Vulnerabilities > CVE-2018-12911 - Out-of-bounds Write vulnerability in multiple products

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
webkitgtk
canonical
CWE-787
critical
nessus

Summary

WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.

Vulnerable Configurations

Part Description Count
Application
Webkitgtk
1
OS
Canonical
2

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1025.NASL
    descriptionThis update for webkit2gtk3 to version 2.20.5 fixes the following issues : Security issue fixed : - CVE-2018-12911: Fix off-by-one in xdg_mime_get_simple_globs (bsc#1101999). - CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264, CVE-2018-4265, CVE-2018-4267, CVE-2018-4272, CVE-2018-4284: Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling. - CVE-2018-4266: A malicious website may be able to cause a denial of service. A race condition was addressed with additional validation. - CVE-2018-4270, CVE-2018-4271, CVE-2018-4273: Processing maliciously crafted web content may lead to an unexpected application crash. A memory corruption issue was addressed with improved input validation. - CVE-2018-4278: A malicious website may exfiltrate audio data cross-origin. Sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking. Other bugs fixed : - Fix rendering artifacts in some websites due to a bug introduced in 2.20.4. - Fix a crash when leaving accelerated compositing mode. - Fix non-deterministic build failure due to missing JavaScriptCore/JSContextRef.h. This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-05
    modified2018-09-24
    plugin id117656
    published2018-09-24
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/117656
    titleopenSUSE Security Update : webkit2gtk3 (openSUSE-2018-1025)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2018-1025.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(117656);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2018-12911", "CVE-2018-4261", "CVE-2018-4262", "CVE-2018-4263", "CVE-2018-4264", "CVE-2018-4265", "CVE-2018-4266", "CVE-2018-4267", "CVE-2018-4270", "CVE-2018-4271", "CVE-2018-4272", "CVE-2018-4273", "CVE-2018-4278", "CVE-2018-4284");
    
      script_name(english:"openSUSE Security Update : webkit2gtk3 (openSUSE-2018-1025)");
      script_summary(english:"Check for the openSUSE-2018-1025 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for webkit2gtk3 to version 2.20.5 fixes the following
    issues :
    
    Security issue fixed :
    
      - CVE-2018-12911: Fix off-by-one in
        xdg_mime_get_simple_globs (bsc#1101999).
    
      - CVE-2018-4261, CVE-2018-4262, CVE-2018-4263,
        CVE-2018-4264, CVE-2018-4265, CVE-2018-4267,
        CVE-2018-4272, CVE-2018-4284: Processing maliciously
        crafted web content may lead to arbitrary code
        execution. A memory corruption issue was addressed with
        improved memory handling.
    
      - CVE-2018-4266: A malicious website may be able to cause
        a denial of service. A race condition was addressed with
        additional validation.
    
      - CVE-2018-4270, CVE-2018-4271, CVE-2018-4273: Processing
        maliciously crafted web content may lead to an
        unexpected application crash. A memory corruption issue
        was addressed with improved input validation.
    
      - CVE-2018-4278: A malicious website may exfiltrate audio
        data cross-origin. Sound fetched through audio elements
        may be exfiltrated cross-origin. This issue was
        addressed with improved audio taint tracking.
    
    Other bugs fixed :
    
      - Fix rendering artifacts in some websites due to a bug
        introduced in 2.20.4.
    
      - Fix a crash when leaving accelerated compositing mode.
    
      - Fix non-deterministic build failure due to missing
        JavaScriptCore/JSContextRef.h.
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101999"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1104169"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected webkit2gtk3 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk3-lang");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-JavaScriptCore-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-WebKit2-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-WebKit2WebExtension-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit-jsc-4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit-jsc-4-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk-4_0-injected-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk-4_0-injected-bundles-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-plugin-process-gtk2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-plugin-process-gtk2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/09/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/24");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"libjavascriptcoregtk-4_0-18-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libwebkit2gtk-4_0-37-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libwebkit2gtk3-lang-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-WebKit2-4_0-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit-jsc-4-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit-jsc-4-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk-4_0-injected-bundles-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-debugsource-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-devel-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-plugin-process-gtk2-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-32bit-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-32bit-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libjavascriptcoregtk-4_0-18 / libjavascriptcoregtk-4_0-18-debuginfo / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2018-2752-1.NASL
    descriptionThis update for webkit2gtk3 to version 2.20.5 fixes the following issues : Security issue fixed : CVE-2018-12911: Fix off-by-one in xdg_mime_get_simple_globs (bsc#1101999). CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264, CVE-2018-4265, CVE-2018-4267, CVE-2018-4272, CVE-2018-4284: Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling. CVE-2018-4266: A malicious website may be able to cause a denial of service. A race condition was addressed with additional validation. CVE-2018-4270, CVE-2018-4271, CVE-2018-4273: Processing maliciously crafted web content may lead to an unexpected application crash. A memory corruption issue was addressed with improved input validation. CVE-2018-4278: A malicious website may exfiltrate audio data cross-origin. Sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking. Other bugs fixed: Fix rendering artifacts in some websites due to a bug introduced in 2.20.4. Fix a crash when leaving accelerated compositing mode. Fix non-deterministic build failure due to missing JavaScriptCore/JSContextRef.h. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-19
    modified2019-01-02
    plugin id120100
    published2019-01-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120100
    titleSUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2018:2752-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2018:2752-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(120100);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/18");
    
      script_cve_id("CVE-2018-12911", "CVE-2018-4261", "CVE-2018-4262", "CVE-2018-4263", "CVE-2018-4264", "CVE-2018-4265", "CVE-2018-4266", "CVE-2018-4267", "CVE-2018-4270", "CVE-2018-4271", "CVE-2018-4272", "CVE-2018-4273", "CVE-2018-4278", "CVE-2018-4284");
    
      script_name(english:"SUSE SLED15 / SLES15 Security Update : webkit2gtk3 (SUSE-SU-2018:2752-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for webkit2gtk3 to version 2.20.5 fixes the following
    issues :
    
