[Openvas-commits] r6194 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Dec 18 14:56:49 CET 2009


Author: felix
Date: 2009-12-18 14:56:45 +0100 (Fri, 18 Dec 2009)
New Revision: 6194

Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/gb_ms08-030.nasl
   trunk/openvas-plugins/scripts/mssql_version.nasl
   trunk/openvas-plugins/scripts/p-smash.nasl
   trunk/openvas-plugins/scripts/remote-MS03-034.nasl
   trunk/openvas-plugins/scripts/remote-pwcrack-ncrack-telnet.nasl
   trunk/openvas-plugins/scripts/secpod_reg.inc
   trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl
   trunk/openvas-plugins/scripts/smb_reg_service_pack.nasl
Log:
* scripts/gb_ms08-030.nasl, scripts/mssql_version.nasl,
scripts/p-smash.nasl, scripts/remote-MS03-034.nasl,
scripts/remote-pwcrack-ncrack-telnet.nasl, scripts/secpod_reg.inc,
scripts/smb_nt_ms02-005.nasl, scripts/smb_reg_service_pack.nasl:
Whitespace cosmetics.


Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/ChangeLog	2009-12-18 13:56:45 UTC (rev 6194)
@@ -1,3 +1,11 @@
+2009-12-18  Felix Wolfsteller <felix.wolfsteller at intevation.de>
+
+	* scripts/gb_ms08-030.nasl, scripts/mssql_version.nasl,
+	scripts/p-smash.nasl, scripts/remote-MS03-034.nasl,
+	scripts/remote-pwcrack-ncrack-telnet.nasl, scripts/secpod_reg.inc,
+	scripts/smb_nt_ms02-005.nasl, scripts/smb_reg_service_pack.nasl:
+	Whitespace cosmetics.
+
 2009-12-17 Michael Meyer <michael.meyer at intevation.de>
 
 	* scripts/family_connections_detect.nasl,

Modified: trunk/openvas-plugins/scripts/gb_ms08-030.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms08-030.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/gb_ms08-030.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -116,7 +116,7 @@
   r = smb_session_setup(soc:soc, login:login, password:pass,
                         domain:domain, prot:prot);
   if(!r)
-  { 
+  {
     close(soc);
     exit(0);
   }

Modified: trunk/openvas-plugins/scripts/mssql_version.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mssql_version.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/mssql_version.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -14,7 +14,7 @@
 # CVE-2000-0603  CAN-2000-1082  CAN-2000-1083
 # CAN-2000-1084  CAN-2000-1085  CAN-2001-0509
 # CAN-2000-1086
-	       
+
 if(description)
 {
  script_id(11217);
@@ -26,9 +26,9 @@
  script_cve_id("CAN-2000-1081", "CVE-2000-0202", "CVE-2000-0485",
  	       "CAN-2000-1087", "CAN-2000-1088", "CAN-2002-0982",
  	       "CAN-2001-0542", "CVE-2001-0344" );
-	       
+
  script_xref(name:"IAVA", value:"2002-B-0004");
-  
+
  desc = "
 The plugin attempts a smb connection to read version from
 the registry key 
@@ -188,7 +188,7 @@
  fsize = smb_get_file_size(socket:socket, uid:uid, tid:tid, fid:fid);
  if  ( fsize < 180224 ) 
 	off = 0;
- else 
+ else
 	off = fsize - 180224;
 
 
@@ -262,7 +262,7 @@
  }
 }
 
-  
+
 key = "SOFTWARE\Microsoft\MSSQLServer\MSSQLServer\CurrentVersion";
 item = "CSDVersion";
 

Modified: trunk/openvas-plugins/scripts/p-smash.nasl
===================================================================
--- trunk/openvas-plugins/scripts/p-smash.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/p-smash.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -18,7 +18,7 @@
  script_version ("$Revision$");
  name = "p-smash DoS (ICMP 9 flood)";
  script_name(name);
- 
+
  desc = "It was possible to crash the remote 
 machine by flooding it with ICMP type 9 packets.
 
@@ -35,17 +35,17 @@
 
 
  script_description(desc);
- 
+
  summary = "Flood the remote machine with ICMP 9";
  script_summary(summary);
- 
+
  script_category(ACT_KILL_HOST);
-  
+
  script_copyright("This script is Copyright (C) 2002 Michel Arboi");
  family = "Denial of Service";
 
  script_family(family);
-	       
+
 # script_add_preference(name:"Flood length :", 	type:"entry", value:"5000");	
 # script_add_preference(name:"Data length :", 	type:"entry", value:"500");	
  exit(0);

Modified: trunk/openvas-plugins/scripts/remote-MS03-034.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-MS03-034.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/remote-MS03-034.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -46,7 +46,7 @@
 script_cve_id("CAN-2003-0661");
 name = "Microsoft MS03-034 security check";
 script_name(name);
- 
+ 
 desc = "
 Under certain conditions, the response to a NetBT Name Service query may, in addition to the typical reply, 
 contain random data from the target system's memory. This data could, for example, be a segment of HTML 
@@ -150,11 +150,9 @@
 			if(matrix[j] != matrix[i]) {
 				# Report Microsoft Windows 'NetBT Name Service' Information Leakage Vulnerability (MS03-034)
 				security_warning(port);
-				exit(0);
+				exit(0);
 			}
 		}	
 	}
 	
