Synopsis
The remote TencentOS Server 3 host is missing one or more security updates.
Description
The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2023:0081 advisory.
    Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:
      CVE-2022-2879:
      A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of     file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw     allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially     causing resource exhaustion or panic.
      CVE-2022-2880:
      A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query     parameters from the inbound request, including unparseable parameters rejected by net/http. This issue     could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value.
    After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound     request's form field is set after the reverse proxy. The director function returns, indicating that the     proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the     original query parameters unchanged.
      CVE-2022-27664:
      A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service     because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.
      CVE-2022-41715:
      A flaw was found in the golang package, where programs that compile regular expressions from untrusted     sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is     linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a     relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is     limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than     that are rejected. Routine use of regular expressions is unaffected.
      CVE-2022-41717:
      A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause     excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a     cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped,     an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open     connection.
Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: tencentos_TSSA_2023_0081.nasl
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:osbuild-composer
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 6/14/2023
Vulnerability Publication Date: 6/14/2023