Vulnerabilities > CVE-2018-12085 - Out-of-bounds Write vulnerability in multiple products

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
liblouis
canonical
opensuse
CWE-787
nessus

Summary

Liblouis 3.6.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1039.NASL
    descriptionThis update for liblouis fixes the following issues : Security issues fixed : - CVE-2018-11440: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095189) - CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c (bsc#1095945) - CVE-2018-11683: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1095827) - CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826) - CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825) - CVE-2018-12085: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1097103) This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen2020-06-05
    modified2018-09-25
    plugin id117687
    published2018-09-25
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117687
    titleopenSUSE Security Update : liblouis (openSUSE-2018-1039)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2018-1039.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(117687);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2018-11440", "CVE-2018-11577", "CVE-2018-11683", "CVE-2018-11684", "CVE-2018-11685", "CVE-2018-12085");
    
      script_name(english:"openSUSE Security Update : liblouis (openSUSE-2018-1039)");
      script_summary(english:"Check for the openSUSE-2018-1039 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for liblouis fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2018-11440: Fixed a stack-based buffer overflow in
        the function parseChars() in compileTranslationTable.c
        (bsc#1095189)
    
      - CVE-2018-11577: Fixed a segmentation fault in
        lou_logPrint in logging.c (bsc#1095945)
    
      - CVE-2018-11683: Fixed a stack-based buffer overflow in
        the function parseChars() in compileTranslationTable.c
        (different vulnerability than CVE-2018-11440)
        (bsc#1095827)
    
      - CVE-2018-11684: Fixed stack-based buffer overflow in the
        function includeFile() in compileTranslationTable.c
        (bsc#1095826)
    
      - CVE-2018-11685: Fixed a stack-based buffer overflow in
        the function compileHyphenation() in
        compileTranslationTable.c (bsc#1095825)
    
      - CVE-2018-12085: Fixed a stack-based buffer overflow in
        the function parseChars() in compileTranslationTable.c
        (different vulnerability than CVE-2018-11440)
        (bsc#1097103)
    
    This update was imported from the SUSE:SLE-12-SP2:Update update
    project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095189"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095825"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095826"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095827"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095945"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097103"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected liblouis packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-data");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis9");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis9-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-louis");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/09/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/25");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis-data-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis-debugsource-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis-devel-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis-tools-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis-tools-debuginfo-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis9-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"liblouis9-debuginfo-2.6.4-9.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-louis-2.6.4-9.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "liblouis-data / liblouis-debugsource / liblouis-devel / etc");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3782-1.NASL
    descriptionHenri Salo discovered that Liblouis incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2018-12085) It was discovered that Liblouis incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17294). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id117915
    published2018-10-04
    reporterUbuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117915
    titleUbuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : liblouis vulnerabilities (USN-3782-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-3782-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(117915);
      script_version("1.3");
      script_cvs_date("Date: 2019/09/18 12:31:48");
    
      script_cve_id("CVE-2018-12085", "CVE-2018-17294");
      script_xref(name:"USN", value:"3782-1");
    
      script_name(english:"Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : liblouis vulnerabilities (USN-3782-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Henri Salo discovered that Liblouis incorrectly handled certain files.
    An attacker could possibly use this issue to execute arbitrary code.
    (CVE-2018-12085)
    
    It was discovered that Liblouis incorrectly handled certain files. An
    attacker could possibly use this issue to cause a denial of service.
    This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17294).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/3782-1/"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:liblouis-bin");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:liblouis14");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:liblouis2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:liblouis9");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/06/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/10/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/10/04");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(14\.04|16\.04|18\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 14.04 / 16.04 / 18.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"14.04", pkgname:"liblouis-bin", pkgver:"2.5.3-2ubuntu1.5")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"liblouis2", pkgver:"2.5.3-2ubuntu1.5")) flag++;
    if (ubuntu_check(osver:"16.04", pkgname:"liblouis-bin", pkgver:"2.6.4-2ubuntu0.4")) flag++;
    if (ubuntu_check(osver:"16.04", pkgname:"liblouis9", pkgver:"2.6.4-2ubuntu0.4")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"liblouis-bin", pkgver:"3.5.0-1ubuntu0.3")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"liblouis14", pkgver:"3.5.0-1ubuntu0.3")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "liblouis-bin / liblouis14 / liblouis2 / liblouis9");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1160.NASL
    descriptionThis update for liblouis fixes the following issues : Security issues fixed : - CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function which could allow a remote attacker to cause Denail of Service (bsc#1109319). - CVE-2018-11410: Fixed an invalid free in the compileRule function in compileTranslationTable.c (bsc#1094685) - CVE-2018-11440: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095189) - CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c (bsc#1095945) - CVE-2018-11683: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1095827) - CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826) - CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825) - CVE-2018-12085: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1097103) This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id123815
    published2019-04-08
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123815
    titleopenSUSE Security Update : liblouis (openSUSE-2019-1160)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-1160.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123815);
      script_version("1.2");
      script_cvs_date("Date: 2020/01/23");
    
