(english:"GLSA-200604-09 : Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200604-09
    (Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service)
    
        Cyrus-SASL contains an unspecified vulnerability in the DIGEST-MD5
        process that could lead to a Denial of Service.
      
    Impact :
    
        An attacker could possibly exploit this vulnerability by sending
        specially crafted data stream to the Cyrus-SASL server, resulting in a
        Denial of Service even if the attacker is not able to authenticate.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200604-09"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Cyrus-SASL users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=dev-libs/cyrus-sasl-2.1.21-r2'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/04/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/21");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-libs/cyrus-sasl", unaffected:make_list("ge 2.1.21-r2"), vulnerable:make_list("lt 2.1.21-r2"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:qpkg_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Cyrus-SASL");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1042.NASL
    descriptionThe Mu Security research team discovered a denial of service condition in the Simple Authentication and Security Layer authentication library (SASL) during DIGEST-MD5 negotiation. This potentially affects multiple products that use SASL DIGEST-MD5 authentication including OpenLDAP, Sendmail, Postfix, etc.
    last seen2020-06-01
    modified2020-06-02
    plugin id22584
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22584
    titleDebian DSA-1042-1 : cyrus-sasl2 - programming error
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-1042. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(22584);
      script_version("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:19");
    
      script_cve_id("CVE-2006-1721");
      script_bugtraq_id(17446);
      script_xref(name:"DSA", value:"1042");
    
      script_name(english:"Debian DSA-1042-1 : cyrus-sasl2 - programming error");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The Mu Security research team discovered a denial of service condition
    in the Simple Authentication and Security Layer authentication library
    (SASL) during DIGEST-MD5 negotiation. This potentially affects
    multiple products that use SASL DIGEST-MD5 authentication including
    OpenLDAP, Sendmail, Postfix, etc."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=361937"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2006/dsa-1042"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the cyrus-sasl2 packages.
    
    The old stable distribution (woody) is not affected by this problem.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 2.1.19-1.5sarge1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:cyrus-sasl2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/04/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/10/14");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.1", prefix:"libsasl2", reference:"2.1.19-1.5sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsasl2-dev", reference:"2.1.19-1.5sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsasl2-modules", reference:"2.1.19-1.5sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsasl2-modules-gssapi-heimdal", reference:"2.1.19-1.5sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsasl2-modules-kerberos-heimdal", reference:"2.1.19-1.5sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"libsasl2-modules-sql", reference:"2.1.19-1.5sarge1")) flag++;
    if (deb_check(release:"3.1", prefix:"sasl2-bin", reference:"2.1.19-1.5sarge1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:deb_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2007-0878.NASL
    descriptionFrom Red Hat Security Advisory 2007:0878 : Updated cyrus-sasl packages that correct a security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. A bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id67567
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67567
    titleOracle Linux 3 : cyrus-sasl (ELSA-2007-0878)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2007:0878 and 
    # Oracle Linux Security Advisory ELSA-2007-0878 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(67567);
      script_version("1.6");
      script_cvs_date("Date: 2019/10/25 13:36:07");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"RHSA", value:"2007:0878");
    
      script_name(english:"Oracle Linux 3 : cyrus-sasl (ELSA-2007-0878)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2007:0878 :
    
    Updated cyrus-sasl packages that correct a security issue are now
    available for Red Hat Enterprise Linux 3.
    
    This update has been rated as having moderate security impact by the
    Red Hat Security Response Team.
    
    The cyrus-sasl package contains the Cyrus implementation of SASL. SASL
    is the Simple Authentication and Security Layer, a method for adding
    authentication support to connection-based protocols.
    
    A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
    As part of the DIGEST-MD5 authentication exchange, the client is
    expected to send a specific set of information to the server. If one
    of these items (the 'realm') was not sent or was malformed, it was
    possible for a remote unauthenticated attacker to cause a denial of
    service (segmentation fault) on the server. (CVE-2006-1721)
    
    Users of cyrus-sasl should upgrade to these updated packages, which
    contain a backported patch to correct this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2007-September/000313.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected cyrus-sasl packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cyrus-sasl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cyrus-sasl-gssapi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cyrus-sasl-md5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cyrus-sasl-plain");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/09/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 3", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"cyrus-sasl-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cyrus-sasl-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"cyrus-sasl-devel-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cyrus-sasl-devel-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"cyrus-sasl-gssapi-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cyrus-sasl-gssapi-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"cyrus-sasl-md5-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cyrus-sasl-md5-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"cyrus-sasl-plain-2.1.15-15")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cyrus-sasl-plain-2.1.15-15")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cyrus-sasl / cyrus-sasl-devel / cyrus-sasl-gssapi / cyrus-sasl-md5 / etc");
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-0795.NASL
    descriptionAn updated cyrus-sasl package that addresses a security issue and fixes various other bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. A bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id26004
    published2007-09-07
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/26004
    titleCentOS 4 : cyrus-sasl (CESA-2007:0795)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2007:0795 and 
    # CentOS Errata and Security Advisory 2007:0795 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(26004);
      script_version("1.13");
      script_cvs_date("Date: 2019/10/25 13:36:03");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"RHSA", value:"2007:0795");
    
