EulerOS 2.0 SP3 : patch (EulerOS-SA-2018-1184)

Medium Nessus Plugin ID 110848

Synopsis

The remote EulerOS host is missing a security update.

Description

According to the version of the patch package installed, the EulerOS installation on the remote host is affected by the following vulnerability :

- GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.(CVE-2018-1000156)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected patch package.

See Also

http://www.nessus.org/u?4ee31ad0

Plugin Details

Severity: Medium

ID: 110848

File Name: EulerOS_SA-2018-1184.nasl

Version: 1.3

Type: local

Published: 2018/07/03

Modified: 2018/08/29

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSSv3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:patch, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Patch Publication Date: 2018/06/17

Reference Information

CVE: CVE-2018-1000156