[Openvas-commits] r1421 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Sep 24 17:42:42 CEST 2008


Author: reinke
Date: 2008-09-24 17:42:31 +0200 (Wed, 24 Sep 2008)
New Revision: 1421

Added:
   trunk/openvas-plugins/scripts/deb_1634_2.nasl
   trunk/openvas-plugins/scripts/deb_1638_1.nasl
   trunk/openvas-plugins/scripts/deb_1639_1.nasl
   trunk/openvas-plugins/scripts/deb_1640_1.nasl
   trunk/openvas-plugins/scripts/deb_1641_1.nasl
   trunk/openvas-plugins/scripts/deb_1642_1.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox34.nasl
   trunk/openvas-plugins/scripts/freebsd_gallery3.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin15.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl
   trunk/openvas-plugins/scripts/freebsd_proftpd4.nasl
   trunk/openvas-plugins/scripts/freebsd_squirrelmail5.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/ChangeLog	2008-09-24 15:42:31 UTC (rev 1421)
@@ -1,3 +1,12 @@
+2008-09-24  Thomas Reinke <reinke at securityspace.com>
+
+	* deb_1634_2.nasl deb_1638_1.nasl deb_1639_1.nasl
+	  deb_1640_1.nasl deb_1641_1.nasl deb_1642_1.nasl
+	  freebsd_firefox34.nasl freebsd_gallery3.nasl
+	  freebsd_phpMyAdmin15.nasl freebsd_phpMyAdmin16.nasl
+	  freebsd_proftpd4.nasl freebsd_squirrelmail5.nasl
+	  New scripts
+
 2008-09-24  Jan-Oliver Wagner <jan-oliver.wagner at intevation.de>
 
 	* template.nasl: make clear the oid setting should not be present as long

Added: trunk/openvas-plugins/scripts/deb_1634_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1634_2.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/deb_1634_2.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,98 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1634-2 (wordnet)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61643);
+ script_cve_id("CVE-2008-2149");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1634-2 (wordnet)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to wordnet
+announced via advisory DSA 1634-2.
+
+A regression was discovered in the original patch addressing this issue
+for WordNet, which this update fixes. For reference the text of the
+original advisory follows.
+
+Rob Holland discovered several programming errors in WordNet, an
+electronic lexical database of the English language. These flaws could
+allow arbitrary code execution when used with untrusted input, for
+example when WordNet is in use as a back end for a web application.
+
+For the stable distribution (etch), these problems have been fixed in
+version 1:2.1-4+etch2.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 1:3.0-13.
+
+We recommend that you upgrade your wordnet package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201634-2
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1634-2 (wordnet)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"wordnet-base", ver:"2.1-4+etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wordnet-sense-index", ver:"2.1-4+etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wordnet", ver:"2.1-4+etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wordnet-dev", ver:"2.1-4+etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1638_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1638_1.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/deb_1638_1.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,108 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1638-1 (openssh)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61639);
+ script_cve_id("CVE-2008-4109", "CVE-2006-5051");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1638-1 (openssh)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to openssh
+announced via advisory DSA 1638-1.
+
+It has been discovered that the signal handler implementing the login
+timeout in Debian's version of the OpenSSH server uses functions which
+are not async-signal-safe, leading to a denial of service
+vulnerability (CVE-2008-4109).
+
+The problem was originally corrected in OpenSSH 4.4p1 (CVE-2006-5051),
+but the patch backported to the version released with etch was
+incorrect.
+
+Systems affected by this issue suffer from lots of zombie sshd
+processes.  Processes stuck with a [net] process title have also been
+observed.  Over time, a sufficient number of processes may accumulate
+such that further login attempts are impossible.  Presence of these
+processes does not indicate active exploitation of this vulnerability.
+It is possible to trigger this denial of service condition by accident.
+
+For the stable distribution (etch), this problem has been fixed in
+version 4.3p2-9etch3.
+
+For the unstable distribution (sid) and the testing distribution
+(lenny), this problem has been fixed in version 4.6p1-1.
+
+We recommend that you upgrade your openssh packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201638-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1638-1 (openssh)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"ssh-krb5", ver:"4.3p2-9etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ssh", ver:"4.3p2-9etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"openssh-client", ver:"4.3p2-9etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ssh-askpass-gnome", ver:"4.3p2-9etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"openssh-server", ver:"4.3p2-9etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1639_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1639_1.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/deb_1639_1.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,84 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1639-1 (twiki)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61640);
+ script_cve_id("CVE-2008-3195");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1639-1 (twiki)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to twiki
+announced via advisory DSA 1639-1.
+
+It was discovered that twiki, a web based collaboration platform,
+didn't properly sanitize the image parameter in its configuration script.
+This could allow remote users to execute arbitrary commands upon the
+system, or read any files which were readable by the webserver user.
+
+For the stable distribution (etch), this problem has been fixed in version
+1:4.0.5-9.1etch1.