      script_name(english:"CentOS 4 : cyrus-sasl (CESA-2007:0795)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated cyrus-sasl package that addresses a security issue and
    fixes various other bugs is now available for Red Hat Enterprise Linux
    4.
    
    This update has been rated as having moderate security impact by the
    Red Hat Security Response Team.
    
    The cyrus-sasl package contains the Cyrus implementation of SASL. SASL
    is the Simple Authentication and Security Layer, a method for adding
    authentication support to connection-based protocols.
    
    A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
    As part of the DIGEST-MD5 authentication exchange, the client is
    expected to send a specific set of information to the server. If one
    of these items (the 'realm') was not sent or was malformed, it was
    possible for a remote unauthenticated attacker to cause a denial of
    service (segmentation fault) on the server. (CVE-2006-1721)
    
    This errata also fixes the following bugs :
    
    * the Kerberos 5 library included in Red Hat Enterprise Linux 4 was
    not thread safe. This update adds functionality which allows it to be
    used safely in a threaded application.
    
    * several memory leak bugs were fixed in cyrus-sasl's DIGEST-MD5
    authentication plug-in.
    
    * /dev/urandom is now used by default on systems which don't support
    hwrandom. Previously, dev/random was the default.
    
    * cyrus-sasl needs zlib-devel to build properly. This dependency
    information is now included in the package.
    
    Users are advised to upgrade to this updated cyrus-sasl package, which
    resolves these issues."
      );
      # https://lists.centos.org/pipermail/centos-announce/2007-September/014168.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?1ae5a69a"
      );
      # https://lists.centos.org/pipermail/centos-announce/2007-September/014182.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c9d20067"
      );
      # https://lists.centos.org/pipermail/centos-announce/2007-September/014183.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?98886c09"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected cyrus-sasl packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-gssapi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-md5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-ntlm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-plain");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-sql");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/09/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/07");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-2.1.19-14")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-devel-2.1.19-14")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-gssapi-2.1.19-14")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-md5-2.1.19-14")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-ntlm-2.1.19-14")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-plain-2.1.19-14")) flag++;
    if (rpm_check(release:"CentOS-4", reference:"cyrus-sasl-sql-2.1.19-14")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_NOTE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cyrus-sasl / cyrus-sasl-devel / cyrus-sasl-gssapi / cyrus-sasl-md5 / etc");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-073.NASL
    descriptionA vulnerability in the CMU Cyrus Simple Authentication and Security Layer (SASL) library < 2.1.21, has an unknown impact and remote unauthenticated attack vectors, related to DIGEST-MD5 negotiation. In practice, Marcus Meissner found it is possible to crash the cyrus-imapd daemon with a carefully crafted communication that leaves out 'realm=...' in the reply or the initial server response. Updated packages have been patched to address this issue.
    last seen2017-10-29
    modified2012-09-07
    plugin id21280
    published2006-04-26
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=21280
    titleMDKSA-2006:073 : cyrus-sasl
    code
    #%NASL_MIN_LEVEL 999999
    
    # @DEPRECATED@
    #
    # This script has been deprecated as the associated update is not
    # for a supported release of Mandrake / Mandriva Linux.
    #
    # Disabled on 2012/09/06.
    #
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # This script was automatically generated from
    # Mandrake Linux Security Advisory MDKSA-2006:073.
    #
    
    if (!defined_func("bn_random")) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21280);
      script_version ("1.11");
      script_cvs_date("Date: 2018/07/20  0:18:52");
    
      script_cve_id("CVE-2006-1721");
    
      script_name(english:"MDKSA-2006:073 : cyrus-sasl");
      script_summary(english:"Checks for patch(es) in 'rpm -qa' output");
    
      script_set_attribute(attribute:"synopsis", value: 
    "The remote Mandrake host is missing one or more security-related
    patches.");
      script_set_attribute(attribute:"description", value:
    "A vulnerability in the CMU Cyrus Simple Authentication and Security
    Layer (SASL) library < 2.1.21, has an unknown impact and remote
    unauthenticated attack vectors, related to DIGEST-MD5 negotiation. In
    practice, Marcus Meissner found it is possible to crash the
    cyrus-imapd daemon with a carefully crafted communication that leaves
    out 'realm=...' in the reply or the initial server response.
    
