Vulnerabilities > CVE-2013-2924 - Resource Management Errors vulnerability in Google Chrome

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Google
3075

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-769.NASL
    descriptionUpdate to Chromium 30.0.1599.66 : - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes : + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug - Add patch chromium-fix-altgrkeys.diff - Make sure that AltGr is treated correctly (issue#296835) - Do not build with system libxml (bnc#825157) - Update to Chromium 31.0.1640.0 - Bug and Stability Fixes - Fix destkop file for chromium by removing extension from icon - Change the methodology for the Chromium packages. Build is now based on an official tarball. As soon as the Beta channel catches up with the current version, Chromium will be based on the Beta channel instead of svn snapshots - Update to 31.0.1632 - Bug and Stability fixes - Added the flag --enable-threaded-compositing to the startup script. This flag seems to be required when hardware acceleration is in use. This prevents websites from locking up on users in certain cases. - Update to 31.0.1627 - Bug and Stability fixes - Update to 31.0.1619 - bug and Stability fixes - require mozilla-nss-devel >= 3.14 and mozilla-nspr-devel >= 4.9.5 - Add patch exclude_ymp.diff to ensure that 1-click-install files are downloaded and NOT opened (bnc#836059) - Update to 31.0.1611 - Bug and stability fixes - Update to 31.0.1605 - Bug and stability fixes - Change the startup script so that Chromium will not start when the chrome_sandbox doesn
    last seen2020-06-05
    modified2014-06-13
    plugin id75170
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75170
    titleopenSUSE Security Update : chromium (openSUSE-SU-2013:1556-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2013-769.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(75170);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-2906", "CVE-2013-2907", "CVE-2013-2908", "CVE-2013-2909", "CVE-2013-2910", "CVE-2013-2911", "CVE-2013-2912", "CVE-2013-2913", "CVE-2013-2914", "CVE-2013-2915", "CVE-2013-2916", "CVE-2013-2917", "CVE-2013-2918", "CVE-2013-2919", "CVE-2013-2920", "CVE-2013-2921", "CVE-2013-2922", "CVE-2013-2923", "CVE-2013-2924");
      script_bugtraq_id(62752, 62968);
    
      script_name(english:"openSUSE Security Update : chromium (openSUSE-SU-2013:1556-1)");
      script_summary(english:"Check for the openSUSE-2013-769 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Update to Chromium 30.0.1599.66 :
    
      - Easier searching by image 
    
      - A number of new apps/extension APIs 
    
      - Lots of under the hood changes for stability and
        performance
    
      - Security fixes :
    
      + CVE-2013-2906: Races in Web Audio
    
      + CVE-2013-2907: Out of bounds read in Window.prototype
        object
    
      + CVE-2013-2908: Address bar spoofing related to the
        “204 No Content” status code
    
      + CVE-2013-2909: Use after free in inline-block rendering
    
      + CVE-2013-2910: Use-after-free in Web Audio
    
      + CVE-2013-2911: Use-after-free in XSLT
    
      + CVE-2013-2912: Use-after-free in PPAPI
    
      + CVE-2013-2913: Use-after-free in XML document parsing
    
      + CVE-2013-2914: Use after free in the Windows color
        chooser dialog
    
      + CVE-2013-2915: Address bar spoofing via a malformed
        scheme
    
      + CVE-2013-2916: Address bar spoofing related to the
        “204 No Content” status code
    
      + CVE-2013-2917: Out of bounds read in Web Audio
    
      + CVE-2013-2918: Use-after-free in DOM
    
      + CVE-2013-2919: Memory corruption in V8
    
      + CVE-2013-2920: Out of bounds read in URL parsing
    
      + CVE-2013-2921: Use-after-free in resource loader
    
      + CVE-2013-2922: Use-after-free in template element
    
      + CVE-2013-2923: Various fixes from internal audits,
        fuzzing and other initiatives 
    
      + CVE-2013-2924: Use-after-free in ICU. Upstream bug
    
      - Add patch chromium-fix-altgrkeys.diff 
    
      - Make sure that AltGr is treated correctly (issue#296835)
    
      - Do not build with system libxml (bnc#825157)
    
      - Update to Chromium 31.0.1640.0
    
      - Bug and Stability Fixes
    
      - Fix destkop file for chromium by removing extension from
        icon
    
      - Change the methodology for the Chromium packages. Build
        is now based on an official tarball. As soon as the Beta
        channel catches up with the current version, Chromium
        will be based on the Beta channel instead of svn
        snapshots
    
      - Update to 31.0.1632
    
      - Bug and Stability fixes
    
      - Added the flag --enable-threaded-compositing to the
        startup script. This flag seems to be required when
        hardware acceleration is in use. This prevents websites
        from locking up on users in certain cases.
    
      - Update to 31.0.1627
    
      - Bug and Stability fixes
    
      - Update to 31.0.1619
    
      - bug and Stability fixes
    
      - require mozilla-nss-devel >= 3.14 and mozilla-nspr-devel
        >= 4.9.5
    
      - Add patch exclude_ymp.diff to ensure that
        1-click-install files are downloaded and NOT opened
        (bnc#836059)
    
      - Update to 31.0.1611
    
      - Bug and stability fixes
    
      - Update to 31.0.1605
    
      - Bug and stability fixes
    
      - Change the startup script so that Chromium will not
        start when the chrome_sandbox doesn't have the SETUID.
        (bnc#779448)
    
      - Update to 31.0.1601
    
      - Bug and stability fixes
    
      - Update to 30.0.1594
    
      - Bug and stability fixes
    
      - Correct specfile to properly own /usr/bin/chromium
        (bnc#831584)
    
      - Chromium now expects the SUID-helper installed in the
        same directory as chromium. So let's create a symlink to
        the helper in /usr/lib
    
      - Update to 30.0.1587
    
      - Bug and stability fixes
    
      - Remove patch chromium-nss-compliant.diff (Upstream)
    
      - Update to 30.0.1575
    
      - Bug and stability fixes
    
      - Enable the gpu-sandbox again due to upstream fix
        (chromium#255063)
    