      script_cve_id("CVE-2018-11410", "CVE-2018-11440", "CVE-2018-11577", "CVE-2018-11683", "CVE-2018-11684", "CVE-2018-11685", "CVE-2018-12085", "CVE-2018-17294");
    
      script_name(english:"openSUSE Security Update : liblouis (openSUSE-2019-1160)");
      script_summary(english:"Check for the openSUSE-2019-1160 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for liblouis fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2018-17294: Fixed an out of bounds read in
        matchCurrentInput function which could allow a remote
        attacker to cause Denail of Service (bsc#1109319).
    
      - CVE-2018-11410: Fixed an invalid free in the compileRule
        function in compileTranslationTable.c (bsc#1094685)
    
      - CVE-2018-11440: Fixed a stack-based buffer overflow in
        the function parseChars() in compileTranslationTable.c
        (bsc#1095189)
    
      - CVE-2018-11577: Fixed a segmentation fault in
        lou_logPrint in logging.c (bsc#1095945)
    
      - CVE-2018-11683: Fixed a stack-based buffer overflow in
        the function parseChars() in compileTranslationTable.c
        (different vulnerability than CVE-2018-11440)
        (bsc#1095827)
    
      - CVE-2018-11684: Fixed stack-based buffer overflow in the
        function includeFile() in compileTranslationTable.c
        (bsc#1095826)
    
      - CVE-2018-11685: Fixed a stack-based buffer overflow in
        the function compileHyphenation() in
        compileTranslationTable.c (bsc#1095825)
    
      - CVE-2018-12085: Fixed a stack-based buffer overflow in
        the function parseChars() in compileTranslationTable.c
        (different vulnerability than CVE-2018-11440)
        (bsc#1097103)
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1094685"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095189"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095825"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095826"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095827"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095945"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097103"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1109319"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected liblouis packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-data");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis14");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:liblouis14-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-louis");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/04/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/08");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis-data-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis-debuginfo-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis-debugsource-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis-devel-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis-tools-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis-tools-debuginfo-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis14-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"liblouis14-debuginfo-3.3.0-lp150.3.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-louis-3.3.0-lp150.3.3.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "liblouis-data / liblouis-debuginfo / liblouis-debugsource / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0795-1.NASL
    descriptionThis update for liblouis fixes the following issues : Security issues fixed : CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput function which could allow a remote attacker to cause Denail of Service (bsc#1109319). CVE-2018-11410: Fixed an invalid free in the compileRule function in compileTranslationTable.c (bsc#1094685) CVE-2018-11440: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095189) CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c (bsc#1095945) CVE-2018-11683: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1095827) CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826) CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825) CVE-2018-12085: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1097103) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id123501
    published2019-03-29
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123501
    titleSUSE SLED15 / SLES15 Security Update : liblouis (SUSE-SU-2019:0795-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2019:0795-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123501);
      script_version("1.3");
      script_cvs_date("Date: 2020/01/27");
    
      script_cve_id("CVE-2018-11410", "CVE-2018-11440", "CVE-2018-11577", "CVE-2018-11683", "CVE-2018-11684", "CVE-2018-11685", "CVE-2018-12085", "CVE-2018-17294");
    
      script_name(english:"SUSE SLED15 / SLES15 Security Update : liblouis (SUSE-SU-2019:0795-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for liblouis fixes the following issues :
    
    Security issues fixed :
    
    CVE-2018-17294: Fixed an out of bounds read in matchCurrentInput
    function which could allow a remote attacker to cause Denail of
    Service (bsc#1109319).
    
