Synopsis
The remote TencentOS Server 3 host is missing one or more security updates.
Description
The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:0205 advisory.
    Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:
    CVE-2014-1745:
    Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before     35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other     impact via vectors that trigger removal of an SVGFontFaceElement object, related to     core/svg/SVGFontFaceElement.cpp.
    CVE-2023-32359:
    A flaw was found in webkitgtk where a user's password may be read aloud by a text-to-speech accessibility     feature.
    CVE-2023-39928:
    A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially     crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code     execution. A user would need to to visit a malicious webpage to trigger this vulnerability.
    CVE-2023-40414:
    A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10,     iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary     code execution.
    CVE-2023-41983:
    The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari     17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-     of-service.
    CVE-2023-42852:
    A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS     10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may     lead to arbitrary code execution.
    CVE-2023-42883:
    A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious     image, which could result in a denial of service.
    CVE-2023-42890:
    A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML     content in WebKit, which could result in memory corruption and arbitrary code execution on the target     system.
    CVE-2024-23206:
    An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS     17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. A     maliciously crafted webpage may be able to fingerprint the user.
    CVE-2024-23213:
    The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS     17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content     may lead to arbitrary code execution.
Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: tencentos_TSSA_2024_0205.nasl
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:webkit2gtk3
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 5/22/2024
Vulnerability Publication Date: 5/22/2024