 }
-
-

Modified: trunk/openvas-plugins/scripts/remote-pwcrack-ncrack-telnet.nasl
===================================================================
--- trunk/openvas-plugins/scripts/remote-pwcrack-ncrack-telnet.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/remote-pwcrack-ncrack-telnet.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -49,7 +49,7 @@
  script_require_keys("Secret/pwcrack/logins_file", "Secret/pwcrack/passwords_file");
  script_require_ports("Services/telnet", 23);
  script_dependencies("remote-pwcrack-options.nasl", "find_service.nes", "doublecheck_std_services.nasl");
- if(defined_func("script_mandatory_keys")) 
+ if(defined_func("script_mandatory_keys"))
   script_mandatory_keys("Tools/Present/ncrack");
  exit(0);
 }

Modified: trunk/openvas-plugins/scripts/secpod_reg.inc
===================================================================
--- trunk/openvas-plugins/scripts/secpod_reg.inc	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/secpod_reg.inc	2009-12-18 13:56:45 UTC (rev 6194)
@@ -64,7 +64,7 @@
 		else {
 			return 0;
 		}
-  	}   
+  	}
 
   	else if(win2k && ("5.0" >< winVer))
   	{
@@ -121,7 +121,7 @@
 		else {
 			return 0;
 		}
-  	}   
+  	}
 	return -1; 
  }
 
@@ -160,7 +160,7 @@
 			        "Windows NT/CurrentVersion/HotFix)/(KB|Q|M)" + name,
           		string:key) ){
         		return 0;
-		}	
+		}
  	}
  	return 1;
  }

Modified: trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/smb_nt_ms02-005.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -6,7 +6,7 @@
 #
 # Also supercedes MS02-005, MS02-047, MS02-027, MS02-023, MS02-015, MS01-015
 #
-# 
+#
 
 if(description)
 {
@@ -20,9 +20,9 @@
  script_xref(name:"IAVA", value:"2004-A-0016");
  script_xref(name:"IAVA", value:"2005-A-0006");
  name = "IE 5.01 5.5 6.0 Cumulative patch (890923)";
- 
+
  script_name(name);
- 
+
  desc = "
 The July 2004 Cumulative Patch for IE is not applied on the remote host.
 
@@ -36,13 +36,13 @@
  script_description(desc); 
  summary = "Determines whether the hotfix 890923 is installed";
  script_summary(summary);
- 
+
  script_category(ACT_GATHER_INFO);
- 
+
  script_copyright("This script is Copyright (C) 2002 Michael Scheidell");
  family = "Windows : Microsoft Bulletins";
  script_family(family);
- 
+
  script_dependencies("secpod_reg_enum.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);
@@ -54,7 +54,7 @@
 
 # 883939 superseedes MS05-020
 if ( hotfix_missing(name:"883939.*") == 0 &&
-     "883939" >!<  get_kb_item("SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Internet Settings/MinorVersion") ) exit(0); 
+     "883939" >!<  get_kb_item("SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Internet Settings/MinorVersion") ) exit(0);
 
 if ( hotfix_check_sp(nt:7, xp:3, win2k:5, win2003:1) <= 0 ) exit(0);
 
@@ -71,7 +71,7 @@
     if ( hotfix_missing(name:"890923.*") == 0 ) exit(0); 
     if ( "890923" >!< minorversion ) missing = "890923 (MS05-020)";
    }
-   else if ( hotfix_missing(name:"890923.*") > 0 ) 
+   else if ( hotfix_missing(name:"890923.*") > 0 )
      missing = "890923 (MS05-020)";
    else exit(0);
 

Modified: trunk/openvas-plugins/scripts/smb_reg_service_pack.nasl
===================================================================
--- trunk/openvas-plugins/scripts/smb_reg_service_pack.nasl	2009-12-18 13:46:28 UTC (rev 6193)
+++ trunk/openvas-plugins/scripts/smb_reg_service_pack.nasl	2009-12-18 13:56:45 UTC (rev 6194)
@@ -41,18 +41,18 @@
 }
 
 
- include("smb_nt.inc"); 
+ include("smb_nt.inc");
 
  access = get_kb_item("SMB/registry_access");
  if(!access){
-	exit(0);
+        exit(0);
  }
 
  winVal = registry_get_sz(key:"SOFTWARE\Microsoft\Windows NT\CurrentVersion",
                          item:"CurrentVersion");
 
  if(winVal){
-    	set_kb_item(name:"SMB/WindowsVersion", value:winVal);
+        set_kb_item(name:"SMB/WindowsVersion", value:winVal);
  }
 
  csdVer = registry_get_sz(key:"SOFTWARE\Microsoft\Windows NT\CurrentVersion",
@@ -78,6 +78,6 @@
                 set_kb_item(name:"SMB/Win2003/ServicePack", value:csdVer);
         }
 
-	report = string("The remote Windows ", winVal, " is running ", csdVer, "\n");
+        report = string("The remote Windows ", winVal, " is running ", csdVer, "\n");
         security_note(data:report, port:port);
  }



More information about the Openvas-commits mailing list