    Updated packages have been patched to address this issue.");
      script_set_attribute(attribute:"see_also", value:"http://www.mandriva.com/security/advisories?name=MDKSA-2006:073");
      script_set_attribute(attribute:"solution", value:"Update the affected package(s).");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
      script_set_attribute(attribute:"patch_publication_date", value:"2006/04/24");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux");
      script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/04/26");
      script_end_attributes();
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"Mandriva Local Security Checks");
     
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    # Deprecated.
    exit(0, "The associated update is not currently for a supported release of Mandrake / Mandriva Linux.");
    
    
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    if (!get_kb_item("Host/Mandrake/release")) exit(0, "The host is not running Mandrake Linux.");
    if (!get_kb_item("Host/Mandrake/rpm-list")) exit(1, "Could not get the list of packages.");
    
    flag = 0;
    
    if (rpm_check(reference:"cyrus-sasl-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-devel-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-anonymous-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-crammd5-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-digestmd5-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-gssapi-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-login-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-ntlm-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-otp-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-plain-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-sasldb-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-sql-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    if (rpm_check(reference:"libsasl2-plug-srp-2.1.19-12.1.102mdk", release:"MDK10.2", cpu:"i386", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else 
    {
      if (rpm_exists(rpm:"cyrus-sasl-", release:"MDK10.2"))
      {
        set_kb_item(name:"CVE-2006-1721", value:TRUE);
      }
    
      exit(0, "The host is not affected.");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-0878.NASL
    descriptionUpdated cyrus-sasl packages that correct a security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. A bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id25989
    published2007-09-05
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25989
    titleRHEL 3 : cyrus-sasl (RHSA-2007:0878)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2007:0878. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(25989);
      script_version ("1.22");
      script_cvs_date("Date: 2019/10/25 13:36:12");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"RHSA", value:"2007:0878");
    
      script_name(english:"RHEL 3 : cyrus-sasl (RHSA-2007:0878)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated cyrus-sasl packages that correct a security issue are now
    available for Red Hat Enterprise Linux 3.
    
    This update has been rated as having moderate security impact by the
    Red Hat Security Response Team.
    
    The cyrus-sasl package contains the Cyrus implementation of SASL. SASL
    is the Simple Authentication and Security Layer, a method for adding
    authentication support to connection-based protocols.
    
    A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
    As part of the DIGEST-MD5 authentication exchange, the client is
    expected to send a specific set of information to the server. If one
    of these items (the 'realm') was not sent or was malformed, it was
    possible for a remote unauthenticated attacker to cause a denial of
    service (segmentation fault) on the server. (CVE-2006-1721)
    
    Users of cyrus-sasl should upgrade to these updated packages, which
    contain a backported patch to correct this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2006-1721"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2007:0878"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-gssapi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-md5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-plain");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/09/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 3.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2007:0878";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_NOTE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL3", reference:"cyrus-sasl-2.1.15-15")) flag++;
      if (rpm_check(release:"RHEL3", reference:"cyrus-sasl-devel-2.1.15-15")) flag++;
      if (rpm_check(release:"RHEL3", reference:"cyrus-sasl-gssapi-2.1.15-15")) flag++;
      if (rpm_check(release:"RHEL3", reference:"cyrus-sasl-md5-2.1.15-15")) flag++;
      if (rpm_check(release:"RHEL3", reference:"cyrus-sasl-plain-2.1.15-15")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_NOTE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cyrus-sasl / cyrus-sasl-devel / cyrus-sasl-gssapi / cyrus-sasl-md5 / etc");
      }
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-0878.NASL
    descriptionUpdated cyrus-sasl packages that correct a security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. A bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id25973
    published2007-09-05
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25973
    titleCentOS 3 : cyrus-sasl (CESA-2007:0878)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2007:0878 and 
    # CentOS Errata and Security Advisory 2007:0878 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(25973);
      script_version("1.13");
      script_cvs_date("Date: 2019/10/25 13:36:03");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"RHSA", value:"2007:0878");
    
      script_name(english:"CentOS 3 : cyrus-sasl (CESA-2007:0878)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated cyrus-sasl packages that correct a security issue are now
    available for Red Hat Enterprise Linux 3.
    
    This update has been rated as having moderate security impact by the
    Red Hat Security Response Team.
    
    The cyrus-sasl package contains the Cyrus implementation of SASL. SASL
    is the Simple Authentication and Security Layer, a method for adding
    authentication support to connection-based protocols.
    