      - Update to 30.0.1567
    
      - bug and Stability fixes"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=779448"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=825157"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=831584"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=836059"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2013-10/msg00027.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected chromium packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-suid-helper");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-suid-helper-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE12\.2|SUSE12\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.2 / 12.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE12.2", reference:"chromedriver-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromedriver-debuginfo-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-debuginfo-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-debugsource-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-desktop-gnome-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-desktop-kde-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-ffmpegsumo-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-ffmpegsumo-debuginfo-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-suid-helper-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"chromium-suid-helper-debuginfo-30.0.1599.66-1.46.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromedriver-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromedriver-debuginfo-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-debuginfo-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-debugsource-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-desktop-gnome-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-desktop-kde-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-ffmpegsumo-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-ffmpegsumo-debuginfo-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-suid-helper-30.0.1599.66-1.11.2") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"chromium-suid-helper-debuginfo-30.0.1599.66-1.11.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chromium");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-18717.NASL
    descriptionResolves: rhbz#1015594 CVE-2013-2924 icu: use-after-free flaw leads to denial of service. added %{?_isa} to Requires for multi-arch systems added %{?_isa} to Requires for multi-arch systems Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-10-13
    plugin id70410
    published2013-10-13
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70410
    titleFedora 20 : icu-50.1.2-10.fc20 (2013-18717)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-18717.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70410);
      script_version("1.9");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-2924");
      script_bugtraq_id(62968);
      script_xref(name:"FEDORA", value:"2013-18717");
    
      script_name(english:"Fedora 20 : icu-50.1.2-10.fc20 (2013-18717)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Resolves: rhbz#1015594 CVE-2013-2924 icu: use-after-free flaw leads to
    denial of service. added %{?_isa} to Requires for multi-arch systems
    added %{?_isa} to Requires for multi-arch systems
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1014886"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-October/118880.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?b5c16689"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected icu package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"icu-50.1.2-10.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "icu");
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201402-14.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201402-14 (International Components for Unicode: Denial of Service) Multiple vulnerabilities have been discovered in International Components for Unicode. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id72418
    published2014-02-11
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72418
    titleGLSA-201402-14 : International Components for Unicode: Denial of Service
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201402-14.
    #
    # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72418);
      script_version("1.5");
      script_cvs_date("Date: 2018/07/12 19:01:15");
    
      script_cve_id("CVE-2013-0900", "CVE-2013-2924");
      script_bugtraq_id(58318, 62968);
      script_xref(name:"GLSA", value:"201402-14");
    
      script_name(english:"GLSA-201402-14 : International Components for Unicode: Denial of Service");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201402-14
    (International Components for Unicode: Denial of Service)
    
        Multiple vulnerabilities have been discovered in International
          Components for Unicode. Please review the CVE identifiers referenced
          below for details.
      
    Impact :
    
        A remote attacker could possibly cause a Denial of Service condition.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201402-14"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All International Components for Unicode users should upgrade to the
          latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=dev-libs/icu-51.2-r1'
        Packages which depend on this library may need to be recompiled. Tools
          such as revdep-rebuild may assist in identifying some of these packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/02/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/11");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-libs/icu", unaffected:make_list("ge 51.2-r1"), vulnerable:make_list("lt 51.2-r1"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "International Components for Unicode");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2785.NASL
    descriptionSeveral vulnerabilities have been discovered in the chromium web browser. - CVE-2013-2906 Atte Kettunen of OUSPG discovered race conditions in Web Audio. - CVE-2013-2907 Boris Zbarsky discovered an out-of-bounds read in window.prototype. - CVE-2013-2908 Chamal de Silva discovered an address bar spoofing issue. - CVE-2013-2909 Atte Kuttenen of OUSPG discovered a use-after-free issue in inline-block. - CVE-2013-2910 Byoungyoung Lee of the Georgia Tech Information Security Center discovered a use-after-free issue in Web Audio. - CVE-2013-2911 Atte Kettunen of OUSPG discovered a use-after-free in Blink
    last seen2020-03-17
    modified2013-10-27
    plugin id70636
    published2013-10-27
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70636
    titleDebian DSA-2785-1 : chromium-browser - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-2785. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70636);
      script_version("1.17");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-2906", "CVE-2013-2907", "CVE-2013-2908", "CVE-2013-2909", "CVE-2013-2910", "CVE-2013-2911", "CVE-2013-2912", "CVE-2013-2913", "CVE-2013-2915", "CVE-2013-2916", "CVE-2013-2917", "CVE-2013-2918", "CVE-2013-2919", "CVE-2013-2920", "CVE-2013-2921", "CVE-2013-2922", "CVE-2013-2923", "CVE-2013-2924", "CVE-2013-2925", "CVE-2013-2926", "CVE-2013-2927", "CVE-2013-2928");
      script_bugtraq_id(62752, 62968, 63024, 63025, 63026, 63028);
      script_xref(name:"DSA", value:"2785");
    
      script_name(english:"Debian DSA-2785-1 : chromium-browser - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities have been discovered in the chromium web
    browser.
    
      - CVE-2013-2906
        Atte Kettunen of OUSPG discovered race conditions in Web
        Audio.
    
      - CVE-2013-2907
        Boris Zbarsky discovered an out-of-bounds read in
        window.prototype.
    
      - CVE-2013-2908
        Chamal de Silva discovered an address bar spoofing
        issue.
    
      - CVE-2013-2909
        Atte Kuttenen of OUSPG discovered a use-after-free issue
        in inline-block.
    
      - CVE-2013-2910
        Byoungyoung Lee of the Georgia Tech Information Security
        Center discovered a use-after-free issue in Web Audio.
    
      - CVE-2013-2911
        Atte Kettunen of OUSPG discovered a use-after-free in
        Blink's XSLT handling.
    
      - CVE-2013-2912
        Chamal de Silva and 41.w4r10r(at)garage4hackers.com
        discovered a use-after-free issue in the Pepper Plug-in
        API.
    
      - CVE-2013-2913
        cloudfuzzer discovered a use-after-free issue in Blink's
        XML document parsing.
    
      - CVE-2013-2915
        Wander Groeneveld discovered an address bar spoofing
        issue.
    
      - CVE-2013-2916
        Masato Kinugawa discovered an address bar spoofing
        issue.
    
      - CVE-2013-2917
        Byoungyoung Lee and Tielei Wang discovered an
        out-of-bounds read issue in Web Audio.
    
