Skip to content

Commit

Permalink
Updated to add state
Browse files Browse the repository at this point in the history
Updated to include state_ref in test
  • Loading branch information
wmunyan committed Jul 16, 2017
1 parent 49459a8 commit 59937a4
Showing 1 changed file with 46 additions and 45 deletions.
91 changes: 46 additions & 45 deletions ietf_99_hackathon/sacm-entry-oval-definitions.xml
Original file line number Diff line number Diff line change
@@ -1,46 +1,47 @@
<?xml version="1.0" encoding="UTF-8"?>
<oval-def:oval_definitions xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd">
<oval-def:generator>
<oval:schema_version xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5">5.10</oval:schema_version>
<oval:timestamp xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5">2017-07-15T11:40:00.000+02:00</oval:timestamp>
<oval-def:terms_of_use>Copyright (c) 2010, United States Government. All rights reserved. The contents of this file are subject to the license described in https://oval.cisecurity.org/terms.</oval-def:terms_of_use>
</oval-def:generator>
<oval-def:definitions>
<oval-def:definition id="oval:org.ietf.hackathon.sacm:def:1" class="vulnerability" version="1">
<oval-def:metadata>
<oval-def:title>Vulnerable Versions of Libtasn1 on Ubuntu 16.04</oval-def:title>
<oval-def:reference ref_id="CVE-2017-6891" source="CVE"/>
<oval-def:description>Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.</oval-def:description>
</oval-def:metadata>
<oval-def:notes>
<oval-def:note>This OVAL Definition will result in an error if there are no SWID tag files associated with libtasn1.</oval-def:note>
</oval-def:notes>
<oval-def:criteria>
<oval-def:criterion comment="Check if a vulnerable version of libtasn1 is installed." test_ref="oval:org.ietf.hackathon.sacm:tst:1"/>
</oval-def:criteria>
</oval-def:definition>
</oval-def:definitions>
<oval-def:tests>
<xmlfilecontent_test xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" check_existence="at_least_one_exists" comment="Check if a vulnerable version of libtasn1 is installed." check="at least one" id="oval:org.ietf.hackathon.sacm:tst:1" version="1">
<object object_ref="oval:org.ietf.hackathon.sacm:obj:1"/>
</xmlfilecontent_test>
</oval-def:tests>
<oval-def:objects>
<xmlfilecontent_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" comment="Get all SWID tag files associated with libtasn1.." id="oval:org.ietf.hackathon.sacm:obj:1" version="1">
<path>C:\_Development\Projects\SACM-VS\SWID</path>
<filename operation="pattern match">.*\.swidtag$</filename>
<xpath>/*[local-name()='SoftwareIdentity'][contains(@name,'libtasn1')]/@version</xpath>
</xmlfilecontent_object>
</oval-def:objects>
<oval-def:states>
<xmlfilecontent_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" comment="Check if the value matches any of the vulnerable versions of libtasn1." id="oval:org.ietf.hackathon.sacm:ste:2" version="1">
<value_of var_check="at least one" var_ref="oval:org.ietf.hackathon.sacm:var:2"/>
</xmlfilecontent_state>
</oval-def:states>
<oval-def:variables>
<oval-def:constant_variable datatype="string" comment="Vulnerable versions of libasn1." id="oval:org.ietf.hackathon.sacm:var:2" version="1">
<oval-def:value>4.7-3</oval-def:value>
<oval-def:value>4.7-3ubuntu0.16.04.1</oval-def:value>
</oval-def:constant_variable>
</oval-def:variables>
</oval-def:oval_definitions>
<oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:win-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#windows" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5">
<generator>
<oval:schema_version>5.10</oval:schema_version>
<oval:timestamp>2017-07-15T11:40:00.000+02:00</oval:timestamp>
<terms_of_use>Copyright (c) 2010, United States Government. All rights reserved. The contents of this file are subject to the license described in https://oval.cisecurity.org/terms.</terms_of_use>
</generator>
<definitions>
<definition id="oval:org.ietf.hackathon.sacm:def:1" version="1" class="vulnerability">
<metadata>
<title>Vulnerable Versions of Libtasn1 on Ubuntu 16.04</title>
<reference ref_id="CVE-2017-6891" source="CVE" />
<description>Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.</description>
</metadata>
<notes>
<note>This OVAL Definition will result in an error if there are no SWID tag files associated with libtasn1.</note>
</notes>
<criteria>
<criterion comment="Check if a vulnerable version of libtasn1 is installed." test_ref="oval:org.ietf.hackathon.sacm:tst:1"/>
</criteria>
</definition>
</definitions>
<tests>
<xmlfilecontent_test id="oval:org.ietf.hackathon.sacm:tst:1" version="1" comment="Check if a vulnerable version of libtasn1 is installed." check_existence="at_least_one_exists" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent">
<object object_ref="oval:org.ietf.hackathon.sacm:obj:1"/>
<state state_ref="oval:org.ietf.hackathon.sacm:ste:2"/>
</xmlfilecontent_test>
</tests>
<objects>
<xmlfilecontent_object id="oval:org.ietf.hackathon.sacm:obj:1" version="1" comment="Get all SWID tag files associated with libtasn1.." xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent">
<path>C:\_Development\Projects\SACM-VS\SWID</path>
<filename operation="pattern match">.*\.swidtag$</filename>
<xpath>/*[local-name()='SoftwareIdentity'][contains(@name,'libtasn1')]/@version</xpath>
</xmlfilecontent_object>
</objects>
<states>
<xmlfilecontent_state id="oval:org.ietf.hackathon.sacm:ste:2" version="1" comment="Check if the value matches any of the vulnerable versions of libtasn1." xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent">
<value_of var_ref="oval:org.ietf.hackathon.sacm:var:2" var_check="at least one"/>
</xmlfilecontent_state>
</states>
<variables>
<constant_variable id="oval:org.ietf.hackathon.sacm:var:2" version="1" datatype="string" comment="Vulnerable versions of libasn1.">
<value>4.7-3</value>
<value>4.7-3ubuntu0.16.04.1</value>
</constant_variable>
</variables>
</oval_definitions>

0 comments on commit 59937a4

Please sign in to comment.