    A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
    As part of the DIGEST-MD5 authentication exchange, the client is
    expected to send a specific set of information to the server. If one
    of these items (the 'realm') was not sent or was malformed, it was
    possible for a remote unauthenticated attacker to cause a denial of
    service (segmentation fault) on the server. (CVE-2006-1721)
    
    Users of cyrus-sasl should upgrade to these updated packages, which
    contain a backported patch to correct this issue."
      );
      # https://lists.centos.org/pipermail/centos-announce/2007-September/014164.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fc9ceb2c"
      );
      # https://lists.centos.org/pipermail/centos-announce/2007-September/014165.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?63b96831"
      );
      # https://lists.centos.org/pipermail/centos-announce/2007-September/014166.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?f2bb30b2"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected cyrus-sasl packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-gssapi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-md5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cyrus-sasl-plain");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/09/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 3.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-3", reference:"cyrus-sasl-2.1.15-15")) flag++;
    if (rpm_check(release:"CentOS-3", reference:"cyrus-sasl-devel-2.1.15-15")) flag++;
    if (rpm_check(release:"CentOS-3", reference:"cyrus-sasl-gssapi-2.1.15-15")) flag++;
    if (rpm_check(release:"CentOS-3", reference:"cyrus-sasl-md5-2.1.15-15")) flag++;
    if (rpm_check(release:"CentOS-3", reference:"cyrus-sasl-plain-2.1.15-15")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_NOTE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cyrus-sasl / cyrus-sasl-devel / cyrus-sasl-gssapi / cyrus-sasl-md5 / etc");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_408F6EBFD15211DA962F000B972EB521.NASL
    descriptionUnspecified vulnerability in the CMU Cyrus Simple Authentication and Security Layer (SASL) library, has unknown impact and remote unauthenticated attack vectors, related to DIGEST-MD5 negotiation.
    last seen2020-06-01
    modified2020-06-02
    plugin id21418
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21418
    titleFreeBSD : cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service (408f6ebf-d152-11da-962f-000b972eb521)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21418);
      script_version("1.12");
      script_cvs_date("Date: 2019/08/02 13:32:38");
    
      script_cve_id("CVE-2006-1721");
    
      script_name(english:"FreeBSD : cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service (408f6ebf-d152-11da-962f-000b972eb521)");
      script_summary(english:"Checks for updated package in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote FreeBSD host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Unspecified vulnerability in the CMU Cyrus Simple Authentication and
    Security Layer (SASL) library, has unknown impact and remote
    unauthenticated attack vectors, related to DIGEST-MD5 negotiation."
      );
      # https://vuxml.freebsd.org/freebsd/408f6ebf-d152-11da-962f-000b972eb521.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?d65d4ed3"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2006/04/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/05/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"cyrus-sasl>=2.*<2.1.21")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:pkg_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_4_8.NASL
    descriptionThe remote host is running a version of Mac OS X 10.4.x that is prior to 10.4.8. Mac OS X 10.4.8 contains several security fixes for the following programs : - CFNetwork - Flash Player - ImageIO - Kernel - LoginWindow - Preferences - QuickDraw Manager - SASL - WebCore - Workgroup Manager
    last seen2020-06-01
    modified2020-06-02
    plugin id22476
    published2006-09-29
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22476
    titleMac OS X 10.4.x < 10.4.8 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(22476);
     script_version ("1.18");
     if ( NASL_LEVEL >= 3000 )
     script_cve_id("CVE-2006-4390", "CVE-2006-3311", "CVE-2006-3587", "CVE-2006-3588", "CVE-2006-4640", 
                   "CVE-2006-4391", "CVE-2006-4392", "CVE-2006-4397", "CVE-2006-4393", "CVE-2006-4394", 
                   "CVE-2006-4387", "CVE-2006-4395", "CVE-2006-1721", "CVE-2006-3946", "CVE-2006-4399");
     script_bugtraq_id(20271);
    
     if ( NASL_LEVEL >= 3000 )
     {
      # nb: 29275 is invalid
    }
    
     script_name(english:"Mac OS X 10.4.x < 10.4.8 Multiple Vulnerabilities");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote host is missing a Mac OS X update which fixes a security
    issue." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running a version of Mac OS X 10.4.x that is prior
    to 10.4.8.
    