      - CVE-2013-2918
        Byoungyoung Lee discoverd an out-of-bounds read in
        Blink's DOM implementation.
    
      - CVE-2013-2919
        Adam Haile of Concrete Data discovered a memory
        corruption issue in the V8 JavaScript library.
    
      - CVE-2013-2920
        Atte Kuttunen of OUSPG discovered an out-of-bounds read
        in URL host resolving.
    
      - CVE-2013-2921
        Byoungyoung Lee and Tielei Wang discovered a
        use-after-free issue in resource loading.
    
      - CVE-2013-2922
        Jon Butler discovered a use-after-free issue in Blink's
        HTML template element implementation.
    
      - CVE-2013-2924
        A use-after-free issue was discovered in the
        International Components for Unicode (ICU) library. 
    
      - CVE-2013-2925
        Atte Kettunen of OUSPG discover a use-after-free issue
        in Blink's XML HTTP request implementation.
    
      - CVE-2013-2926
        cloudfuzzer discovered a use-after-free issue in the
        list indenting implementation.
    
      - CVE-2013-2927
        cloudfuzzer discovered a use-after-free issue in the
        HTML form submission implementation. 
    
      - CVE-2013-2923 and CVE-2013-2928
        The chrome 30 development team found various issues from
        internal fuzzing, audits, and other studies."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2906"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2907"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2908"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2909"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2910"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2911"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2912"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2913"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2915"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2916"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2917"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2918"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2919"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2920"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2921"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2922"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2924"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2925"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2926"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2927"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2923"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2928"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/chromium-browser"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2013/dsa-2785"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the chromium-browser packages.
    
    For the stable distribution (wheezy), these problems have been fixed
    in version 30.0.1599.101-1~deb7u1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:chromium-browser");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/27");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"chromium", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser-dbg", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser-inspector", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-browser-l10n", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-dbg", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-inspector", reference:"30.0.1599.101-1~deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"chromium-l10n", reference:"30.0.1599.101-1~deb7u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyWindows
    NASL idGOOGLE_CHROME_30_0_1599_66.NASL
    descriptionThe version of Google Chrome installed on the remote host is a version prior to 30.0.1599.66. It is, therefore, affected by multiple vulnerabilities : - A race condition exists related to
    last seen2020-06-01
    modified2020-06-02
    plugin id70273
    published2013-10-02
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70273
    titleGoogle Chrome < 30.0.1599.66 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70273);
      script_version("1.14");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2013-2906",
        "CVE-2013-2907",
        "CVE-2013-2908",
        "CVE-2013-2909",
        "CVE-2013-2910",
        "CVE-2013-2911",
        "CVE-2013-2912",
        "CVE-2013-2913",
        "CVE-2013-2914",
        "CVE-2013-2915",
        "CVE-2013-2916",
        "CVE-2013-2917",
        "CVE-2013-2918",
        "CVE-2013-2919",
        "CVE-2013-2920",
        "CVE-2013-2921",
        "CVE-2013-2922",
        "CVE-2013-2923",
        "CVE-2013-2924"
      );
      script_bugtraq_id(62752, 62968);
    
      script_name(english:"Google Chrome < 30.0.1599.66 Multiple Vulnerabilities");
      script_summary(english:"Checks version number of Google Chrome");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host contains a web browser that is affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Google Chrome installed on the remote host is a version
    prior to 30.0.1599.66.  It is, therefore, affected by multiple
    vulnerabilities :
    
      - A race condition exists related to 'Web Audio'.
        (CVE-2013-2906)
    
      - Out-of-bounds read errors exist related to
        the 'Window.prototype' object, 'Web Audio', and URL
        parsing. (CVE-2013-2907, CVE-2013-2917, CVE-2013-2920)
    
      - Several errors exist related to the address bar that
        could allow spoofing attacks. (CVE-2013-2908,
        CVE-2013-2915, CVE-2013-2916)
    
      - Use-after-free errors exist related to 'inline-block'
        rendering, 'Web Audio', XSLT, PPAPI, XML document
        parsing, Windows color chooser dialog, DOM, the
        resource loader, the 'template' element and ICU.
        (CVE-2013-2909, CVE-2013-2910, CVE-2013-2911,
        CVE-2013-2912, CVE-2013-2913, CVE-2013-2914,
        CVE-2013-2918, CVE-2013-2921, CVE-2013-2922,
        CVE-2013-2924)
    
      - A memory corruption error exists in the V8
        JavaScript engine. (CVE-2013-2919)
    
      - Various, unspecified errors exist. (CVE-2013-2923)");
      # http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0e1731d9");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Google Chrome 30.0.1599.66 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2924");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/02");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("google_chrome_installed.nasl");
      script_require_keys("SMB/Google_Chrome/Installed");
    
      exit(0);
    }
    
    include("google_chrome_version.inc");
    
    get_kb_item_or_exit("SMB/Google_Chrome/Installed");
    
    installs = get_kb_list("SMB/Google_Chrome/*");
    google_chrome_check_version(installs:installs, fix:'30.0.1599.66', severity:SECURITY_HOLE);
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-6828.NASL
    descriptionFix CVE-2013-2924 (RHBZ #1015595) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-06-10
    plugin id74392
    published2014-06-10
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74392
    titleFedora 20 : mingw-icu-50.1.2-3.fc20 (2014-6828)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-6828.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(74392);
      script_version("1.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-2924");
      script_bugtraq_id(64758);
      script_xref(name:"FEDORA", value:"2014-6828");
    
      script_name(english:"Fedora 20 : mingw-icu-50.1.2-3.fc20 (2014-6828)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Fix CVE-2013-2924 (RHBZ #1015595)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1015595"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-June/134154.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?2a20c477"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected mingw-icu package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_set_attribute(attribute:"d2_elliot_name", value:"Apache-Struts DefaultActionMapper < 2.3.15.1 RCE Linux");
      script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mingw-icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/05/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/10");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"mingw-icu-50.1.2-3.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mingw-icu");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2786.NASL
    descriptionThe Google Chrome Security Team discovered two issues (a race condition and a use-after-free issue) in the International Components for Unicode (ICU) library.
    last seen2020-03-17
    modified2013-10-29
    plugin id70664
    published2013-10-29
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70664
    titleDebian DSA-2786-1 : icu - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-2786. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70664);
      script_version("1.13");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-0900", "CVE-2013-2924");
      script_bugtraq_id(58318, 62968);
      script_xref(name:"DSA", value:"2786");
    
      script_name(english:"Debian DSA-2786-1 : icu - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The Google Chrome Security Team discovered two issues (a race
    condition and a use-after-free issue) in the International Components
    for Unicode (ICU) library."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702346"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726477"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2924"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2924"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2924"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/squeeze/icu"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/icu"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2013/dsa-2786"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the icu packages.
    
