Vulnerabilities > CVE-2008-5298 - Unspecified vulnerability in Karakas-Online Chm2Pdf 0.9
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN karakas-online
nessus
Summary
chm2pdf 0.9 uses temporary files in directories with fixed names, which allows local users to cause a denial of service (chm2pdf failure) of other users by creating those directories ahead of time.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2011-0467.NASL description This update fixes security bugs #474455 and #474457. The security issue is about unsafe use of fixed temporary directories by chm2pdf. This update will break --dontextract option. The option will not be shown in the list of available options. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 51788 published 2011-01-28 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/51788 title Fedora 13 : chm2pdf-0.9.1-8.fc13 (2011-0467) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2011-0467. # include("compat.inc"); if (description) { script_id(51788); script_version("1.11"); script_cvs_date("Date: 2019/08/02 13:32:33"); script_cve_id("CVE-2008-5298", "CVE-2008-5299"); script_bugtraq_id(31735); script_xref(name:"FEDORA", value:"2011-0467"); script_name(english:"Fedora 13 : chm2pdf-0.9.1-8.fc13 (2011-0467)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update fixes security bugs #474455 and #474457. The security issue is about unsafe use of fixed temporary directories by chm2pdf. This update will break --dontextract option. The option will not be shown in the list of available options. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=474455" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=474457" ); # https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053501.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?9c94aae7" ); script_set_attribute( attribute:"solution", value:"Update the affected chm2pdf package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(59); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:chm2pdf"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13"); script_set_attribute(attribute:"patch_publication_date", value:"2011/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/28"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC13", reference:"chm2pdf-0.9.1-8.fc13")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chm2pdf"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2011-0454.NASL description This update fixes security bugs #474455 and #474457. The security issue is about unsafe use of fixed temporary directories by chm2pdf. This update will break --dontextract option. The option will not be shown in the list of available options. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 51787 published 2011-01-28 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/51787 title Fedora 14 : chm2pdf-0.9.1-9.fc14 (2011-0454) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2011-0454. # include("compat.inc"); if (description) { script_id(51787); script_version("1.11"); script_cvs_date("Date: 2019/08/02 13:32:33"); script_cve_id("CVE-2008-5298", "CVE-2008-5299"); script_bugtraq_id(31735); script_xref(name:"FEDORA", value:"2011-0454"); script_name(english:"Fedora 14 : chm2pdf-0.9.1-9.fc14 (2011-0454)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update fixes security bugs #474455 and #474457. The security issue is about unsafe use of fixed temporary directories by chm2pdf. This update will break --dontextract option. The option will not be shown in the list of available options. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=474455" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=474457" ); # https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053510.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?fa3710fc" ); script_set_attribute( attribute:"solution", value:"Update the affected chm2pdf package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(59); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:chm2pdf"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:14"); script_set_attribute(attribute:"patch_publication_date", value:"2011/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/28"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^14([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 14.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC14", reference:"chm2pdf-0.9.1-9.fc14")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chm2pdf"); }
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501959
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=501959
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053501.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053501.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053510.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053510.html
- http://secunia.com/advisories/32257
- http://secunia.com/advisories/32257
- http://secunia.com/advisories/43109
- http://secunia.com/advisories/43109
- http://www.securityfocus.com/bid/31735
- http://www.securityfocus.com/bid/31735
- http://www.vupen.com/english/advisories/2011/0236
- http://www.vupen.com/english/advisories/2011/0236
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45813
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45813
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47030
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47030