    Mac OS X 10.4.8 contains several security fixes for the following 
    programs :
    
     - CFNetwork
     - Flash Player
     - ImageIO
     - Kernel
     - LoginWindow
     - Preferences
     - QuickDraw Manager
     - SASL
     - WebCore
     - Workgroup Manager" );
     script_set_attribute(attribute:"see_also", value:"http://docs.info.apple.com/article.html?artnum=304460" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Mac OS X 10.4.8 :
    http://www.apple.com/support/downloads/macosx1048updateintel.html
    http://www.apple.com/support/downloads/macosx1048updateppc.html
    http://www.apple.com/support/downloads/macosxserver1048update.html" );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"exploit_framework_core", value:"true");
     script_cwe_id(264);
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/09/29");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/04/07");
     script_cvs_date("Date: 2018/07/14  1:59:35");
     script_set_attribute(attribute:"patch_publication_date", value: "2006/11/14");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
    script_end_attributes();
    
     script_summary(english:"Check for the version of Mac OS X");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
     script_family(english:"MacOS X Local Security Checks");
     script_dependencies("ssh_get_info.nasl","mdns.nasl", "ntp_open.nasl");
     #script_require_keys("Host/MacOSX/packages");
     exit(0);
    }
    
    
    os = get_kb_item("Host/MacOSX/Version");
    if ( ! os ) os = get_kb_item("mDNS/os");
    if ( ! os ) exit(0);
    if ( ereg(pattern:"Mac OS X 10\.4($|\.[1-7]([^0-9]|$))", string:os)) security_hole(0);
    
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2008-0009.NASL
    descriptiona. VMware Tools Local Privilege Escalation on Windows-based guest OS The VMware Tools Package provides support required for shared folders (HGFS) and other features. An input validation error is present in the Windows-based VMware HGFS.sys driver. Exploitation of this flaw might result in arbitrary code execution on the guest system by an unprivileged guest user. It doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id40378
    published2009-07-27
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40378
    titleVMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from VMware Security Advisory 2008-0009. 
    # The text itself is copyright (C) VMware Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(40378);
      script_version("1.26");
      script_cvs_date("Date: 2018/08/06 14:03:16");
    
      script_cve_id("CVE-2006-1721", "CVE-2007-4772", "CVE-2007-5137", "CVE-2007-5378", "CVE-2007-5671", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0553", "CVE-2008-0888", "CVE-2008-0948", "CVE-2008-0967", "CVE-2008-2097", "CVE-2008-2100");
      script_bugtraq_id(27163, 27655, 28288, 28302, 28303, 29557);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues");
      script_summary(english:"Checks esxupdate output for the patches");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote VMware ESXi / ESX host is missing one or more
    security-related patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "a. VMware Tools Local Privilege Escalation on Windows-based guest OS
    
       The VMware Tools Package provides support required for shared folders
       (HGFS) and other features.
    
       An input validation error is present in the Windows-based VMware
       HGFS.sys driver.   Exploitation of this flaw might result in
       arbitrary code execution on the guest system by an unprivileged
       guest user.  It doesn't matter on what host the Windows guest OS
       is running, as this is a guest driver vulnerability and not a
       vulnerability on the host.
    
       The HGFS.sys driver is present in the guest operating system if the
       VMware Tools package is loaded.  Even if the host has HGFS disabled
       and has no shared folders, Windows-based guests may be affected. This
       is regardless if a host supports HGFS.
    
       This issue could be mitigated by removing the VMware Tools package
       from Windows based guests.  However this is not recommended as it
       would impact usability of the product.
    
       NOTE: Installing the new hosted release or ESX patches will not
             remediate the issue.  The VMware Tools packages will need
             to be updated on each Windows-based guest followed by a
             reboot of the guest system.
    
       VMware would like to thank iDefense and Stephen Fewer of Harmony
       Security for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2007-5671 to this issue.
    
    b. Privilege escalation on ESX or Linux based hosted operating systems
    
       This update fixes a security issue related to local exploitation of
       an untrusted library path vulnerability in vmware-authd. In order to
       exploit this vulnerability, an attacker must have local access and
       the ability to execute the set-uid vmware-authd binary on an affected
       system. Exploitation of this flaw might result in arbitrary code
       execution on the Linux host system by an unprivileged user.
    
       VMware would like to thank iDefense for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0967 to this issue.
    
    c. Openwsman Invalid Content-Length Vulnerability
    
       Openwsman is a system management platform that implements the Web
       Services Management protocol (WS-Management). It is installed and
       running by default. It is used in the VMware Management Service
       Console and in ESXi.
    
       The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
       to a privilege escalation vulnerability, which may allow users with
       non-privileged ESX or Virtual Center accounts to gain root privileges.
    
       To exploit this vulnerability, an attacker would need a local ESX
       account or a VirtualCenter account with the Host.Cim.CimInteraction
       permission.
    
       Systems with no local ESX accounts and no VirtualCenter accounts with
       the Host.Cim.CimInteraction permission are not vulnerable.
    
       This vulnerability cannot be exploited by users without valid login
       credentials.
    