    For the oldstable distribution (squeeze), these problems have been
    fixed in version 4.4.1-8+squeeze2.
    
    For the stable distribution (wheezy), which is only affected by
    CVE-2013-2924, this problem has been fixed in version
    4.8.1.1-12+deb7u1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"6.0", prefix:"icu-doc", reference:"4.4.1-8+squeeze2")) flag++;
    if (deb_check(release:"6.0", prefix:"lib32icu-dev", reference:"4.4.1-8+squeeze2")) flag++;
    if (deb_check(release:"6.0", prefix:"lib32icu44", reference:"4.4.1-8+squeeze2")) flag++;
    if (deb_check(release:"6.0", prefix:"libicu-dev", reference:"4.4.1-8+squeeze2")) flag++;
    if (deb_check(release:"6.0", prefix:"libicu44", reference:"4.4.1-8+squeeze2")) flag++;
    if (deb_check(release:"6.0", prefix:"libicu44-dbg", reference:"4.4.1-8+squeeze2")) flag++;
    if (deb_check(release:"7.0", prefix:"icu-doc", reference:"4.8.1.1-12+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"libicu-dev", reference:"4.8.1.1-12+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"libicu48", reference:"4.8.1.1-12+deb7u1")) flag++;
    if (deb_check(release:"7.0", prefix:"libicu48-dbg", reference:"4.8.1.1-12+deb7u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-37.NASL
    description - Update to Chromium 31.0.1650.63 Stable channel update : - Security fixes : - CVE-2013-6634: Session fixation in sync related to 302 redirects - CVE-2013-6635: Use-after-free in editing - CVE-2013-6636: Address bar spoofing related to modal dialogs - CVE-2013-6637: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6638: Buffer overflow in v8 - CVE-2013-6639: Out of bounds write in v8. - CVE-2013-6640: Out of bounds read in v8 - and 12 other security fixes. - Remove the build flags to build according to the Chrome ffmpeg branding and the proprietary codecs. (bnc#847971) - Update to Chromium 31.0.1650.57 Stable channel update : - Security Fixes : - CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update : - Security fixes : - CVE-2013-6621: Use after free related to speech input elements.. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to &ldquo;id&rdquo; attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build - Enable ARM build for Chromium. - Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues - Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu - Update to Chromium 30.0.1599.101 - Security Fixes : + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes : + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the &ldquo;204 No Content&rdquo; status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the &ldquo;204 No Content&rdquo; status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug
    last seen2020-06-05
    modified2014-06-13
    plugin id75366
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75366
    titleopenSUSE Security Update : chromium (openSUSE-SU-2014:0065-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2014-37.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(75366);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-2906", "CVE-2013-2907", "CVE-2013-2908", "CVE-2013-2909", "CVE-2013-2910", "CVE-2013-2911", "CVE-2013-2912", "CVE-2013-2913", "CVE-2013-2914", "CVE-2013-2915", "CVE-2013-2916", "CVE-2013-2917", "CVE-2013-2918", "CVE-2013-2919", "CVE-2013-2920", "CVE-2013-2921", "CVE-2013-2922", "CVE-2013-2923", "CVE-2013-2924", "CVE-2013-2925", "CVE-2013-2926", "CVE-2013-2927", "CVE-2013-2928", "CVE-2013-2931", "CVE-2013-6621", "CVE-2013-6622", "CVE-2013-6623", "CVE-2013-6624", "CVE-2013-6625", "CVE-2013-6626", "CVE-2013-6627", "CVE-2013-6628", "CVE-2013-6629", "CVE-2013-6630", "CVE-2013-6631", "CVE-2013-6632", "CVE-2013-6634", "CVE-2013-6635", "CVE-2013-6636", "CVE-2013-6637", "CVE-2013-6638", "CVE-2013-6639", "CVE-2013-6640");
    
      script_name(english:"openSUSE Security Update : chromium (openSUSE-SU-2014:0065-1)");
      script_summary(english:"Check for the openSUSE-2014-37 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Update to Chromium 31.0.1650.63 Stable channel update :
    
      - Security fixes :
    
      - CVE-2013-6634: Session fixation in sync related to 302
        redirects
    
      - CVE-2013-6635: Use-after-free in editing
    
      - CVE-2013-6636: Address bar spoofing related to modal
        dialogs
    
      - CVE-2013-6637: Various fixes from internal audits,
        fuzzing and other initiatives.
    
      - CVE-2013-6638: Buffer overflow in v8
    
      - CVE-2013-6639: Out of bounds write in v8.
    
      - CVE-2013-6640: Out of bounds read in v8
    
      - and 12 other security fixes.
    
      - Remove the build flags to build according to the Chrome
        ffmpeg branding and the proprietary codecs. (bnc#847971)
    
      - Update to Chromium 31.0.1650.57 Stable channel update :
    
      - Security Fixes :
    
      - CVE-2013-6632: Multiple memory corruption issues.
    
      - Update to Chromium 31.0.1650.48 Stable Channel update :
    
      - Security fixes :
    
      - CVE-2013-6621: Use after free related to speech input
        elements..
    
      - CVE-2013-6622: Use after free related to media elements. 
    
      - CVE-2013-6623: Out of bounds read in SVG.
    
      - CVE-2013-6624: Use after free related to
        &ldquo;id&rdquo; attribute strings.
    
      - CVE-2013-6625: Use after free in DOM ranges.
    
      - CVE-2013-6626: Address bar spoofing related to
        interstitial warnings.
    
      - CVE-2013-6627: Out of bounds read in HTTP parsing.
    
      - CVE-2013-6628: Issue with certificates not being checked
        during TLS renegotiation.
    
      - CVE-2013-2931: Various fixes from internal audits,
        fuzzing and other initiatives.
    
      - CVE-2013-6629: Read of uninitialized memory in libjpeg
        and libjpeg-turbo.
    