    Security issue fixed :
    
    CVE-2018-12911: Fix off-by-one in xdg_mime_get_simple_globs
    (bsc#1101999).
    
    CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264,
    CVE-2018-4265, CVE-2018-4267, CVE-2018-4272, CVE-2018-4284: Processing
    maliciously crafted web content may lead to arbitrary code execution.
    A memory corruption issue was addressed with improved memory handling.
    
    CVE-2018-4266: A malicious website may be able to cause a denial of
    service. A race condition was addressed with additional validation.
    
    CVE-2018-4270, CVE-2018-4271, CVE-2018-4273: Processing maliciously
    crafted web content may lead to an unexpected application crash. A
    memory corruption issue was addressed with improved input validation.
    
    CVE-2018-4278: A malicious website may exfiltrate audio data
    cross-origin. Sound fetched through audio elements may be exfiltrated
    cross-origin. This issue was addressed with improved audio taint
    tracking.
    
    Other bugs fixed: Fix rendering artifacts in some websites due to a
    bug introduced in 2.20.4.
    
    Fix a crash when leaving accelerated compositing mode.
    
    Fix non-deterministic build failure due to missing
    JavaScriptCore/JSContextRef.h.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1101999"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1104169"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-12911/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4261/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4262/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4263/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4264/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4265/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4266/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4267/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4270/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4271/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4272/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4273/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4278/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4284/"
      );
      # https://www.suse.com/support/update/announcement/2018/suse-su-20182752-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?a72486d2"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Module for Desktop Applications 15:zypper in -t
    patch SUSE-SLE-Module-Desktop-Applications-15-2018-1921=1
    
    SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch
    SUSE-SLE-Module-Basesystem-15-2018-1921=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-JavaScriptCore");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2WebExtension");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk3-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk3-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/09/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/02");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0", os_ver + " SP" + sp);
    if (os_ver == "SLED15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES15", sp:"0", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"typelib-1_0-WebKit2-4_0-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk3-debugsource-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk3-devel-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libwebkit2gtk-4_0-37-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"webkit2gtk3-debugsource-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"typelib-1_0-WebKit2-4_0-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk3-debugsource-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk3-devel-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libwebkit2gtk-4_0-37-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.5-3.8.1")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"webkit2gtk3-debugsource-2.20.5-3.8.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "webkit2gtk3");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2018-3387-1.NASL
    descriptionThis update for webkit2gtk3 to version 2.20.3 fixes the issues : The following security vulnerabilities were addressed : CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs (boo#1101999) CVE-2017-13884: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). CVE-2017-13885: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). CVE-2017-7153: An unspecified issue allowed remote attackers to spoof user-interface information (about whether the entire content is derived from a valid TLS session) via a crafted website that sends a 401 Unauthorized redirect (bsc#1077535). CVE-2017-7160: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). CVE-2017-7161: An unspecified issue allowed remote attackers to execute arbitrary code via special characters that trigger command injection (bsc#1075775, bsc#1077535). CVE-2017-7165: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). CVE-2018-4088: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). CVE-2018-4096: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). CVE-2018-4200: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website that triggers a WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280). CVE-2018-4204: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1092279). CVE-2018-4101: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1088182). CVE-2018-4113: An issue in the JavaScriptCore function in the
    last seen2020-06-01
    modified2020-06-02
    plugin id118389
    published2018-10-25
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118389
    titleSUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2018:3387-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2018:3387-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(118389);
      script_version("1.5");
      script_cvs_date("Date: 2019/09/10 13:51:49");
    
      script_cve_id("CVE-2017-13884", "CVE-2017-13885", "CVE-2017-7153", "CVE-2017-7160", "CVE-2017-7161", "CVE-2017-7165", "CVE-2018-11646", "CVE-2018-11712", "CVE-2018-11713", "CVE-2018-12911", "CVE-2018-4088", "CVE-2018-4096", "CVE-2018-4101", "CVE-2018-4113", "CVE-2018-4114", "CVE-2018-4117", "CVE-2018-4118", "CVE-2018-4119", "CVE-2018-4120", "CVE-2018-4121", "CVE-2018-4122", "CVE-2018-4125", "CVE-2018-4127", "CVE-2018-4128", "CVE-2018-4129", "CVE-2018-4133", "CVE-2018-4146", "CVE-2018-4161", "CVE-2018-4162", "CVE-2018-4163", "CVE-2018-4165", "CVE-2018-4190", "CVE-2018-4199", "CVE-2018-4200", "CVE-2018-4204", "CVE-2018-4218", "CVE-2018-4222", "CVE-2018-4232", "CVE-2018-4233", "CVE-2018-4246");
    
      script_name(english:"SUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2018:3387-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for webkit2gtk3 to version 2.20.3 fixes the issues :
    
    The following security vulnerabilities were addressed :
    
    CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs
    (boo#1101999)
    
    CVE-2017-13884: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1075775).
    