       Discovery: Alexander Sotirov, VMware Security Research
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2097 to this issue.
    
    d. VMware VIX Application Programming Interface (API) Memory Overflow
       Vulnerabilities
    
       The VIX API (also known as 'Vix') is an API that lets users write scripts
       and programs to manipulate virtual machines.
    
       Multiple buffer overflow vulnerabilities are present in the VIX API.
       Exploitation of these vulnerabilities might result in a privilege
       escalation on the host system. This exploit scenario is relevant for all
       affected products. On VC, ESX30x, and ESX35, users need to have the VM
       Interaction Privilege in order to exploit the vulnerability.
    
       Exploitation of these vulnerabilities might also result in code execution on
       the host system from the guest system or on the service console in ESX Server
       from the guest operating system. This exploit scenario is relevant for
       Workstation 6.0.x (version 6.0.3 and below), Player 2.0.x (version 2.0.3 and
       below), ACE 2.0.x (version 2.0.3 and below), Server 1.0.x (version 1.0.5 and
       below), and ESX3.5. The parameter 'vix.inGuest.enable' in the VMware
       configuration file must be set to true to allow for exploitation on these
       products. Note that the parameter 'vix-inGuest.enable' is set to false by
       default.
    
       The parameter 'vix.inGuest.enable' is present in the
       following products :
    
         VMware Workstation 6.0.2 and higher
         VMware ACE 6.0.2 and higher
         VMware Server 1.06 and higher
         VMware Fusion 1.1.2 and higher
         ESX Server 3.0 and higher
         ESX Server 3.5 and higher
    
       In previous versions of VMware products where the VIX API was introduced,
       the VIX API couldn't be disabled.
    
       This vulnerability is present in ESX and the hosted products even if you
       have not installed the VIX API. To patch your system you will need to
       update to the new hosted product version or to apply the appropriate ESX
       patch. It is not necessary to update the VIX API if you have installed
       the VIX API.
    
       VMware would like to thank Andrew Honig of the Department of
       Defense for reporting this issue.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2100 to this issue.
    
    II Service Console rpm updates
    
     NOTE: ESXi and hosted products are not affected by any service console
           security updates
    
     a. Security update for cyrus-sasl
    
       Updated cyrus-sasl package for the ESX Service Console corrects a security
       issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
       implementation of Simple Authentication and Security Layer (SASL). As a
       result of this issue in the authentication mechanism, a remote
       unauthenticated attacker might be able to cause a denial of service error
       on the service console.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2006-1721 to this issue.
    
     b. Security update for tcltk
    
       An input validation flaw was discovered in Tk's GIF image handling. A
       code-size value read from a GIF image was not properly validated before
       being used, leading to a buffer overflow. A specially crafted GIF file
       could use this to cause a crash or, potentially, execute code with the
       privileges of the application using the Tk graphical toolkit.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0553 to this issue.
    
       A buffer overflow flaw was discovered in Tk's animated GIF image handling.
       An animated GIF containing an initial image smaller than subsequent images
       could cause a crash or, potentially, execute code with the privileges of
       the application using the Tk library.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-5378 to this issue.
    
       A flaw first discovered in the Tcl regular expression engine used in the
       PostgreSQL database server, resulted in an infinite loop when processing
       certain regular expressions.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-4772 to this issue.
    
     c. Security update for unzip
    
       This patch includes a moderate security update to the service console that
       fixes a flaw in unzip. An attacker could execute malicious code with a
       user's privileges if the user ran unzip on a file designed to leverage
       this flaw.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0888 to this issue.
    
     d. Security update for krb5
    
       KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable
       for some krb4 message types, which allows remote attackers to
       cause a denial of service (crash) and possibly execute arbitrary
       code via crafted messages that trigger a NULL pointer dereference
       or double-free.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0062 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not
       properly clear the unused portion of a buffer when generating an
       error message, which might allow remote attackers to obtain
       sensitive information, aka 'Uninitialized stack values.'
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0063 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used
       by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably
       other versions before 1.3, when running on systems whose unistd.h
       does not define the FD_SETSIZE macro, allows remote attackers to cause
       a denial of service (crash) and possibly execute arbitrary code by
       triggering a large number of open file descriptors.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0948 to this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.vmware.com/pipermail/security-announce/2008/000022.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply the missing patches.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 119, 189, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:3.5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/27");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
      script_family(english:"VMware ESX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/VMware/release", "Host/VMware/version");
      script_require_ports("Host/VMware/esxupdate", "Host/VMware/esxcli_software_vibs");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("vmware_esx_packages.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/VMware/release")) audit(AUDIT_OS_NOT, "VMware ESX / ESXi");
    if (
      !get_kb_item("Host/VMware/esxcli_software_vibs") &&
      !get_kb_item("Host/VMware/esxupdate")
    ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    init_esx_check(date:"2008-06-04");
    flag = 0;
    
    
    if (esx_check(ver:"ESX 2.5.4", patch:"19")) flag++;
    
    if (esx_check(ver:"ESX 2.5.5", patch:"8")) flag++;
    