      - CVE-2013-6630: Read of uninitialized memory in
        libjpeg-turbo.
    
      - CVE-2013-6631: Use after free in libjingle.
    
      - Added patch chromium-fix-chromedriver-build.diff to fix
        the chromedriver build
    
      - Enable ARM build for Chromium. 
    
      - Added patches chromium-arm-webrtc-fix.patch,
        chromium-fix-arm-icu.patch and
        chromium-fix-arm-sysroot.patch to resolve ARM specific
        build issues
    
      - Update to Chromium 30.0.1599.114 Stable Channel update:
        fix build for 32bit systems
    
      - Drop patch chromium-fix-chromedriver-build.diff. This is
        now fixed upstream
    
      - For openSUSE versions lower than 13.1, build against the
        in-tree libicu
    
      - Update to Chromium 30.0.1599.101
    
      - Security Fixes :
    
      + CVE-2013-2925: Use after free in XHR
    
      + CVE-2013-2926: Use after free in editing
    
      + CVE-2013-2927: Use after free in forms.
    
      + CVE-2013-2928: Various fixes from internal audits,
        fuzzing and other initiatives.
    
      - Update to Chromium 30.0.1599.66
    
      - Easier searching by image 
    
      - A number of new apps/extension APIs 
    
      - Lots of under the hood changes for stability and
        performance
    
      - Security fixes :
    
      + CVE-2013-2906: Races in Web Audio
    
      + CVE-2013-2907: Out of bounds read in Window.prototype
        object
    
      + CVE-2013-2908: Address bar spoofing related to the
        &ldquo;204 No Content&rdquo; status code
    
      + CVE-2013-2909: Use after free in inline-block rendering
    
      + CVE-2013-2910: Use-after-free in Web Audio
    
      + CVE-2013-2911: Use-after-free in XSLT
    
      + CVE-2013-2912: Use-after-free in PPAPI
    
      + CVE-2013-2913: Use-after-free in XML document parsing
    
      + CVE-2013-2914: Use after free in the Windows color
        chooser dialog
    
      + CVE-2013-2915: Address bar spoofing via a malformed
        scheme
    
      + CVE-2013-2916: Address bar spoofing related to the
        &ldquo;204 No Content&rdquo; status code
    
      + CVE-2013-2917: Out of bounds read in Web Audio
    
      + CVE-2013-2918: Use-after-free in DOM
    
      + CVE-2013-2919: Memory corruption in V8
    
      + CVE-2013-2920: Out of bounds read in URL parsing
    
      + CVE-2013-2921: Use-after-free in resource loader
    
      + CVE-2013-2922: Use-after-free in template element
    
      + CVE-2013-2923: Various fixes from internal audits,
        fuzzing and other initiatives 
    
      + CVE-2013-2924: Use-after-free in ICU. Upstream bug"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=847971"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=854472"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=854473"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected chromium packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-suid-helper");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-suid-helper-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/01/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"chromedriver-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromedriver-debuginfo-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-debuginfo-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-debugsource-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-desktop-gnome-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-desktop-kde-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-ffmpegsumo-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-ffmpegsumo-debuginfo-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-suid-helper-31.0.1650.63-13.7") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-suid-helper-debuginfo-31.0.1650.63-13.7") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chromedriver / chromedriver-debuginfo / chromium / etc");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-18774.NASL
    descriptionResolves: rhbz#1015594 CVE-2013-2924 icu: use-after-free flaw leads to denial of service. added %{?_isa} to Requires for multi-arch systems added %{?_isa} to Requires for multi-arch systems Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-10-27
    plugin id70638
    published2013-10-27
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70638
    titleFedora 18 : icu-49.1.1-12.fc18 (2013-18774)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-18774.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70638);
      script_version("1.9");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-2924");
      script_bugtraq_id(62968);
      script_xref(name:"FEDORA", value:"2013-18774");
    
      script_name(english:"Fedora 18 : icu-49.1.1-12.fc18 (2013-18774)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Resolves: rhbz#1015594 CVE-2013-2924 icu: use-after-free flaw leads to
    denial of service. added %{?_isa} to Requires for multi-arch systems
    added %{?_isa} to Requires for multi-arch systems
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1014886"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-October/119657.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?e9fa716f"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected icu package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:18");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^18([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 18.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC18", reference:"icu-49.1.1-12.fc18")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "icu");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_E5414D0C2ADE11E3821D00262D5ED8EE.NASL
    descriptionGoogle Chrome Releases reports : 50 security fixes in this release, including : - [223962][270758][271161][284785][284786] Medium CVE-2013-2906 : Races in Web Audio. Credit to Atte Kettunen of OUSPG. - [260667] Medium CVE-2013-2907: Out of bounds read in Window.prototype object. Credit to Boris Zbarsky. - [265221] Medium CVE-2013-2908: Address bar spoofing related to the
    last seen2020-06-01
    modified2020-06-02
    plugin id70265
    published2013-10-02
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70265
    titleFreeBSD : chromium -- multiple vulnerabilities (e5414d0c-2ade-11e3-821d-00262d5ed8ee)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2016 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70265);
      script_version("1.9");
      script_cvs_date("Date: 2018/10/29 10:22:58");
    
      script_cve_id("CVE-2013-2906", "CVE-2013-2907", "CVE-2013-2908", "CVE-2013-2909", "CVE-2013-2910", "CVE-2013-2911", "CVE-2013-2912", "CVE-2013-2913", "CVE-2013-2914", "CVE-2013-2915", "CVE-2013-2916", "CVE-2013-2917", "CVE-2013-2918", "CVE-2013-2919", "CVE-2013-2920", "CVE-2013-2921", "CVE-2013-2922", "CVE-2013-2923", "CVE-2013-2924");
    
      script_name(english:"FreeBSD : chromium -- multiple vulnerabilities (e5414d0c-2ade-11e3-821d-00262d5ed8ee)");
      script_summary(english:"Checks for updated package in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote FreeBSD host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Google Chrome Releases reports :
    
    50 security fixes in this release, including :
    
    - [223962][270758][271161][284785][284786] Medium CVE-2013-2906 :
    Races in Web Audio. Credit to Atte Kettunen of OUSPG.
    
