From c77eac476e17ee3c8aadbcdb17733eb6c496e92f Mon Sep 17 00:00:00 2001 From: ChenFuLong <1565349964@qq.com> Date: Fri, 15 Nov 2024 16:02:41 +0800 Subject: [PATCH 1/2] =?UTF-8?q?SSTS=E6=96=B0=E5=A2=9E=E8=A7=84=E5=88=99?= =?UTF-8?q?=EF=BC=9ACVE-2024-39417&CVE-2024-4603?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../06/CVE-2024-39417/CVE-2024-39417.yara | 15 +++ .../TestCaseInfo-CVE-2024-39417.json | 118 ++++++++++++++++++ .../2024/08/CVE-2024-4603/CVE-2024-4603.yara | 15 +++ .../TestCaseInfo-CVE-2024-4603.json | 118 ++++++++++++++++++ 4 files changed, 266 insertions(+) create mode 100644 zh/security-vulntest/testcase/2024/06/CVE-2024-39417/CVE-2024-39417.yara create mode 100644 zh/security-vulntest/testcase/2024/06/CVE-2024-39417/TestCaseInfo-CVE-2024-39417.json create mode 100644 zh/security-vulntest/testcase/2024/08/CVE-2024-4603/CVE-2024-4603.yara create mode 100644 zh/security-vulntest/testcase/2024/08/CVE-2024-4603/TestCaseInfo-CVE-2024-4603.json diff --git a/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/CVE-2024-39417.yara b/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/CVE-2024-39417.yara new file mode 100644 index 0000000..2f45359 --- /dev/null +++ b/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/CVE-2024-39417.yara @@ -0,0 +1,15 @@ +import "console" + +rule TestCaseRule_VE_2024_39417 +{ + meta: + date="2024-11-14" + file="" + + strings: + + $fix={07 46 01 38 01 28 56 46 EC D8} + + condition: + $fix and console.log("TestCaseRule_CVE-2024-39417 testcase pass") + } diff --git a/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/TestCaseInfo-CVE-2024-39417.json b/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/TestCaseInfo-CVE-2024-39417.json new file mode 100644 index 0000000..8e8c295 --- /dev/null +++ b/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/TestCaseInfo-CVE-2024-39417.json @@ -0,0 +1,118 @@ +{ + "month": "2024-06", + "release_time": "", + "vulnerabilities": [ + { + "month": "2024-06", + "vul_id": { + "cve": "CVE-2024-39417", + "openharmony-sa": "" + }, + "severity": "low", + "vul_description": { + "zh": "Adobe Commerce版本2.4.7-p1、2.4.6-p6、2.4.5-p8、2.4.4-p9及更早版本存在一个不当授权漏洞,可能导致安全功能绕过。", + "en": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9, and earlier have an improper authorization vulnerability that could lead to security features being bypassed." + }, + "vul_impact": { + "zh": "低权限攻击者可利用此漏洞绕过安全措施并披露少量信息。利用此问题不需要用户交互。", + "en": "A low-privilege attacker could exploit this vulnerability to bypass security measures and disclose small amounts of information. No user interaction is required to exploit this problem." + }, + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-06.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2024/2024-06.md" + }, + "patch_info": { + "3.0.x": { + "patch_url": [ + "https://gitee.com/openharmony/third_party_mbedtls/pulls/106" + ], + "patch_file": [ + "https://gitee.com/openharmony/third_party_mbedtls/pulls/106.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/third_party_mbedtls/pulls/106.diff" + ] + } + }, + "affected_projects": "third_party_mbedtls", + "object_type": "", + "affected_versions": [ + "4.0.x" + ], + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib/libmbedtls.z.so" + ], + "yara_rules": [ + "TestCaseRule_CVE_2024_39417.yara" + ] + } + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + } + } + } + ] +} \ No newline at end of file diff --git a/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/CVE-2024-4603.yara b/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/CVE-2024-4603.yara new file mode 100644 index 0000000..d239902 --- /dev/null +++ b/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/CVE-2024-4603.yara @@ -0,0 +1,15 @@ +import "console" + +rule TestCaseRule_CVE_2024_4603 +{ + meta: + date="2024-11-14" + file="/openharmony/openharmony5.0/lib.unstripped2/thirdparty/openssl/libcrypto_openssl.z.so" + + strings: + + $fix={70 B5 05 46 80 68 0C 46 48 B1 E9 68 39 B1 FE F0 D2 EA 42 F2 10 71 88 42 16 DD 67 25 00 E0} + + condition: + $fix and console.log("TestCaseRule_CVE_2024_4603 testcase pass") + } diff --git a/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/TestCaseInfo-CVE-2024-4603.json b/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/TestCaseInfo-CVE-2024-4603.json new file mode 100644 index 0000000..c5e1870 --- /dev/null +++ b/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/TestCaseInfo-CVE-2024-4603.json @@ -0,0 +1,118 @@ +{ + "month": "2024-08", + "release_time": "", + "vulnerabilities": [ + { + "month": "2024-08", + "vul_id": { + "cve": "CVE-2024-4603", + "openharmony-sa": "" + }, + "severity": "medium", + "vul_description": { + "zh": "检查过长的 DSA 密钥或参数可能非常慢。", + "en": "Checking excessively long DSA keys or parameters may be very slow." + }, + "vul_impact": { + "zh": "使用 EVP_PKEY_param_check() 函数的应用程序或 EVP_PKEY_public_check() 检查 DSA 公钥或 DSA 参数经历长时间的延误。正在检查的键或参数的位置是从不受信任的来源获得的,这可能会导致拒绝服务。", + "en": "Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service." + }, + "disclosure": { + "zh": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-08.md", + "en": "https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2024/2024-08.md" + }, + "patch_info": { + "3.0.x": { + "patch_url": [ + "https://gitee.com/openharmony/third_party_openssl/pulls/200" + ], + "patch_file": [ + "https://gitee.com/openharmony/third_party_openssl/pulls/200.patch" + ], + "diff_file": [ + "https://gitee.com/openharmony/third_party_openssl/pulls/200.diff" + ] + } + }, + "affected_projects": "third_party_openssl", + "object_type": "", + "affected_versions": [ + "4.0.0-4.1.0" + ], + "affected_device": { + "mini": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + "small": { + "liteos": { + "rics-v": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + }, + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + }, + "standard": { + "linux": { + "arm": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": true, + "yara": { + "affected_files": [ + "/system/lib/libcrypto_openssl.z.so" + ], + "yara_rules": [ + "TestCaseRule_CVE_2024_4603.yara" + ] + } + } + } + }, + "arm64": { + "scan_strategy": { + "ssts": { + "enable": false + }, + "ists": { + "enable": false + } + } + } + } + } + } + } + ] +} \ No newline at end of file -- Gitee From c17e87e5d8b22c46cdda9cd820204f5162d5df2d Mon Sep 17 00:00:00 2001 From: ChenFuLong <1565349964@qq.com> Date: Fri, 15 Nov 2024 16:06:57 +0800 Subject: [PATCH 2/2] =?UTF-8?q?SSTS=E6=96=B0=E5=A2=9E=E8=A7=84=E5=88=99?= =?UTF-8?q?=EF=BC=9ACVE-2024-39417&CVE-2024-4603?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../{CVE-2024-39417.yara => TestCaseInfo-CVE-2024-39417.yara} | 0 .../{CVE-2024-4603.yara => TestCaseInfo-CVE-2024-4603.yara} | 0 2 files changed, 0 insertions(+), 0 deletions(-) rename zh/security-vulntest/testcase/2024/06/CVE-2024-39417/{CVE-2024-39417.yara => TestCaseInfo-CVE-2024-39417.yara} (100%) rename zh/security-vulntest/testcase/2024/08/CVE-2024-4603/{CVE-2024-4603.yara => TestCaseInfo-CVE-2024-4603.yara} (100%) diff --git a/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/CVE-2024-39417.yara b/zh/security-vulntest/testcase/2024/06/CVE-2024-39417/TestCaseInfo-CVE-2024-39417.yara similarity index 100% rename from zh/security-vulntest/testcase/2024/06/CVE-2024-39417/CVE-2024-39417.yara rename to zh/security-vulntest/testcase/2024/06/CVE-2024-39417/TestCaseInfo-CVE-2024-39417.yara diff --git a/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/CVE-2024-4603.yara b/zh/security-vulntest/testcase/2024/08/CVE-2024-4603/TestCaseInfo-CVE-2024-4603.yara similarity index 100% rename from zh/security-vulntest/testcase/2024/08/CVE-2024-4603/CVE-2024-4603.yara rename to zh/security-vulntest/testcase/2024/08/CVE-2024-4603/TestCaseInfo-CVE-2024-4603.yara -- Gitee