+
+For the unstable distribution (sid), this problem will be fixed soon.
+
+We recommend that you upgrade your twiki package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201639-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1639-1 (twiki)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"twiki", ver:"4.0.5-9.1etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1640_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1640_1.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/deb_1640_1.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1640-1 (python-django)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61642);
+ script_cve_id("CVE-2008-3909", "CVE-2007-5712");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1640-1 (python-django)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to python-django
+announced via advisory DSA 1640-1.
+
+Simon Willison discovered that in Django, a Python web framework, the
+feature to retain HTTP POST data during user reauthentication allowed
+a remote attacker to perform unauthorized modification of data through
+cross site request forgery. The is possible regardless of the Django
+plugin to prevent cross site request forgery being enabled. The Common
+Vulnerabilities and Exposures project identifies this issue as
+CVE-2008-3909.
+
+In this update the affected feature is disabled; this is in accordance
+with upstream's preferred solution for this situation.
+
+This update takes the opportunity to also include a relatively minor
+denial of service attack in the internationalisaton framework, known
+as CVE-2007-5712.
+
+For the stable distribution (etch), these problems have been fixed in
+version 0.95.1-1etch2.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 1.0-1.
+
+We recommend that you upgrade your python-django package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201640-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1640-1 (python-django)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"python-django", ver:"0.95.1-1etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1641_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1641_1.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/deb_1641_1.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,104 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1641-1 (phpmyadmin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61644);
+ script_cve_id("CVE-2008-3197", "CVE-2008-3456", "CVE-2008-3457", "CVE-2008-4096");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1641-1 (phpmyadmin)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to phpmyadmin
+announced via advisory DSA 1641-1.
+
+Several remote vulnerabilities have been discovered in phpMyAdmin, a
+tool to administrate MySQL databases over the web. The Common
+Vulnerabilities and Exposures project identifies the following problems:
+
+CVE-2008-4096
+
+Remote authenticated users could execute arbitrary code on the
+host running phpMyAdmin through manipulation of a script parameter.
+
+CVE-2008-3457
+
+Cross site scripting through the setup script was possible in
+rare circumstances.
+
+CVE-2008-3456
+
+Protection has been added against remote websites loading phpMyAdmin
+into a frameset.
+
+CVE-2008-3197
+
+Cross site request forgery allowed remote attackers to create a new
+database, but not perform any other action on it.
+
+For the stable distribution (etch), these problems have been fixed in
+version 4:2.9.1.1-8.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 4:2.11.8.1-2.
+
+We recommend that you upgrade your phpmyadmin package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201641-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1641-1 (phpmyadmin)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"phpmyadmin", ver:"2.9.1.1-8", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1642_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1642_1.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/deb_1642_1.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1642-1 (horde3)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61641);
+ script_cve_id("CVE-2008-3823");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1642-1 (horde3)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to horde3
+announced via advisory DSA 1642-1.
+
+Will Drewry discovered that the Horde, allows remote attackers to send
+an email with a crafted MIME attachment filename attribute to perform
+cross site scripting.
+
+For the stable distribution (etch), this problem has been fixed in
+version 3.1.3-4etch4.
+
+For the testing distribution (lenny), this problem has been fixed in
+version 3.2.1+debian0-2+lenny1.
+
+For the unstable distribution (sid), this problem will be fixed soon.
+
+We recommend that you upgrade your horde3 package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201642-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1642-1 (horde3)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"horde3", ver:"3.1.3-4etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_firefox34.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox34.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/freebsd_firefox34.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,157 @@
+#
+#VID 2273879e-8a2f-11dd-a6fe-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 2273879e-8a2f-11dd-a6fe-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61654);
+ if(NASL_LEVEL>=2191) {
+     script_cve_id("CVE-2008-0016", "CVE-2008-3835", "CVE-2008-3836", "CVE-2008-3837", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-4061", "CVE-2008-4062", "CVE-2008-4063", "CVE-2008-4064", "CVE-2008-4065", "CVE-2008-4067", "CVE-2008-4068", "CVE-2008-4069");
+ } else {
+     script_cve_id("CVE-2008-0016", "CVE-2008-3835", "CVE-2008-3836", "CVE-2008-3837", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-4061");
+ }
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: firefox";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   firefox
+   linux-firefox
+   firefox3
+   seamonkey
+   linux-seamonkey
+   thunderbird
+   linux-thunderbird
+   flock
+   linux-flock
+   linux-firefox-devel
+   linux-seamonkey-devel
+
+For details, please visit the referenced security advisories.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.mozilla.org/security/announce/2008/mfsa2008-37.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-38.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-39.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-40.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-41.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-42.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-43.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-44.html
+http://www.mozilla.org/security/announce/2008/mfsa2008-45.html
+http://www.vuxml.org/freebsd/2273879e-8a2f-11dd-a6fe-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: firefox";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"2.0.0.17,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"2.0.0.17")<0) {