    CVE-2018-11410: Fixed an invalid free in the compileRule function in
    compileTranslationTable.c (bsc#1094685)
    
    CVE-2018-11440: Fixed a stack-based buffer overflow in the function
    parseChars() in compileTranslationTable.c (bsc#1095189)
    
    CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in
    logging.c (bsc#1095945)
    
    CVE-2018-11683: Fixed a stack-based buffer overflow in the function
    parseChars() in compileTranslationTable.c (different vulnerability
    than CVE-2018-11440) (bsc#1095827)
    
    CVE-2018-11684: Fixed stack-based buffer overflow in the function
    includeFile() in compileTranslationTable.c (bsc#1095826)
    
    CVE-2018-11685: Fixed a stack-based buffer overflow in the function
    compileHyphenation() in compileTranslationTable.c (bsc#1095825)
    
    CVE-2018-12085: Fixed a stack-based buffer overflow in the function
    parseChars() in compileTranslationTable.c (different vulnerability
    than CVE-2018-11440) (bsc#1097103)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1094685"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1095189"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1095825"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1095826"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1095827"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1095945"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1097103"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1109319"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11410/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11440/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11577/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11683/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11684/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11685/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-12085/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-17294/"
      );
      # https://www.suse.com/support/update/announcement/2019/suse-su-20190795-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c4e11e02"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Module for Open Buildservice Development Tools
    15:zypper in -t patch
    SUSE-SLE-Module-Development-Tools-OBS-15-2019-795=1
    
    SUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t
    patch SUSE-SLE-Module-Desktop-Applications-15-2019-795=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-data");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis14");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:liblouis14-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-louis");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/03/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/29");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0", os_ver + " SP" + sp);
    if (os_ver == "SLED15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-debugsource-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-doc-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-tools-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-tools-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-data-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-debugsource-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis-devel-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis14-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"liblouis14-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-louis-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-debugsource-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-doc-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-tools-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-tools-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-data-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-debugsource-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis-devel-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis14-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"liblouis14-debuginfo-3.3.0-4.5.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-louis-3.3.0-4.5.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "liblouis");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2018-2780-1.NASL
    descriptionThis update for liblouis, python-louis, python3-louis fixes the following issues : Security issues fixed : CVE-2018-11440: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (bsc#1095189) CVE-2018-11577: Fixed a segmentation fault in lou_logPrint in logging.c (bsc#1095945) CVE-2018-11683: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1095827) CVE-2018-11684: Fixed stack-based buffer overflow in the function includeFile() in compileTranslationTable.c (bsc#1095826) CVE-2018-11685: Fixed a stack-based buffer overflow in the function compileHyphenation() in compileTranslationTable.c (bsc#1095825) CVE-2018-12085: Fixed a stack-based buffer overflow in the function parseChars() in compileTranslationTable.c (different vulnerability than CVE-2018-11440) (bsc#1097103) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id117662
    published2018-09-24
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117662
    titleSUSE SLED12 / SLES12 Security Update : liblouis (SUSE-SU-2018:2780-1)

Redhat

advisories
bugzilla
id1589940
titleCVE-2018-12085 liblouis: Stack-based buffer overflow in compileTranslationTable.c
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 8 is installed
      ovaloval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • commentpython3-louis is earlier than 0:2.6.2-21.el8
          ovaloval:com.redhat.rhsa:tst:20201708001
        • commentpython3-louis is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20201708002
      • AND
        • commentliblouis-debugsource is earlier than 0:2.6.2-21.el8
          ovaloval:com.redhat.rhsa:tst:20201708003
        • commentliblouis-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20201708004
      • AND
        • commentliblouis is earlier than 0:2.6.2-21.el8
          ovaloval:com.redhat.rhsa:tst:20201708005
        • commentliblouis is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20173111010
rhsa
idRHSA-2020:1708
released2020-04-28
severityModerate
titleRHSA-2020:1708: liblouis security and bug fix update (Moderate)
rpms
  • liblouis-0:2.6.2-21.el8
  • liblouis-debuginfo-0:2.6.2-21.el8
  • liblouis-debugsource-0:2.6.2-21.el8
  • liblouis-utils-debuginfo-0:2.6.2-21.el8
  • python3-louis-0:2.6.2-21.el8