    - [260667] Medium CVE-2013-2907: Out of bounds read in
    Window.prototype object. Credit to Boris Zbarsky.
    
    - [265221] Medium CVE-2013-2908: Address bar spoofing related to the
    '204 No Content' status code. Credit to Chamal de Silva.
    
    - [265838][279277] High CVE-2013-2909: Use after free in inline-block
    rendering. Credit to Atte Kettunen of OUSPG.
    
    - [269753] Medium CVE-2013-2910: Use-after-free in Web Audio. Credit
    to Byoungyoung Lee of Georgia Tech Information Security Center
    (GTISC).
    
    - [271939] High CVE-2013-2911: Use-after-free in XSLT. Credit to Atte
    Kettunen of OUSPG.
    
    - [276368] High CVE-2013-2912: Use-after-free in PPAPI. Credit to
    Chamal de Silva and 41.w4r10r(at)garage4hackers.com.
    
    - [278908] High CVE-2013-2913: Use-after-free in XML document parsing.
    Credit to cloudfuzzer.
    
    - [279263] High CVE-2013-2914: Use after free in the Windows color
    chooser dialog. Credit to Khalil Zhani.
    
    - [280512] Low CVE-2013-2915: Address bar spoofing via a malformed
    scheme. Credit to Wander Groeneveld. 
    
    - [281256] High CVE-2013-2916: Address bar spoofing related to the
    '204 No Content' status code. Credit to Masato Kinugawa.
    
    - [281480] Medium CVE-2013-2917: Out of bounds read in Web Audio.
    Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information
    Security Center (GTISC).
    
    - [282088] High CVE-2013-2918: Use-after-free in DOM. Credit to
    Byoungyoung Lee of Georgia Tech Information Security Center (GTISC).
    
    - [282736] High CVE-2013-2919: Memory corruption in V8. Credit to Adam
    Haile of Concrete Data.
    
    - [285742] Medium CVE-2013-2920: Out of bounds read in URL parsing.
    Credit to Atte Kettunen of OUSPG.
    
    - [286414] High CVE-2013-2921: Use-after-free in resource loader.
    Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information
    Security Center (GTISC).
    
    - [286975] High CVE-2013-2922: Use-after-free in template element.
    Credit to Jon Butler.
    
    - [299016] CVE-2013-2923: Various fixes from internal audits, fuzzing
    and other initiatives (Chrome 30).
    
    - [275803] Medium CVE-2013-2924: Use-after-free in ICU. Upstream bug
    here."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://googlechromereleases.blogspot.nl/"
      );
      # http://www.freebsd.org/ports/portaudit/e5414d0c-2ade-11e3-821d-00262d5ed8ee.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ace320ee"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:chromium");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/02");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"chromium<30.0.1599.66")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_GOOGLE_CHROME_30_0_1599_66.NASL
    descriptionThe version of Google Chrome installed on the remote host is a version prior to 30.0.1599.66. It is, therefore, affected by multiple vulnerabilities : - A race condition exists related to
    last seen2020-06-01
    modified2020-06-02
    plugin id70893
    published2013-11-13
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70893
    titleGoogle Chrome < 30.0.1599.66 Multiple Vulnerabilities (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70893);
      script_version("1.9");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2013-2906",
        "CVE-2013-2907",
        "CVE-2013-2908",
        "CVE-2013-2909",
        "CVE-2013-2910",
        "CVE-2013-2911",
        "CVE-2013-2912",
        "CVE-2013-2913",
        "CVE-2013-2914",
        "CVE-2013-2915",
        "CVE-2013-2916",
        "CVE-2013-2917",
        "CVE-2013-2918",
        "CVE-2013-2919",
        "CVE-2013-2920",
        "CVE-2013-2921",
        "CVE-2013-2922",
        "CVE-2013-2923",
        "CVE-2013-2924"
      );
      script_bugtraq_id(62752, 62968);
    
      script_name(english:"Google Chrome < 30.0.1599.66 Multiple Vulnerabilities (Mac OS X)");
      script_summary(english:"Checks version number of Google Chrome");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host contains a web browser that is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Google Chrome installed on the remote host is a version
    prior to 30.0.1599.66.  It is, therefore, affected by multiple
    vulnerabilities :
    
      - A race condition exists related to 'Web Audio'.
        (CVE-2013-2906)
    
      - Out-of-bounds read errors exist related to
        the 'Window.prototype' object, 'Web Audio', and URL
        parsing. (CVE-2013-2907, CVE-2013-2917, CVE-2013-2920)
    
      - Several errors exist related to the address bar that
        could allow spoofing attacks. (CVE-2013-2908,
        CVE-2013-2915, CVE-2013-2916)
    
      - Use-after-free errors exist related to 'inline-block'
        rendering, 'Web Audio', XSLT, PPAPI, XML document
        parsing, Windows color chooser dialog, DOM, the
        resource loader, the 'template' element and ICU.
        (CVE-2013-2909, CVE-2013-2910, CVE-2013-2911,
        CVE-2013-2912, CVE-2013-2913, CVE-2013-2914,
        CVE-2013-2918, CVE-2013-2921, CVE-2013-2922,
        CVE-2013-2924)
    
      - A memory corruption error exists in the V8
        JavaScript engine. (CVE-2013-2919)
    
      - Various, unspecified errors exist. (CVE-2013-2923)");
      # http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0e1731d9");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Google Chrome 30.0.1599.66 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2924");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:google:chrome");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_google_chrome_installed.nbin");
      script_require_keys("MacOSX/Google Chrome/Installed");
    
      exit(0);
    }
    
    
    include("google_chrome_version.inc");
    
    get_kb_item_or_exit("MacOSX/Google Chrome/Installed");
    
    google_chrome_check_version(fix:'30.0.1599.66', severity:SECURITY_HOLE);
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS_JAN2014_SRU11_1_15_4_0.NASL
    descriptionThis Solaris system is missing necessary patches to address a critical security update : - Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). The supported version that is affected is 11.1. Difficult to exploit vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. (CVE-2013-2924)
    last seen2020-06-01
    modified2020-06-02
    plugin id76813
    published2014-07-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/76813
    titleOracle Solaris Critical Patch Update : jan2014_SRU11_1_15_4_0
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from the Oracle CPU for jan2014.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(76813);
      script_version("1.8");
      script_cvs_date("Date: 2019/01/17 10:53:30");
    
      script_cve_id("CVE-2013-2924");
    
      script_name(english:"Oracle Solaris Critical Patch Update : jan2014_SRU11_1_15_4_0");
      script_summary(english:"Check for the jan2014 CPU");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Solaris system is missing a security patch from CPU
    jan2014."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This Solaris system is missing necessary patches to address a critical
    security update :
    