+    security_note(0, data:"Package linux-firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"firefox3");
+if(!isnull(bver) && revcomp(a:bver, b:"3.0.2,1")<0) {
+    security_note(0, data:"Package firefox3 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.12")<0) {
+    security_note(0, data:"Package seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.12")<0) {
+    security_note(0, data:"Package linux-seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"thunderbird");
+if(!isnull(bver) && revcomp(a:bver, b:"2.0.17")<0) {
+    security_note(0, data:"Package thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-thunderbird");
+if(!isnull(bver) && revcomp(a:bver, b:"2.0.17")<0) {
+    security_note(0, data:"Package linux-thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"flock");
+if(!isnull(bver) && revcomp(a:bver, b:"0")>0) {
+    security_note(0, data:"Package flock version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-flock");
+if(!isnull(bver) && revcomp(a:bver, b:"0")>0) {
+    security_note(0, data:"Package linux-flock version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-firefox-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"0")>0) {
+    security_note(0, data:"Package linux-firefox-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-seamonkey-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"0")>0) {
+    security_note(0, data:"Package linux-seamonkey-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_gallery3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_gallery3.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/freebsd_gallery3.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,89 @@
+#
+#VID fc9e73b2-8685-11dd-bb64-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID fc9e73b2-8685-11dd-bb64-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61658);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: gallery";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   gallery
+   gallery2
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/advisories/31912/
+http://secunia.com/advisories/31858/
+http://www.vuxml.org/freebsd/fc9e73b2-8685-11dd-bb64-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: gallery";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"gallery");
+if(!isnull(bver) && revcomp(a:bver, b:"1.5.9")<0) {
+    security_note(0, data:"Package gallery version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"gallery2");
+if(!isnull(bver) && revcomp(a:bver, b:"2.2.6")<0) {
+    security_note(0, data:"Package gallery2 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin15.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin15.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,82 @@
+#
+#VID 150e4548-8950-11dd-a6fe-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 150e4548-8950-11dd-a6fe-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61657);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: phpMyAdmin";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: phpMyAdmin
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/Advisories/31974/
+http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-8
+http://www.vuxml.org/freebsd/150e4548-8950-11dd-a6fe-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: phpMyAdmin";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"phpMyAdmin");
+if(!isnull(bver) && revcomp(a:bver, b:"2.11.9.2")<0) {
+    security_note(0, data:"Package phpMyAdmin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin16.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,82 @@
+#
+#VID 74bf1594-8493-11dd-bb64-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 74bf1594-8493-11dd-bb64-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61659);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: phpMyAdmin";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: phpMyAdmin
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/Advisories/31884/
+http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-7
+http://www.vuxml.org/freebsd/74bf1594-8493-11dd-bb64-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: phpMyAdmin";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"phpMyAdmin");
+if(!isnull(bver) && revcomp(a:bver, b:"2.11.9.1")<0) {
+    security_note(0, data:"Package phpMyAdmin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_proftpd4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_proftpd4.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/freebsd_proftpd4.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,95 @@
+#
+#VID 0f51f2c9-8956-11dd-a6fe-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 0f51f2c9-8956-11dd-a6fe-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61656);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: proftpd, proftpd-mysql";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   proftpd
+   proftpd-mysql
+   proftpd-devel
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/advisories/31930/
+http://bugs.proftpd.org/show_bug.cgi?id=3115
+http://www.vuxml.org/freebsd/0f51f2c9-8956-11dd-a6fe-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: proftpd, proftpd-mysql";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"proftpd");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3.2rc2")<0) {
+    security_note(0, data:"Package proftpd version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"proftpd-mysql");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3.2rc2")<0) {
+    security_note(0, data:"Package proftpd-mysql version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"proftpd-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3.20080922")<0) {
+    security_note(0, data:"Package proftpd-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_squirrelmail5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_squirrelmail5.nasl	2008-09-24 14:49:38 UTC (rev 1420)
+++ trunk/openvas-plugins/scripts/freebsd_squirrelmail5.nasl	2008-09-24 15:42:31 UTC (rev 1421)
@@ -0,0 +1,83 @@
+#
+#VID a0afb4b9-89a1-11dd-a65b-00163e000016
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID a0afb4b9-89a1-11dd-a65b-00163e000016
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(61655);
+ script_cve_id("CVE-2008-3663");
+ script_bugtraq_id(31321);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: squirrelmail";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: squirrelmail
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://seclists.org/bugtraq/2008/Sep/0239.html
+http://www.vuxml.org/freebsd/a0afb4b9-89a1-11dd-a65b-00163e000016.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: squirrelmail";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"squirrelmail");
+if(!isnull(bver) && revcomp(a:bver, b:"1.4.15_1")<=0) {
+    security_note(0, data:"Package squirrelmail version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list