GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011

critical Nessus Plugin ID 79962

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201412-09 (Multiple packages, Multiple vulnerabilities fixed in 2011)

Vulnerabilities have been discovered in the packages listed below.
Please review the CVE identifiers in the Reference section for details.
FMOD Studio PEAR Mail LVM2 GnuCash xine-lib Last.fm Scrobbler WebKitGTK+ shadow tool suite PEAR unixODBC Resource Agents mrouted rsync XML Security Library xrdb Vino OProfile syslog-ng sFlow Toolkit GNOME Display Manager libsoup CA Certificates Gitolite QtCreator Racer Impact :

A context-dependent attacker may be able to gain escalated privileges, execute arbitrary code, cause Denial of Service, obtain sensitive information, or otherwise bypass security restrictions.
Workaround :

There are no known workarounds at this time.

Solution

All FMOD Studio users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=media-libs/fmod-4.38.00' All PEAR Mail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-php/PEAR-Mail-1.2.0' All LVM2 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-fs/lvm2-2.02.72' All GnuCash users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-office/gnucash-2.4.4' All xine-lib users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=media-libs/xine-lib-1.1.19' All Last.fm Scrobbler users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=media-sound/lastfmplayer-1.5.4.26862-r3' All WebKitGTK+ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-libs/webkit-gtk-1.2.7' All shadow tool suite users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-apps/shadow-4.1.4.3' All PEAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-php/PEAR-PEAR-1.9.2-r1' All unixODBC users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/unixODBC-2.3.0-r1' All Resource Agents users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=sys-cluster/resource-agents-1.0.4-r1' All mrouted users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/mrouted-3.9.5' All rsync users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/rsync-3.0.8' All XML Security Library users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-libs/xmlsec-1.2.17' All xrdb users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=x11-apps/xrdb-1.0.9' All Vino users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/vino-2.32.2' All OProfile users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-util/oprofile-0.9.6-r1' All syslog-ng users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-admin/syslog-ng-3.2.4' All sFlow Toolkit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-analyzer/sflowtool-3.20' All GNOME Display Manager users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=gnome-base/gdm-3.8.4-r3' All libsoup users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-libs/libsoup-2.34.3' All CA Certificates users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-misc/ca-certificates-20110502-r1' All Gitolite users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-vcs/gitolite-1.5.9.1' All QtCreator users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-util/qt-creator-2.1.0' Gentoo has discontinued support for Racer. We recommend that users unmerge Racer:
# emerge --unmerge 'games-sports/racer-bin' NOTE: This is a legacy GLSA. Updates for all affected architectures have been available since 2012. It is likely that your system is already no longer affected by these issues.

See Also

https://security.gentoo.org/glsa/201412-09

Plugin Details

Severity: Critical

ID: 79962

File Name: gentoo_GLSA-201412-09.nasl

Version: 1.9

Type: local

Published: 12/15/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:pear-mail, p-cpe:/a:gentoo:linux:pear-pear, p-cpe:/a:gentoo:linux:ca-certificates, p-cpe:/a:gentoo:linux:fmod, p-cpe:/a:gentoo:linux:gdm, p-cpe:/a:gentoo:linux:gitolite, p-cpe:/a:gentoo:linux:gnucash, p-cpe:/a:gentoo:linux:lastfmplayer, p-cpe:/a:gentoo:linux:libsoup, p-cpe:/a:gentoo:linux:lvm2, p-cpe:/a:gentoo:linux:mrouted, p-cpe:/a:gentoo:linux:oprofile, p-cpe:/a:gentoo:linux:qt-creator, p-cpe:/a:gentoo:linux:racer-bin, p-cpe:/a:gentoo:linux:resource-agents, p-cpe:/a:gentoo:linux:rsync, p-cpe:/a:gentoo:linux:sflowtool, p-cpe:/a:gentoo:linux:shadow, p-cpe:/a:gentoo:linux:syslog-ng, p-cpe:/a:gentoo:linux:unixodbc, p-cpe:/a:gentoo:linux:vino, p-cpe:/a:gentoo:linux:webkit-gtk, p-cpe:/a:gentoo:linux:xine-lib, p-cpe:/a:gentoo:linux:xmlsec, p-cpe:/a:gentoo:linux:xrdb, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/11/2014

Vulnerability Publication Date: 8/15/2007

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Racer v0.5.3 Beta 5 Buffer Overflow)

Reference Information

CVE: CVE-2007-4370, CVE-2009-4023, CVE-2009-4111, CVE-2010-0778, CVE-2010-1780, CVE-2010-1782, CVE-2010-1783, CVE-2010-1784, CVE-2010-1785, CVE-2010-1786, CVE-2010-1787, CVE-2010-1788, CVE-2010-1790, CVE-2010-1791, CVE-2010-1792, CVE-2010-1793, CVE-2010-1807, CVE-2010-1812, CVE-2010-1814, CVE-2010-1815, CVE-2010-2526, CVE-2010-2901, CVE-2010-3255, CVE-2010-3257, CVE-2010-3259, CVE-2010-3362, CVE-2010-3374, CVE-2010-3389, CVE-2010-3812, CVE-2010-3813, CVE-2010-3999, CVE-2010-4042, CVE-2010-4197, CVE-2010-4198, CVE-2010-4204, CVE-2010-4206, CVE-2010-4492, CVE-2010-4493, CVE-2010-4577, CVE-2010-4578, CVE-2011-0007, CVE-2011-0465, CVE-2011-0482, CVE-2011-0721, CVE-2011-0727, CVE-2011-0904, CVE-2011-0905, CVE-2011-1072, CVE-2011-1097, CVE-2011-1144, CVE-2011-1425, CVE-2011-1572, CVE-2011-1760, CVE-2011-1951, CVE-2011-2471, CVE-2011-2472, CVE-2011-2473, CVE-2011-2524, CVE-2011-3365, CVE-2011-3366, CVE-2011-3367

BID: 43672, 44204, 44206, 44241, 44349, 44359, 44563, 44954, 44960, 45170, 45390, 45715, 45718, 45719, 45720, 45721, 45722, 45788, 46426, 46473, 46605, 47063, 47064, 47135, 47189, 47650, 47652, 25297, 37081, 37395, 41148, 41976, 42033, 42034, 42035, 42036, 42037, 42038, 42041, 42042, 42043, 42044, 42045, 42046, 42049, 43047, 43079, 43081, 43083, 47681, 47800, 48241, 48926, 49925

CWE: 94

GLSA: 201412-09

IAVA: 2017-A-0098