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004186")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004189")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004190")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004721")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004723")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004725")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004728")) flag++;
    
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004216")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004219")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004719")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004722")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004724")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004726")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004727")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004821")) flag++;
    
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805504-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805505-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805506-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805507-SG",
        patch_updates : make_list("ESX350-201006408-SG", "ESX350-201008411-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805508-SG",
        patch_updates : make_list("ESX350-200911210-UG", "ESX350-200912406-BG", "ESX350-201006409-BG", "ESX350-201105403-BG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805515-SG",
        patch_updates : make_list("ESX350-200911201-UG", "ESX350-201006401-SG", "ESX350-201203401-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805501-I-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805502-T-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805503-C-SG")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-272-1.NASL
    descriptionA Denial of Service vulnerability has been discovered in the SASL authentication library when using the DIGEST-MD5 plugin. By sending a specially crafted realm name, a malicious SASL server could exploit this to crash the application that uses SASL. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21291
    published2006-04-26
    reporterUbuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21291
    titleUbuntu 4.10 / 5.04 / 5.10 : cyrus-sasl2 vulnerability (USN-272-1)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-272-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21291);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:33:00");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"USN", value:"272-1");
    
      script_name(english:"Ubuntu 4.10 / 5.04 / 5.10 : cyrus-sasl2 vulnerability (USN-272-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A Denial of Service vulnerability has been discovered in the SASL
    authentication library when using the DIGEST-MD5 plugin. By sending a
    specially crafted realm name, a malicious SASL server could exploit
    this to crash the application that uses SASL.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsasl2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsasl2-dev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsasl2-modules");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsasl2-modules-gssapi-heimdal");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsasl2-modules-kerberos-heimdal");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsasl2-modules-sql");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:sasl2-bin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:4.10");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:5.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:5.10");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/04/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/26");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! ereg(pattern:"^(4\.10|5\.04|5\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 4.10 / 5.04 / 5.10", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"4.10", pkgname:"libsasl2", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"4.10", pkgname:"libsasl2-dev", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"4.10", pkgname:"libsasl2-modules", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"4.10", pkgname:"libsasl2-modules-gssapi-heimdal", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"4.10", pkgname:"libsasl2-modules-kerberos-heimdal", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"4.10", pkgname:"libsasl2-modules-sql", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"4.10", pkgname:"sasl2-bin", pkgver:"2.1.19-1.3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"libsasl2", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"libsasl2-dev", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"libsasl2-modules", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"libsasl2-modules-gssapi-heimdal", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"libsasl2-modules-kerberos-heimdal", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"libsasl2-modules-sql", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.04", pkgname:"sasl2-bin", pkgver:"2.1.19-1.5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"libsasl2", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"libsasl2-dev", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"libsasl2-modules", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"libsasl2-modules-gssapi-heimdal", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"libsasl2-modules-kerberos-heimdal", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"libsasl2-modules-sql", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"sasl2-bin", pkgver:"2.1.19-1.5ubuntu4.2")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_NOTE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libsasl2 / libsasl2-dev / libsasl2-modules / etc");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-0795.NASL
    descriptionAn updated cyrus-sasl package that addresses a security issue and fixes various other bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. A bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id25986
    published2007-09-05
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25986
    titleRHEL 4 : cyrus-sasl (RHSA-2007:0795)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2007:0795. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(25986);
      script_version ("1.23");
      script_cvs_date("Date: 2019/10/25 13:36:12");
    
      script_cve_id("CVE-2006-1721");
      script_xref(name:"RHSA", value:"2007:0795");
    
      script_name(english:"RHEL 4 : cyrus-sasl (RHSA-2007:0795)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An updated cyrus-sasl package that addresses a security issue and
    fixes various other bugs is now available for Red Hat Enterprise Linux
    4.
    
    This update has been rated as having moderate security impact by the
    Red Hat Security Response Team.
    
    The cyrus-sasl package contains the Cyrus implementation of SASL. SASL
    is the Simple Authentication and Security Layer, a method for adding
    authentication support to connection-based protocols.
    