      - Vulnerability in the Solaris component of Oracle and Sun
        Systems Products Suite (subcomponent: Localization
        (L10N)). The supported version that is affected is 11.1.
        Difficult to exploit vulnerability requiring logon to
        Operating System. Successful attack of this
        vulnerability can result in unauthorized ability to
        cause a partial denial of service (partial DOS) of
        Solaris. (CVE-2013-2924)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://support.oracle.com/epmos/faces/DocumentDisplay?id=1607615.1"
      );
      # https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/1932653.xml
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?4203e497"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install the jan2014 CPU from the Oracle support website."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:solaris:11.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/01/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/07/26");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris11/release");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Solaris11/release");
    if (isnull(release)) audit(AUDIT_OS_NOT, "Solaris11");
    
    
    fix_release = "0.5.11-0.175.1.15.0.4.0";
    
    flag = 0;
    
    if (solaris_check_release(release:"0.5.11-0.175.1.15.0.4.0", sru:"11.1.15.4.0") > 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report2());
      else security_hole(0);
      exit(0);
    }
    audit(AUDIT_OS_RELEASE_NOT, "Solaris", fix_release, release);
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-6858.NASL
    descriptionFix CVE-2013-2924 (RHBZ #1015595) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-06-10
    plugin id74399
    published2014-06-10
    reporterThis script is Copyright (C) 2014-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/74399
    titleFedora 19 : mingw-icu-50.1.2-3.fc19 (2014-6858)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-6858.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(74399);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-2924");
      script_xref(name:"FEDORA", value:"2014-6858");
    
      script_name(english:"Fedora 19 : mingw-icu-50.1.2-3.fc19 (2014-6858)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Fix CVE-2013-2924 (RHBZ #1015595)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1015595"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-June/134161.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?607d5dec"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected mingw-icu package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:mingw-icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/05/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC19", reference:"mingw-icu-50.1.2-3.fc19")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mingw-icu");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-961.NASL
    descriptionChromium was updated to 31.0.1650.57: Stable channel update : - Security Fixes : - CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update : - Security fixes : - CVE-2013-6621: Use after free related to speech input elements.. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to &ldquo;id&rdquo; attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build - Enable ARM build for Chromium. - Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues - Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu - Update to Chromium 30.0.1599.101 - Security Fixes : + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes : + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the &ldquo;204 No Content&rdquo; status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the &ldquo;204 No Content&rdquo; status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug
    last seen2020-06-05
    modified2014-06-13
    plugin id75225
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75225
    titleopenSUSE Security Update : chromium (openSUSE-SU-2013:1861-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2013-961.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(75225);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-2906", "CVE-2013-2907", "CVE-2013-2908", "CVE-2013-2909", "CVE-2013-2910", "CVE-2013-2911", "CVE-2013-2912", "CVE-2013-2913", "CVE-2013-2914", "CVE-2013-2915", "CVE-2013-2916", "CVE-2013-2917", "CVE-2013-2918", "CVE-2013-2919", "CVE-2013-2920", "CVE-2013-2921", "CVE-2013-2922", "CVE-2013-2923", "CVE-2013-2924", "CVE-2013-2925", "CVE-2013-2926", "CVE-2013-2927", "CVE-2013-2928", "CVE-2013-2931", "CVE-2013-6621", "CVE-2013-6622", "CVE-2013-6623", "CVE-2013-6624", "CVE-2013-6625", "CVE-2013-6626", "CVE-2013-6627", "CVE-2013-6628", "CVE-2013-6629", "CVE-2013-6630", "CVE-2013-6631", "CVE-2013-6632");
      script_bugtraq_id(62752, 62968, 63024, 63025, 63026, 63028, 63667, 63669, 63670, 63671, 63672, 63673, 63674, 63675, 63676, 63677, 63678, 63679, 63729, 64354);
    
      script_name(english:"openSUSE Security Update : chromium (openSUSE-SU-2013:1861-1)");
      script_summary(english:"Check for the openSUSE-2013-961 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Chromium was updated to 31.0.1650.57: Stable channel update :
    
      - Security Fixes :
    
      - CVE-2013-6632: Multiple memory corruption issues.
    
      - Update to Chromium 31.0.1650.48 Stable Channel update :
    
      - Security fixes :
    
      - CVE-2013-6621: Use after free related to speech input
        elements..
    
      - CVE-2013-6622: Use after free related to media elements. 
    
      - CVE-2013-6623: Out of bounds read in SVG.
    
      - CVE-2013-6624: Use after free related to
        &ldquo;id&rdquo; attribute strings.
    
      - CVE-2013-6625: Use after free in DOM ranges.
    
      - CVE-2013-6626: Address bar spoofing related to
        interstitial warnings.
    
      - CVE-2013-6627: Out of bounds read in HTTP parsing.
    
      - CVE-2013-6628: Issue with certificates not being checked
        during TLS renegotiation.
    
      - CVE-2013-2931: Various fixes from internal audits,
        fuzzing and other initiatives.
    
      - CVE-2013-6629: Read of uninitialized memory in libjpeg
        and libjpeg-turbo.
    
      - CVE-2013-6630: Read of uninitialized memory in
        libjpeg-turbo.
    
      - CVE-2013-6631: Use after free in libjingle.
    
      - Added patch chromium-fix-chromedriver-build.diff to fix
        the chromedriver build
    
      - Enable ARM build for Chromium. 
    
      - Added patches chromium-arm-webrtc-fix.patch,
        chromium-fix-arm-icu.patch and
        chromium-fix-arm-sysroot.patch to resolve ARM specific
        build issues
    
      - Update to Chromium 30.0.1599.114 Stable Channel update:
        fix build for 32bit systems
    
      - Drop patch chromium-fix-chromedriver-build.diff. This is
        now fixed upstream
    
      - For openSUSE versions lower than 13.1, build against the
        in-tree libicu
    
      - Update to Chromium 30.0.1599.101
    
      - Security Fixes :
    
      + CVE-2013-2925: Use after free in XHR
    
      + CVE-2013-2926: Use after free in editing
    
      + CVE-2013-2927: Use after free in forms.
    
