Vulnerabilities > CVE-2013-4509 - Credentials Management vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.

Vulnerable Configurations

Part Description Count
Application
Ibus_Project
65
OS
Opensuse
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-20929.NASL
    descriptionFixes ibus: visible password entry flaw. (rhbz#1027029) (CVE-2013-4509) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-11-14
    plugin id70910
    published2013-11-14
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70910
    titleFedora 20 : ibus-pinyin-1.5.0-5.fc20 (2013-20929)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-20929.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70910);
      script_version("1.7");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-4509");
      script_bugtraq_id(63516);
      script_xref(name:"FEDORA", value:"2013-20929");
    
      script_name(english:"Fedora 20 : ibus-pinyin-1.5.0-5.fc20 (2013-20929)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Fixes ibus: visible password entry flaw. (rhbz#1027029)
    (CVE-2013-4509)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1027028"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-November/121897.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?4c1e3b8b"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ibus-pinyin package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ibus-pinyin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/11/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"ibus-pinyin-1.5.0-5.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ibus-pinyin");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-1910.NASL
    description - Resolves Bug 1054937 - Broken %defattr in ibus-chewing - Fix Build for RHEL7 - Resolves Bug 1013977 - ibus-chewing needs to have ibus write-cache --system in %post and %postun - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing: ibus: visible password entry flaw [rhel-7.0] - Resolves Bug 1028911 - [zh_TW]
    last seen2020-03-17
    modified2014-02-24
    plugin id72648
    published2014-02-24
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72648
    titleFedora 19 : ibus-chewing-1.4.10.1-1.fc19 (2014-1910)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-1910.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72648);
      script_version("1.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-4509");
      script_bugtraq_id(63516);
      script_xref(name:"FEDORA", value:"2014-1910");
    
      script_name(english:"Fedora 19 : ibus-chewing-1.4.10.1-1.fc19 (2014-1910)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Resolves Bug 1054937 - Broken %defattr in ibus-chewing
    
        - Fix Build for RHEL7
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Fix Build for RHEL7
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1013977"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1027030"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1028911"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1045868"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=842856"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128944.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?b1a024ff"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ibus-chewing package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ibus-chewing");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/11/23");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/02/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC19", reference:"ibus-chewing-1.4.10.1-1.fc19")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ibus-chewing");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-20993.NASL
    descriptionFixes ibus: visible password entry flaw. (rhbz#1027029) (CVE-2013-4509) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-11-19
    plugin id70957
    published2013-11-19
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70957
    titleFedora 19 : ibus-pinyin-1.5.0-5.fc19 (2013-20993)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-20993.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70957);
      script_version("1.7");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-4509");
      script_bugtraq_id(63516);
      script_xref(name:"FEDORA", value:"2013-20993");
    
      script_name(english:"Fedora 19 : ibus-pinyin-1.5.0-5.fc19 (2013-20993)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Fixes ibus: visible password entry flaw. (rhbz#1027029)
    (CVE-2013-4509)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1027028"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-November/122205.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?0cadbe80"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ibus-pinyin package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ibus-pinyin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/11/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC19", reference:"ibus-pinyin-1.5.0-5.fc19")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ibus-pinyin");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-1908.NASL
    description - Resolves Bug 1054937 - Broken %defattr in ibus-chewing - Fix Build for RHEL7 - Resolves Bug 1013977 - ibus-chewing needs to have ibus write-cache --system in %post and %postun - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing: ibus: visible password entry flaw [rhel-7.0] - Resolves Bug 1028911 - [zh_TW]
    last seen2020-03-17
    modified2014-02-12
    plugin id72448
    published2014-02-12
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72448
    titleFedora 20 : ibus-chewing-1.4.10.1-1.fc20 (2014-1908)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-1908.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72448);
      script_version("1.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-4509");
      script_bugtraq_id(63516);
      script_xref(name:"FEDORA", value:"2014-1908");
    
      script_name(english:"Fedora 20 : ibus-chewing-1.4.10.1-1.fc20 (2014-1908)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Resolves Bug 1054937 - Broken %defattr in ibus-chewing
    
        - Fix Build for RHEL7
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Fix Build for RHEL7
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 1013977 - ibus-chewing needs to have ibus
          write-cache --system in %post and %postun
    
        - Resolves Bug 1027031 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [rhel-7.0]
    
        - Resolves Bug 1028911 - [zh_TW]'Chinese<->English'
          switch does not work when clicking on the Chewing menu
          list.
    
        - Resolves Bug 1045868 - ibus-chewing *again* not built
          with $RPM_OPT_FLAGS
    
        - Option 'Sync between caps lock and IM': + Default of
          is changed to 'disable', because the previous default
          'keyboard' cause bug 1028911 for GNOME Shell. + Now
          Sync from 'input method' can control Caps LED in GNOME
          shell.
    
      - Translation added: de_DE, es_ES, it_IT, pt_BR, uk_UA
    
        - Set environment IBUS_CHEWING_LOGFILE for ibus-chewing
          log.
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
        - Resolves Bug 842856 - ibus-chewing 1.4.3-1 not built
          with $RPM_OPT_FLAGS
    
        - Resolves Bug 1027030 - CVE-2013-4509 ibus-chewing:
          ibus: visible password entry flaw [fedora-all] Thanks
          czchen for the GitHub pull request 39.
    
      - Added translations: fr_FR, ja_JP, ko_KR
    
        - Adopt cmake-fedora-1.2.0
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1013977"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1027030"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1028911"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1045868"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=842856"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128124.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?af62aad0"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ibus-chewing package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:ibus-chewing");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/11/23");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/02/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"ibus-chewing-1.4.10.1-1.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ibus-chewing");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-939.NASL
    descriptionThis update fixes the following issue with ibus-pinyin : - Fix visible password entry in GNOME lock screen (CVE-2013-4509, bnc#847718)
    last seen2020-06-05
    modified2014-06-13
    plugin id75220
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75220
    titleopenSUSE Security Update : ibus-pinyin (openSUSE-SU-2013:1825-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2013-939.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(75220);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-4509");
    
      script_name(english:"openSUSE Security Update : ibus-pinyin (openSUSE-SU-2013:1825-1)");
      script_summary(english:"Check for the openSUSE-2013-939 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update fixes the following issue with ibus-pinyin :
    
      - Fix visible password entry in GNOME lock screen
        (CVE-2013-4509, bnc#847718)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=847718"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2013-12/msg00024.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected ibus-pinyin packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ibus-pinyin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ibus-pinyin-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ibus-pinyin-debugsource");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/11/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"ibus-pinyin-1.5.0-3.6.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"ibus-pinyin-debuginfo-1.5.0-3.6.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"ibus-pinyin-debugsource-1.5.0-3.6.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ibus-pinyin");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-850.NASL
    description- This is an additional fix patch for ibus to avoid the wrong IBus.InputPurpose.PASSWORD advertisement, which leads to the password text appearance on GNOME3 lockscreen (bnc#847718)
    last seen2020-06-05
    modified2014-06-13
    plugin id75199
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75199
    titleopenSUSE Security Update : ibus (openSUSE-SU-2013:1686-1)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2014-40.NASL
    description - Add fix-CVE-2013-4509-support-input-purpose.patch - Fixed password is visible on GNOME lock screen (bnc#847718, CVE-2013-4509)
    last seen2020-06-05
    modified2014-06-13
    plugin id75382
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75382
    titleopenSUSE Security Update : ibus-chewing (openSUSE-SU-2014:0068-1)