    CVE-2017-13885: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1075775).
    
    CVE-2017-7153: An unspecified issue allowed remote attackers to spoof
    user-interface information (about whether the entire content is
    derived from a valid TLS session) via a crafted website that sends a
    401 Unauthorized redirect (bsc#1077535).
    
    CVE-2017-7160: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1075775).
    
    CVE-2017-7161: An unspecified issue allowed remote attackers to
    execute arbitrary code via special characters that trigger command
    injection (bsc#1075775, bsc#1077535).
    
    CVE-2017-7165: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1075775).
    
    CVE-2018-4088: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1075775).
    
    CVE-2018-4096: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1075775).
    
    CVE-2018-4200: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website that triggers a
    WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280).
    
    CVE-2018-4204: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1092279).
    
    CVE-2018-4101: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4113: An issue in the JavaScriptCore function in the 'WebKit'
    component allowed attackers to trigger an assertion failure by
    leveraging improper array indexing (bsc#1088182)
    
    CVE-2018-4114: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182)
    
    CVE-2018-4117: An unspecified issue allowed remote attackers to bypass
    the Same Origin Policy and obtain sensitive information via a crafted
    website (bsc#1088182, bsc#1102530).
    
    CVE-2018-4118: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182)
    
    CVE-2018-4119: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182)
    
    CVE-2018-4120: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4121: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1092278).
    
    CVE-2018-4122: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4125: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4127: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4128: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4129: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4146: An unspecified issue allowed attackers to cause a
    denial of service (memory corruption) via a crafted website
    (bsc#1088182).
    
    CVE-2018-4161: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4162: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4163: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4165: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1088182).
    
    CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
    sensitive credential information that is transmitted during a CSS
    mask-image fetch (bsc#1097693)
    
    CVE-2018-4199: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (buffer overflow
    and application crash) via a crafted website (bsc#1097693)
    
    CVE-2018-4218: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website that triggers an
    @generatorState use-after-free (bsc#1097693)
    
    CVE-2018-4222: An unspecified issue allowed remote attackers to
    execute arbitrary code via a crafted website that leverages a
    getWasmBufferFromValue out-of-bounds read during WebAssembly
    compilation (bsc#1097693)
    
    CVE-2018-4232: An unspecified issue allowed remote attackers to
    overwrite cookies via a crafted website (bsc#1097693)
    
    CVE-2018-4233: An unspecified issue allowed remote attackers to
    execute arbitrary code or cause a denial of service (memory corruption
    and application crash) via a crafted website (bsc#1097693)
    
    CVE-2018-4246: An unspecified issue allowed remote attackers to
    execute arbitrary code via a crafted website that leverages type
    confusion (bsc#1104169)
    
    CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
    webkitFaviconDatabaseSetIconURLForPageURL mishandled an unset pageURL,
    leading to an application crash (bsc#1095611)
    
    CVE-2018-4133: A Safari cross-site scripting (XSS) vulnerability
    allowed remote attackers to inject arbitrary web script or HTML via a
    crafted URL (bsc#1088182).
    
    CVE-2018-11713: The libsoup network backend of WebKit unexpectedly
    failed to use system proxy settings for WebSocket connections. As a
    result, users could be deanonymized by crafted websites via a
    WebSocket connection (bsc#1096060).
    
    CVE-2018-11712: The libsoup network backend of WebKit failed to
    perform TLS certificate verification for WebSocket connections
    (bsc#1096061).
    
    This update for webkit2gtk3 fixes the following issues: Fixed a crash
    when atk_object_ref_state_set is called on an AtkObject that's being
    destroyed (bsc#1088932).
    
    Fixed crash when using Wayland with QXL/virtio (bsc#1079512)
    
    Disable Gigacage if mmap fails to allocate in Linux.
    
    Add user agent quirk for paypal website.
    
    Properly detect compiler flags, needed libs, and fallbacks for usage
    of 64-bit atomic operations.
    
    Fix a network process crash when trying to get cookies of about:blank
    page.
    
    Fix UI process crash when closing the window under Wayland.
    
    Fix several crashes and rendering issues.
    
    Do TLS error checking on GTlsConnection::accept-certificate to finish
    the load earlier in case of errors.
    
    Properly close the connection to the nested wayland compositor in the
    Web Process.
    
    Avoid painting backing stores for zero-opacity layers.
    
    Fix downloads started by context menu failing in some websites due to
    missing user agent HTTP header.
    
    Fix video unpause when GStreamerGL is disabled.
    
    Fix several GObject introspection annotations.
    
    Update user agent quiks to fix Outlook.com and Chase.com.
    
    Fix several crashes and rendering issues.
    
    Improve error message when Gigacage cannot allocate virtual memory.
    
    Add missing WebKitWebProcessEnumTypes.h to webkit-web-extension.h.
    
    Improve web process memory monitor thresholds.
    
    Fix a web process crash when the web view is created and destroyed
    quickly.
    