      + CVE-2013-2928: Various fixes from internal audits,
        fuzzing and other initiatives.
    
      - Update to Chromium 30.0.1599.66
    
      - Easier searching by image 
    
      - A number of new apps/extension APIs 
    
      - Lots of under the hood changes for stability and
        performance
    
      - Security fixes :
    
      + CVE-2013-2906: Races in Web Audio
    
      + CVE-2013-2907: Out of bounds read in Window.prototype
        object
    
      + CVE-2013-2908: Address bar spoofing related to the
        &ldquo;204 No Content&rdquo; status code
    
      + CVE-2013-2909: Use after free in inline-block rendering
    
      + CVE-2013-2910: Use-after-free in Web Audio
    
      + CVE-2013-2911: Use-after-free in XSLT
    
      + CVE-2013-2912: Use-after-free in PPAPI
    
      + CVE-2013-2913: Use-after-free in XML document parsing
    
      + CVE-2013-2914: Use after free in the Windows color
        chooser dialog
    
      + CVE-2013-2915: Address bar spoofing via a malformed
        scheme
    
      + CVE-2013-2916: Address bar spoofing related to the
        &ldquo;204 No Content&rdquo; status code
    
      + CVE-2013-2917: Out of bounds read in Web Audio
    
      + CVE-2013-2918: Use-after-free in DOM
    
      + CVE-2013-2919: Memory corruption in V8
    
      + CVE-2013-2920: Out of bounds read in URL parsing
    
      + CVE-2013-2921: Use-after-free in resource loader
    
      + CVE-2013-2922: Use-after-free in template element
    
      + CVE-2013-2923: Various fixes from internal audits,
        fuzzing and other initiatives 
    
      + CVE-2013-2924: Use-after-free in ICU. Upstream bug"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2013-12/msg00049.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected chromium packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromedriver-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-desktop-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-suid-helper");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:chromium-suid-helper-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/12/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"chromedriver-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromedriver-debuginfo-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-debuginfo-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-debugsource-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-desktop-gnome-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-desktop-kde-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-ffmpegsumo-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-ffmpegsumo-debuginfo-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-suid-helper-31.0.1650.57-8.2") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"chromium-suid-helper-debuginfo-31.0.1650.57-8.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "chromium");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-18771.NASL
    descriptionResolves: rhbz#1015594 CVE-2013-2924 icu: use-after-free flaw leads to denial of service. added %{?_isa} to Requires for multi-arch systems added %{?_isa} to Requires for multi-arch systems Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-10-27
    plugin id70637
    published2013-10-27
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70637
    titleFedora 19 : icu-50.1.2-9.fc19 (2013-18771)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-18771.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70637);
      script_version("1.9");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-2924");
      script_bugtraq_id(62968);
      script_xref(name:"FEDORA", value:"2013-18771");
    
      script_name(english:"Fedora 19 : icu-50.1.2-9.fc19 (2013-18771)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Resolves: rhbz#1015594 CVE-2013-2924 icu: use-after-free flaw leads to
    denial of service. added %{?_isa} to Requires for multi-arch systems
    added %{?_isa} to Requires for multi-arch systems
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1014886"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-October/119662.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?5ee8fe33"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected icu package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:icu");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC19", reference:"icu-50.1.2-9.fc19")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "icu");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1989-1.NASL
    descriptionIt was discovered that ICU contained a race condition affecting multi- threaded applications. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. This issue only affected Ubuntu 12.04 LTS and Ubuntu 12.10. (CVE-2013-0900) It was discovered that ICU incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. (CVE-2013-2924). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id70452
    published2013-10-16
    reporterUbuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70452
    titleUbuntu 12.04 LTS / 12.10 / 13.04 : icu vulnerabilities (USN-1989-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-1989-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70452);
      script_version("1.12");
      script_cvs_date("Date: 2019/09/19 12:54:29");
    
      script_cve_id("CVE-2013-0900", "CVE-2013-2924");
      script_bugtraq_id(58318, 62968);
      script_xref(name:"USN", value:"1989-1");
    
      script_name(english:"Ubuntu 12.04 LTS / 12.10 / 13.04 : icu vulnerabilities (USN-1989-1)");
      script_summary(english:"Checks dpkg output for updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Ubuntu host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that ICU contained a race condition affecting multi-
    threaded applications. If an application using ICU processed crafted
    data, an attacker could cause it to crash or potentially execute
    arbitrary code with the privileges of the user invoking the program.
    This issue only affected Ubuntu 12.04 LTS and Ubuntu 12.10.
    (CVE-2013-0900)
    
    It was discovered that ICU incorrectly handled memory operations. If
    an application using ICU processed crafted data, an attacker could
    cause it to crash or potentially execute arbitrary code with the
    privileges of the user invoking the program. (CVE-2013-2924).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/1989-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libicu48 package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libicu48");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.10");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:13.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/23");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/15");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/10/16");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(12\.04|12\.10|13\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 12.10 / 13.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"12.04", pkgname:"libicu48", pkgver:"4.8.1.1-3ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"12.10", pkgname:"libicu48", pkgver:"4.8.1.1-8ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"13.04", pkgname:"libicu48", pkgver:"4.8.1.1-12ubuntu0.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libicu48");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2013-258.NASL
    descriptionUpdated icu packages fix security vulnerabilities : It was discovered that ICU contained a race condition affecting multi-threaded applications. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program (CVE-2013-0900). It was discovered that ICU incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program (CVE-2013-2924).
    last seen2020-06-01
    modified2020-06-02
    plugin id70678
    published2013-10-29
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70678
    titleMandriva Linux Security Advisory : icu (MDVSA-2013:258)

Oval

accepted2013-11-11T04:01:26.633-05:00
classvulnerability
contributors
nameShane Shaffer
organizationG2, Inc.
definition_extensions
commentGoogle Chrome is installed
ovaloval:org.mitre.oval:def:11914
descriptionUse-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
familywindows
idoval:org.mitre.oval:def:19017
statusaccepted
submitted2013-10-02T14:33:13.988-04:00
titleUse-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors
version40