code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(125340);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/17");
script_cve_id("CVE-2019-2692", "CVE-2019-1559");
script_bugtraq_id(107925, 107174);
script_name(english:"Oracle MySQL Connectors Multiple Vulnerabilities (Apr 2019 CPU)");
script_summary(english:"Checks installed patch/version info.");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Oracle MySQL Connectors installed on the remote host is 8.0.x prior to 8.0.16 or 5.3.x prior to 5.3.13.
It is, therefore, affected by multiple vulnerabilities as noted in the April 2019 Critical Patch Update advisory:
- An unspecified vulnerability in Connector/J subcomponent. An authenticated attacker can exploit this issue, to
take a full control over the target system. (CVE-2019-2692)
- A padding oracle vulnerability exists in Connector/ODBC (OpenSSL) subcomponent. If the application is configured
to use 'non-stitched' ciphersuits, a remote attacker can trigger a fatal protocol error condition. The vulnerable
application presents a padding related error messages which allow attacker to decrypt data. (CVE-2019-1559)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.");
# https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9166970d");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patches according to the April 2019 Oracle Critical Patch Update advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1559");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/16");
script_set_attribute(attribute:"patch_publication_date", value:"2019/04/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/22");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:connector");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_connectors_version_nix.nbin", "mysql_connectors_version_win.nbin");
script_require_keys("installed_sw/MySQL Connector");
exit(0);
}
include('vcf.inc');
appname = 'MySQL Connector';
app_info = vcf::get_app_info(app:appname);
product = tolower(app_info['Product']);
vcf::check_granularity(app_info:app_info, sig_segments:3);
if ('odbc' >< product)
constraints = [
{'min_version': '5.3.0', 'fixed_version': '5.3.13'},
{'min_version': '8.0.0', 'fixed_version': '8.0.16'}
];
else if ('java' >< product)
constraints = [
{'min_version': '8.0.0', 'fixed_version': '8.0.16'}
];
else
audit(AUDIT_PACKAGE_NOT_AFFECTED, product);
vcf::check_version_and_report(app_info: app_info, constraints: constraints, severity: SECURITY_WARNING);
|