    Fix a network process crash when load is cancelled while searching for
    stored HTTP auth credentials.
    
    Fix the build when ENABLE_VIDEO, ENABLE_WEB_AUDIO and ENABLE_XSLT are
    disabled.
    
    New API to retrieve and delete cookies with WebKitCookieManager.
    
    New web process API to detect when form is submitted via JavaScript.
    
    Several improvements and fixes in the touch/gestures support.
    
    Support for the
    &Atilde;&cent;&Acirc;&#128;&Acirc;&#156;system&Atilde;&cent;&Acirc;&#1
    28;&Acirc;&#157; CSS font family.
    
    Complex text rendering improvements and fixes.
    
    More complete and spec compliant WebDriver implementation.
    
    Ensure DNS prefetching cannot be re-enabled if disabled by settings.
    
    Fix seek sometimes not working.
    
    Fix rendering of emojis that were using the wrong scale factor in some
    cases.
    
    Fix rendering of combining enclosed keycap.
    
    Fix rendering scale of some layers in HiDPI.
    
    Fix a crash in Wayland when closing the web view.
    
    Fix crashes upower crashes when running inside a chroot or on systems
    with broken dbus/upower.
    
    Fix memory leaks in GStreamer media backend when using GStreamer 1.14.
    
    Fix several crashes and rendering issues.
    
    Add ENABLE_ADDRESS_SANITIZER to make it easier to build with asan
    support.
    
    Fix a crash a under Wayland when using mesa software rasterization.
    
    Make fullscreen video work again.
    
    Fix handling of missing GStreamer elements.
    
    Fix rendering when webm video is played twice.
    
    Fix kinetic scrolling sometimes jumping around.
    
    Fix build with ICU configured without collation support.
    
    WebSockets use system proxy settings now (requires libsoup 2.61.90).
    
    Show the context menu on long-press gesture.
    
    Add support for Shift + mouse scroll to scroll horizontally.
    
    Fix zoom gesture to actually zoom instead of changing the page scale.
    
    Implement support for Graphics ARIA roles.
    
    Make sleep inhibitors work under Flatpak.
    
    Add get element CSS value command to WebDriver.
    
    Fix a crash aftter a swipe gesture.
    
    Fix several crashes and rendering issues.
    
    Fix crashes due to duplicated symbols in libjavascriptcoregtk and
    libwebkit2gtk.
    
    Fix parsing of timeout values in WebDriver.
    
    Implement get timeouts command in WebDriver.
    
    Fix deadlock in GStreamer video sink during shutdown when accelerated
    compositing is disabled.
    
    Fix several crashes and rendering issues.
    
    Add web process API to detect when form is submitted via JavaScript.
    
    Add new API to replace
    webkit_form_submission_request_get_text_fields() that is now
    deprecated.
    
    Add WebKitWebView::web-process-terminated signal and deprecate
    web-process-crashed.
    
    Fix rendering issues when editing text areas.
    
    Use FastMalloc based GstAllocator for GStreamer.
    
    Fix web process crash at startup in bmalloc.
    
    Fix several memory leaks in GStreamer media backend.
    
    WebKitWebDriver process no longer links to libjavascriptcoregtk.
    
    Fix several crashes and rendering issues.
    
    Add new API to add, retrieve and delete cookies via
    WebKitCookieManager.
    
    Add functions to WebSettings to convert font sizes between points and
    pixels.
    
    Ensure cookie operations take effect when they happen before a web
    process has been spawned.
    
    Automatically adjust font size when GtkSettings:gtk-xft-dpi changes.
    
    Add initial resource load statistics support.
    
    Add API to expose availability of certain editing commands in
    WebKitEditorState.
    
    Add API to query whether a WebKitNavigationAction is a redirect or
    not.
    
    Improve complex text rendering.
    
    Add support for the 'system' CSS font family.
    
    Disable USE_GSTREAMER_GL
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1075775"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1077535"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1079512"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1088182"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1088932"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1092278"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1092279"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1092280"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1095611"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1096060"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1096061"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1097693"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1101999"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1102530"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1104169"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2017-13884/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2017-13885/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2017-7153/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2017-7160/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2017-7161/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2017-7165/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11646/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11712/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-11713/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-12911/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4088/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4096/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4101/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4113/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4114/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4117/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4118/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4119/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4120/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4121/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4122/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4125/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4127/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4128/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4129/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4133/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4146/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4161/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4162/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4163/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4165/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4190/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4199/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4200/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4204/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4218/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4222/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4232/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4233/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-4246/"
      );
      # https://www.suse.com/support/update/announcement/2018/suse-su-20183387-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3a02e1c7"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Workstation Extension 12-SP3:zypper in -t patch
    SUSE-SLE-WE-12-SP3-2018-2432=1
    
    SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t
    patch SUSE-SLE-SDK-12-SP3-2018-2432=1
    
    SUSE Linux Enterprise Server 12-SP3:zypper in -t patch
    SUSE-SLE-SERVER-12-SP3-2018-2432=1
    
    SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch
    SUSE-SLE-DESKTOP-12-SP3-2018-2432=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Safari Proxy Object Type Confusion');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libjavascriptcoregtk-4_0-18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libwebkit2gtk-4_0-37-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-JavaScriptCore");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:typelib-1_0-WebKit2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk-4_0-injected-bundles-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:webkit2gtk3-debugsource");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2017/12/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/10/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/10/25");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + sp);
    if (os_ver == "SLED12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP3", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libjavascriptcoregtk-4_0-18-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libwebkit2gtk-4_0-37-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"typelib-1_0-WebKit2-4_0-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"webkit2gtk3-debugsource-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"typelib-1_0-WebKit2-4_0-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"webkit2gtk-4_0-injected-bundles-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-2.23.8")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"webkit2gtk3-debugsource-2.20.3-2.23.8")) flag++;
    
    
    if (flag)
    {
      set_kb_item(name:'www/0/XSS', value:TRUE);
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "webkit2gtk3");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-705.NASL
    descriptionThis update for webkit2gtk3 to version 2.20.5 fixes the following issues : Security issue fixed : - CVE-2018-12911: Fix off-by-one in xdg_mime_get_simple_globs (bsc#1101999). - CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264, CVE-2018-4265, CVE-2018-4267, CVE-2018-4272, CVE-2018-4284: Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling. - CVE-2018-4266: A malicious website may be able to cause a denial of service. A race condition was addressed with additional validation. - CVE-2018-4270, CVE-2018-4271, CVE-2018-4273: Processing maliciously crafted web content may lead to an unexpected application crash. A memory corruption issue was addressed with improved input validation. - CVE-2018-4278: A malicious website may exfiltrate audio data cross-origin. Sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking. Other bugs fixed : - Fix rendering artifacts in some websites due to a bug introduced in 2.20.4. - Fix a crash when leaving accelerated compositing mode. - Fix non-deterministic build failure due to missing JavaScriptCore/JSContextRef.h. This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id123306
    published2019-03-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123306
    titleopenSUSE Security Update : webkit2gtk3 (openSUSE-2019-705)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-705.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(123306);
      script_version("1.2");
      script_cvs_date("Date: 2020/01/30");
    
      script_cve_id("CVE-2018-12911", "CVE-2018-4261", "CVE-2018-4262", "CVE-2018-4263", "CVE-2018-4264", "CVE-2018-4265", "CVE-2018-4266", "CVE-2018-4267", "CVE-2018-4270", "CVE-2018-4271", "CVE-2018-4272", "CVE-2018-4273", "CVE-2018-4278", "CVE-2018-4284");
    
      script_name(english:"openSUSE Security Update : webkit2gtk3 (openSUSE-2019-705)");
      script_summary(english:"Check for the openSUSE-2019-705 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for webkit2gtk3 to version 2.20.5 fixes the following
    issues :
    
    Security issue fixed :
    
      - CVE-2018-12911: Fix off-by-one in
        xdg_mime_get_simple_globs (bsc#1101999).
    
      - CVE-2018-4261, CVE-2018-4262, CVE-2018-4263,
        CVE-2018-4264, CVE-2018-4265, CVE-2018-4267,
        CVE-2018-4272, CVE-2018-4284: Processing maliciously
        crafted web content may lead to arbitrary code
        execution. A memory corruption issue was addressed with
        improved memory handling.
    
      - CVE-2018-4266: A malicious website may be able to cause
        a denial of service. A race condition was addressed with
        additional validation.
    
      - CVE-2018-4270, CVE-2018-4271, CVE-2018-4273: Processing
        maliciously crafted web content may lead to an
        unexpected application crash. A memory corruption issue
        was addressed with improved input validation.
    
      - CVE-2018-4278: A malicious website may exfiltrate audio
        data cross-origin. Sound fetched through audio elements
        may be exfiltrated cross-origin. This issue was
        addressed with improved audio taint tracking.
    
    Other bugs fixed :
    
      - Fix rendering artifacts in some websites due to a bug
        introduced in 2.20.4.
    
      - Fix a crash when leaving accelerated compositing mode.
    
