



--
You received this message because you are subscribed to a topic in the Google Groups "Wazuh mailing list" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/wazuh/stsUmwMTglQ/unsubscribe.
To unsubscribe from this group and all its topics, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/1660e802-1295-4445-bbab-86cb301d5b7bn%40googlegroups.com.
service wazuh-manager stop.local_internal_options.conf file and add wazuh_modules.debug=2. More information here: https://documentation.wazuh.com/current/user-manual/reference/internal-options.html?mode#wazuh-modules/var/ossec/queue/vulnerabilities/cve.db.service wazuh-manager start and wait some seconds.cat /var/ossec/logs/ossec.log | grep "wazuh-modulesd:" > /var/ossec/output.txt.To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/3f5f9319-5f5b-4684-8c7c-9f100a7a772dn%40googlegroups.com.
Hello Swapnils,
If you are still having problems joining Slack, let me know, and we will check if there is any problem, thanks.
I have been checking the logs you send us and I don’t see any errors, everything seems to be working as expected.
As you say, the Microsoft feed is trying to update every 3600 seconds:
2022/09/30 09:01:53 wazuh-modulesd:download[164515] wm_download.c:234 at wm_download_dispatch(): DEBUG: Cannot download file 'tmp/req-1194832711' from URL: 'https://feed.wazuh.com/vulnerability-detector/windows/msu-updates.json.gz'
2022/09/30 09:01:57 wazuh-modulesd:download[164515] wm_download.c:230 at wm_download_dispatch(): DEBUG: Downloading 'https://feed.wazuh.com/vulnerability-detector/windows/msu-updates.json.gz' to 'tmp/req-267157764'
2022/09/30 09:06:35 wazuh-modulesd:download[164515] wm_download.c:234 at wm_download_dispatch(): DEBUG: Cannot download file 'tmp/req-267157764' from URL: 'https://feed.wazuh.com/vulnerability-detector/windows/msu-updates.json.gz'
2022/09/30 09:06:35 wazuh-modulesd:vulnerability-detector[164515] wm_vuln_detector.c:4549 at wm_vuldet_fetch_feed(): WARNING: (5500): The 'Microsoft Security Update' database could not be fetched.
2022/09/30 09:06:35 wazuh-modulesd:vulnerability-detector[164515] wm_vuln_detector.c:4569 at wm_vuldet_check_feed(): DEBUG: (5521): Failed when updating 'msu provider' database. Retrying in '3600' seconds.
2022/09/30 09:06:35 wazuh-modulesd:vulnerability-detector[164515] wm_vuln_detector.c:5191 at wm_vuldet_main(): ERROR: (5513): CVE database could not be updated.
Since everything seems fine I decided to download the nvd-feed2018.json.gz feed to check the content of the CVE CVE-2018-2814 which we know affects the package you have installed jdk:1.8.0:update162. Inside this feed, I find the following:
"operator" : "OR",
"children" : [ ],
"cpe_match" : [ {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jre:1.10.0:*:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.10.0:*:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
"cpe_name" : [ ]
}, {
"vulnerable" : true,
"cpe23Uri" : "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
"cpe_name" : [ ]
}
As you can see they name the package jdk:1.8.0:update162:*:*:*:*:*:*:*:*:*:* but in our case the version of it is named as 2000:1.8.0_162-fcs which does not match the cpe23Uri key. It is possible that this is due to the installation method of the package, in any case I need to investigate more if this is the real issue. I will check with the team this information to see if this is the real issue, since in the logs we can’t see anything unusual.
As soon as I get an answer, I will contact you.
Regards,
Adrián Peña
Thank you again Adrian!
I am glad to know that there are no configuration errors.
One small query here-
While scanning through Tenable/Qualys, I have seen in their VA reports that it detects unzipped tar/uncompressed files of Java/Tomcat/Redis etc. Here in this case, JDK FCS is an rpm install; but I could see another java binaries residing too on this box. Here are the details -
# /opt/tomcat/bin/version.sh
Using CATALINA_BASE: /opt/tomcat
Using CATALINA_HOME: /opt/tomcat
Using CATALINA_TMPDIR: /opt/tomcat/temp
Using JRE_HOME: /
Using CLASSPATH: /opt/tomcat/bin/bootstrap.jar:/opt/tomcat/bin/tomcat-juli.jar
Server version: Company Web
Server built: Apr 21 2017 14:14:48 IST
Server number: 1.1
OS Name: Linux
OS Version: 3.10.0-1160.71.1.el7.x86_64
Architecture: amd64
JVM Version: 1.8.0_162-b12
JVM Vendor: Oracle Corporation
# /opt/jdk/java/bin/java -version
java version "1.8.0_121"
Java(TM) SE Runtime Environment (build 1.8.0_121-b13)
Java HotSpot(TM) 64-Bit Server VM (build 25.121-b13, mixed mode)
Does Wazuh detects such vulnerable binaries?
Regards, swapnils
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/8ab7b9be-2ed8-45e5-8f20-5432f121f80bn%40googlegroups.com.