    A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
    As part of the DIGEST-MD5 authentication exchange, the client is
    expected to send a specific set of information to the server. If one
    of these items (the 'realm') was not sent or was malformed, it was
    possible for a remote unauthenticated attacker to cause a denial of
    service (segmentation fault) on the server. (CVE-2006-1721)
    
    This errata also fixes the following bugs :
    
    * the Kerberos 5 library included in Red Hat Enterprise Linux 4 was
    not thread safe. This update adds functionality which allows it to be
    used safely in a threaded application.
    
    * several memory leak bugs were fixed in cyrus-sasl's DIGEST-MD5
    authentication plug-in.
    
    * /dev/urandom is now used by default on systems which don't support
    hwrandom. Previously, dev/random was the default.
    
    * cyrus-sasl needs zlib-devel to build properly. This dependency
    information is now included in the package.
    
    Users are advised to upgrade to this updated cyrus-sasl package, which
    resolves these issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2006-1721"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2007:0795"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-gssapi");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-md5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-ntlm");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-plain");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cyrus-sasl-sql");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4.5");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/09/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2007:0795";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_NOTE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-2.1.19-14")) flag++;
    
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-devel-2.1.19-14")) flag++;
    
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-gssapi-2.1.19-14")) flag++;
    
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-md5-2.1.19-14")) flag++;
    
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-ntlm-2.1.19-14")) flag++;
    
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-plain-2.1.19-14")) flag++;
    
      if (rpm_check(release:"RHEL4", reference:"cyrus-sasl-sql-2.1.19-14")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_NOTE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cyrus-sasl / cyrus-sasl-devel / cyrus-sasl-gssapi / cyrus-sasl-md5 / etc");
      }
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2007-0795.NASL
    descriptionFrom Red Hat Security Advisory 2007:0795 : An updated cyrus-sasl package that addresses a security issue and fixes various other bugs is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. A bug was found in cyrus-sasl
    last seen2020-06-01
    modified2020-06-02
    plugin id67558
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67558
    titleOracle Linux 4 : cyrus-sasl (ELSA-2007-0795)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2006-006.NASL
    descriptionThe remote host is running a version of Mac OS X 10.3 which does not have the security update 2006-006 applied. Security Update 2006-006 contains several security fixes for the following programs : - CFNetwork - Flash Player - QuickDraw Manager - SASL - WebCore
    last seen2020-06-01
    modified2020-06-02
    plugin id22479
    published2006-09-29
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22479
    titleMac OS X Multiple Vulnerabilities (Security Update 2006-006)

Oval

accepted2013-04-29T04:22:50.999-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptiondigestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
familyunix
idoval:org.mitre.oval:def:9861
statusaccepted
submitted2010-07-09T03:56:16-04:00
titledigestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
version26

Redhat

advisories
  • bugzilla
    id250732
    titlesasl-sample-server crash
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentcyrus-sasl-ntlm is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795001
          • commentcyrus-sasl-ntlm is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795002
        • AND
          • commentcyrus-sasl-gssapi is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795003
          • commentcyrus-sasl-gssapi is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795004
        • AND
          • commentcyrus-sasl-plain is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795005
          • commentcyrus-sasl-plain is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795006
        • AND
          • commentcyrus-sasl-sql is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795007
          • commentcyrus-sasl-sql is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795008
        • AND
          • commentcyrus-sasl-md5 is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795009
          • commentcyrus-sasl-md5 is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795010
        • AND
          • commentcyrus-sasl is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795011
          • commentcyrus-sasl is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795012
        • AND
          • commentcyrus-sasl-devel is earlier than 0:2.1.19-14
            ovaloval:com.redhat.rhsa:tst:20070795013
          • commentcyrus-sasl-devel is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20070795014
    rhsa
    idRHSA-2007:0795
    released2008-01-09
    severityModerate
    titleRHSA-2007:0795: cyrus-sasl security and bug fix update (Moderate)
  • rhsa
    idRHSA-2007:0878
rpms
  • cyrus-sasl-0:2.1.19-14
  • cyrus-sasl-debuginfo-0:2.1.19-14
  • cyrus-sasl-devel-0:2.1.19-14
  • cyrus-sasl-gssapi-0:2.1.19-14
  • cyrus-sasl-md5-0:2.1.19-14
  • cyrus-sasl-ntlm-0:2.1.19-14
  • cyrus-sasl-plain-0:2.1.19-14
  • cyrus-sasl-sql-0:2.1.19-14
  • cyrus-sasl-0:2.1.15-15
  • cyrus-sasl-debuginfo-0:2.1.15-15
  • cyrus-sasl-devel-0:2.1.15-15
  • cyrus-sasl-gssapi-0:2.1.15-15
  • cyrus-sasl-md5-0:2.1.15-15
  • cyrus-sasl-plain-0:2.1.15-15

References