      - Fix non-deterministic build failure due to missing
        JavaScriptCore/JSContextRef.h.
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101999"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1104169"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected webkit2gtk3 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-32bit-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk3-lang");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-JavaScriptCore-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-WebKit2-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-WebKit2WebExtension-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit-jsc-4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit-jsc-4-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk-4_0-injected-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk-4_0-injected-bundles-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-plugin-process-gtk2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-plugin-process-gtk2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/03/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/27");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"libjavascriptcoregtk-4_0-18-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libwebkit2gtk-4_0-37-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libwebkit2gtk3-lang-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-WebKit2-4_0-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit-jsc-4-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit-jsc-4-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk-4_0-injected-bundles-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-debugsource-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-devel-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-plugin-process-gtk2-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-32bit-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-32bit-2.20.5-lp150.2.6.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-32bit-debuginfo-2.20.5-lp150.2.6.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libjavascriptcoregtk-4_0-18 / libjavascriptcoregtk-4_0-18-32bit / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-1288.NASL
    descriptionThis update for webkit2gtk3 to version 2.20.3 fixes the issues : The following security vulnerabilities were addressed : - CVE-2018-12911: Fixed an off-by-one error in xdg_mime_get_simple_globs (boo#1101999) - CVE-2017-13884: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). - CVE-2017-13885: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). - CVE-2017-7153: An unspecified issue allowed remote attackers to spoof user-interface information (about whether the entire content is derived from a valid TLS session) via a crafted website that sends a 401 Unauthorized redirect (bsc#1077535). - CVE-2017-7160: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). - CVE-2017-7161: An unspecified issue allowed remote attackers to execute arbitrary code via special characters that trigger command injection (bsc#1075775, bsc#1077535). - CVE-2017-7165: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). - CVE-2018-4088: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). - CVE-2018-4096: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1075775). - CVE-2018-4200: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website that triggers a WebCore::jsElementScrollHeightGetter use-after-free (bsc#1092280). - CVE-2018-4204: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1092279). - CVE-2018-4101: An unspecified issue allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted website (bsc#1088182). - CVE-2018-4113: An issue in the JavaScriptCore function in the
    last seen2020-06-05
    modified2018-10-26
    plugin id118453
    published2018-10-26
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118453
    titleopenSUSE Security Update : webkit2gtk3 (openSUSE-2018-1288)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2018-1288.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(118453);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2017-13884", "CVE-2017-13885", "CVE-2017-7153", "CVE-2017-7160", "CVE-2017-7161", "CVE-2017-7165", "CVE-2018-11646", "CVE-2018-11712", "CVE-2018-11713", "CVE-2018-12911", "CVE-2018-4088", "CVE-2018-4096", "CVE-2018-4101", "CVE-2018-4113", "CVE-2018-4114", "CVE-2018-4117", "CVE-2018-4118", "CVE-2018-4119", "CVE-2018-4120", "CVE-2018-4121", "CVE-2018-4122", "CVE-2018-4125", "CVE-2018-4127", "CVE-2018-4128", "CVE-2018-4129", "CVE-2018-4133", "CVE-2018-4146", "CVE-2018-4161", "CVE-2018-4162", "CVE-2018-4163", "CVE-2018-4165", "CVE-2018-4190", "CVE-2018-4199", "CVE-2018-4200", "CVE-2018-4204", "CVE-2018-4218", "CVE-2018-4222", "CVE-2018-4232", "CVE-2018-4233", "CVE-2018-4246");
    
      script_name(english:"openSUSE Security Update : webkit2gtk3 (openSUSE-2018-1288)");
      script_summary(english:"Check for the openSUSE-2018-1288 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for webkit2gtk3 to version 2.20.3 fixes the issues :
    
    The following security vulnerabilities were addressed :
    
      - CVE-2018-12911: Fixed an off-by-one error in
        xdg_mime_get_simple_globs (boo#1101999)
    
      - CVE-2017-13884: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1075775).
    
      - CVE-2017-13885: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1075775).
    
      - CVE-2017-7153: An unspecified issue allowed remote
        attackers to spoof user-interface information (about
        whether the entire content is derived from a valid TLS
        session) via a crafted website that sends a 401
        Unauthorized redirect (bsc#1077535).
    
      - CVE-2017-7160: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1075775).
    
      - CVE-2017-7161: An unspecified issue allowed remote
        attackers to execute arbitrary code via special
        characters that trigger command injection (bsc#1075775,
        bsc#1077535).
    
      - CVE-2017-7165: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1075775).
    
      - CVE-2018-4088: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1075775).
    
      - CVE-2018-4096: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1075775).
    
      - CVE-2018-4200: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website that triggers a
        WebCore::jsElementScrollHeightGetter use-after-free
        (bsc#1092280).
    
      - CVE-2018-4204: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1092279).
    
      - CVE-2018-4101: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4113: An issue in the JavaScriptCore function
        in the 'WebKit' component allowed attackers to trigger
        an assertion failure by leveraging improper array
        indexing (bsc#1088182)
    
      - CVE-2018-4114: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182) 
    
      - CVE-2018-4117: An unspecified issue allowed remote
        attackers to bypass the Same Origin Policy and obtain
        sensitive information via a crafted website
        (bsc#1088182, bsc#1102530).
    
      - CVE-2018-4118: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182) 
    
      - CVE-2018-4119: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182) 
    
      - CVE-2018-4120: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4121: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1092278).
    
      - CVE-2018-4122: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4125: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4127: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4128: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4129: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4146: An unspecified issue allowed attackers to
        cause a denial of service (memory corruption) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4161: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4162: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4163: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4165: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1088182).
    
      - CVE-2018-4190: An unspecified issue allowed remote
        attackers to obtain sensitive credential information
        that is transmitted during a CSS mask-image fetch
        (bsc#1097693)
    
      - CVE-2018-4199: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (buffer overflow and application crash) via a
        crafted website (bsc#1097693)
    
      - CVE-2018-4218: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website that triggers an @generatorState
        use-after-free (bsc#1097693)
    
      - CVE-2018-4222: An unspecified issue allowed remote
        attackers to execute arbitrary code via a crafted
        website that leverages a getWasmBufferFromValue
        out-of-bounds read during WebAssembly compilation
        (bsc#1097693) 
    
      - CVE-2018-4232: An unspecified issue allowed remote
        attackers to overwrite cookies via a crafted website
        (bsc#1097693) 
    
      - CVE-2018-4233: An unspecified issue allowed remote
        attackers to execute arbitrary code or cause a denial of
        service (memory corruption and application crash) via a
        crafted website (bsc#1097693) 
    
      - CVE-2018-4246: An unspecified issue allowed remote
        attackers to execute arbitrary code via a crafted
        website that leverages type confusion (bsc#1104169) 
    
      - CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL
        and webkitFaviconDatabaseSetIconURLForPageURL mishandled
        an unset pageURL, leading to an application crash
        (bsc#1095611)
    
      - CVE-2018-4133: A Safari cross-site scripting (XSS)
        vulnerability allowed remote attackers to inject
        arbitrary web script or HTML via a crafted URL
        (bsc#1088182).
    
      - CVE-2018-11713: The libsoup network backend of WebKit
        unexpectedly failed to use system proxy settings for
        WebSocket connections. As a result, users could be
        deanonymized by crafted websites via a WebSocket
        connection (bsc#1096060).
    
      - CVE-2018-11712: The libsoup network backend of WebKit
        failed to perform TLS certificate verification for
        WebSocket connections (bsc#1096061).
    
    This update for webkit2gtk3 fixes the following issues :
    
      - Fixed a crash when atk_object_ref_state_set is called on
        an AtkObject that's being destroyed (bsc#1088932).
    
      - Fixed crash when using Wayland with QXL/virtio
        (bsc#1079512)
    
      - Disable Gigacage if mmap fails to allocate in Linux.
    
      - Add user agent quirk for paypal website.
    
      - Properly detect compiler flags, needed libs, and
        fallbacks for usage of 64-bit atomic operations.
    
      - Fix a network process crash when trying to get cookies
        of about:blank page.
    
      - Fix UI process crash when closing the window under
        Wayland.
    
      - Fix several crashes and rendering issues.
    
      - Do TLS error checking on
        GTlsConnection::accept-certificate to finish the load
        earlier in case of errors.
    
      - Properly close the connection to the nested wayland
        compositor in the Web Process.
    
      - Avoid painting backing stores for zero-opacity layers.
    
      - Fix downloads started by context menu failing in some
        websites due to missing user agent HTTP header.
    
      - Fix video unpause when GStreamerGL is disabled.
    
      - Fix several GObject introspection annotations.
    
      - Update user agent quiks to fix Outlook.com and
        Chase.com.
    
      - Fix several crashes and rendering issues.
    
      - Improve error message when Gigacage cannot allocate
        virtual memory.
    
      - Add missing WebKitWebProcessEnumTypes.h to
        webkit-web-extension.h.
    
      - Improve web process memory monitor thresholds.
    
      - Fix a web process crash when the web view is created and
        destroyed quickly.
    
      - Fix a network process crash when load is cancelled while
        searching for stored HTTP auth credentials.
    
      - Fix the build when ENABLE_VIDEO, ENABLE_WEB_AUDIO and
        ENABLE_XSLT are disabled.
    
      - New API to retrieve and delete cookies with
        WebKitCookieManager.
    
      - New web process API to detect when form is submitted via
        JavaScript.
    
      - Several improvements and fixes in the touch/gestures
        support.
    
      - Support for the &ldquo;system&rdquo; CSS font family.
    
      - Complex text rendering improvements and fixes.
    
      - More complete and spec compliant WebDriver
        implementation.
    
      - Ensure DNS prefetching cannot be re-enabled if disabled
        by settings.
    
      - Fix seek sometimes not working.
    
      - Fix rendering of emojis that were using the wrong scale
        factor in some cases.
    
      - Fix rendering of combining enclosed keycap.
    
      - Fix rendering scale of some layers in HiDPI.
    
      - Fix a crash in Wayland when closing the web view.
    
      - Fix crashes upower crashes when running inside a chroot
        or on systems with broken dbus/upower.
    
      - Fix memory leaks in GStreamer media backend when using
        GStreamer 1.14.
    
      - Fix several crashes and rendering issues.
    
      - Add ENABLE_ADDRESS_SANITIZER to make it easier to build
        with asan support.
    
      - Fix a crash a under Wayland when using mesa software
        rasterization.
    
      - Make fullscreen video work again.
    
      - Fix handling of missing GStreamer elements.
    
      - Fix rendering when webm video is played twice.
    
      - Fix kinetic scrolling sometimes jumping around.
    
      - Fix build with ICU configured without collation support.
    
      - WebSockets use system proxy settings now (requires
        libsoup 2.61.90).
    
      - Show the context menu on long-press gesture.
    
      - Add support for Shift + mouse scroll to scroll
        horizontally.
    
      - Fix zoom gesture to actually zoom instead of changing
        the page scale.
    
      - Implement support for Graphics ARIA roles.
    
      - Make sleep inhibitors work under Flatpak.
    
      - Add get element CSS value command to WebDriver.
    
      - Fix a crash aftter a swipe gesture.
    
      - Fix several crashes and rendering issues.
    
      - Fix crashes due to duplicated symbols in
        libjavascriptcoregtk and libwebkit2gtk.
    
      - Fix parsing of timeout values in WebDriver.
    
      - Implement get timeouts command in WebDriver.
    
      - Fix deadlock in GStreamer video sink during shutdown
        when accelerated compositing is disabled.
    
      - Fix several crashes and rendering issues.
    
      - Add web process API to detect when form is submitted via
        JavaScript.
    
      - Add new API to replace
        webkit_form_submission_request_get_text_fields() that is
        now deprecated.
    
      - Add WebKitWebView::web-process-terminated signal and
        deprecate web-process-crashed.
    
      - Fix rendering issues when editing text areas.
    
      - Use FastMalloc based GstAllocator for GStreamer.
    
      - Fix web process crash at startup in bmalloc.
    
      - Fix several memory leaks in GStreamer media backend.
    
      - WebKitWebDriver process no longer links to
        libjavascriptcoregtk.
    
      - Fix several crashes and rendering issues.
    
      - Add new API to add, retrieve and delete cookies via
        WebKitCookieManager.
    
      - Add functions to WebSettings to convert font sizes
        between points and pixels.
    
      - Ensure cookie operations take effect when they happen
        before a web process has been spawned.
    
      - Automatically adjust font size when
        GtkSettings:gtk-xft-dpi changes.
    
      - Add initial resource load statistics support.
    
      - Add API to expose availability of certain editing
        commands in WebKitEditorState.
    
      - Add API to query whether a WebKitNavigationAction is a
        redirect or not.
    
      - Improve complex text rendering.
    
      - Add support for the 'system' CSS font family.
    
      - Disable USE_GSTREAMER_GL
    
    This update was imported from the SUSE:SLE-12-SP2:Update update
    project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1075775"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1077535"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1079512"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1088182"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1088932"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1092278"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1092279"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1092280"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1095611"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096060"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096061"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097693"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101999"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102530"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1104169"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected webkit2gtk3 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Safari Proxy Object Type Confusion');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libjavascriptcoregtk-4_0-18-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk-4_0-37-debuginfo-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwebkit2gtk3-lang");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-JavaScriptCore-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-WebKit2-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:typelib-1_0-WebKit2WebExtension-4_0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit-jsc-4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit-jsc-4-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk-4_0-injected-bundles");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk-4_0-injected-bundles-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-plugin-process-gtk2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:webkit2gtk3-plugin-process-gtk2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/10/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/10/26");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE42.3", reference:"libjavascriptcoregtk-4_0-18-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libjavascriptcoregtk-4_0-18-debuginfo-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libwebkit2gtk-4_0-37-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libwebkit2gtk-4_0-37-debuginfo-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libwebkit2gtk3-lang-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"typelib-1_0-JavaScriptCore-4_0-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"typelib-1_0-WebKit2-4_0-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"typelib-1_0-WebKit2WebExtension-4_0-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit-jsc-4-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit-jsc-4-debuginfo-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit2gtk-4_0-injected-bundles-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit2gtk-4_0-injected-bundles-debuginfo-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit2gtk3-debugsource-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit2gtk3-devel-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit2gtk3-plugin-process-gtk2-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"webkit2gtk3-plugin-process-gtk2-debuginfo-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-32bit-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libjavascriptcoregtk-4_0-18-debuginfo-32bit-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-32bit-2.20.3-11.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", cpu:"x86_64", reference:"libwebkit2gtk-4_0-37-debuginfo-32bit-2.20.3-11.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libjavascriptcoregtk-4_0-18 / libjavascriptcoregtk-4_0-18-32bit / etc");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3743-1.NASL
    descriptionA large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id111843
    published2018-08-17
    reporterUbuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111843
    titleUbuntu 16.04 LTS / 18.04 LTS : webkit2gtk vulnerabilities (USN-3743-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-3743-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(111843);
      script_version("1.5");
      script_cvs_date("Date: 2019/09/18 12:31:48");
    
      script_cve_id("CVE-2018-12911", "CVE-2018-4246", "CVE-2018-4261", "CVE-2018-4262", "CVE-2018-4263", "CVE-2018-4264", "CVE-2018-4265", "CVE-2018-4266", "CVE-2018-4267", "CVE-2018-4270", "CVE-2018-4272", "CVE-2018-4273", "CVE-2018-4278", "CVE-2018-4284");
      script_xref(name:"USN", value:"3743-1");
    
      script_name(english:"Ubuntu 16.04 LTS / 18.04 LTS : webkit2gtk vulnerabilities (USN-3743-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A large number of security issues were discovered in the WebKitGTK+
    Web and JavaScript engines. If a user were tricked into viewing a
    malicious website, a remote attacker could exploit a variety of issues
    related to web browser security, including cross-site scripting
    attacks, denial of service attacks, and arbitrary code execution.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/3743-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected libjavascriptcoregtk-4.0-18 and / or
    libwebkit2gtk-4.0-37 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.0-18");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libwebkit2gtk-4.0-37");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/06/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/08/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/17");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(16\.04|18\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04 / 18.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"16.04", pkgname:"libjavascriptcoregtk-4.0-18", pkgver:"2.20.5-0ubuntu0.16.04.1")) flag++;
    if (ubuntu_check(osver:"16.04", pkgname:"libwebkit2gtk-4.0-37", pkgver:"2.20.5-0ubuntu0.16.04.1")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"libjavascriptcoregtk-4.0-18", pkgver:"2.20.5-0ubuntu0.18.04.1")) flag++;
    if (ubuntu_check(osver:"18.04", pkgname:"libwebkit2gtk-4.0-37", pkgver:"2.20.5-0ubuntu0.18.04.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libjavascriptcoregtk-4.0-18 / libwebkit2gtk-4.0-37");
    }