[Openvas-commits] r6288 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Dec 30 21:59:03 CET 2009


Author: reinke
Date: 2009-12-30 21:58:43 +0100 (Wed, 30 Dec 2009)
New Revision: 6288

Added:
   trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1680.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1681.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1682.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1688.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1689.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl
   trunk/openvas-plugins/scripts/deb_1951_1.nasl
   trunk/openvas-plugins/scripts/deb_1952_1.nasl
   trunk/openvas-plugins/scripts/deb_1954_1.nasl
   trunk/openvas-plugins/scripts/deb_1955_1.nasl
   trunk/openvas-plugins/scripts/deb_1956_1.nasl
   trunk/openvas-plugins/scripts/deb_1957_1.nasl
   trunk/openvas-plugins/scripts/deb_1958_1.nasl
   trunk/openvas-plugins/scripts/deb_1960_1.nasl
   trunk/openvas-plugins/scripts/deb_1961_1.nasl
   trunk/openvas-plugins/scripts/deb_1963_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12229.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12305.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12506.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12517.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12562.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12575.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12606.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12725.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12753.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12813.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12950.nasl
   trunk/openvas-plugins/scripts/fcore_2009_12975.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13181.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13195.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13196.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13216.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13236.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13250.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13291.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13333.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13361.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13362.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13363.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13364.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13366.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13381.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13393.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13466.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13504.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13592.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13598.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13610.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13634.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13694.nasl
   trunk/openvas-plugins/scripts/fcore_2009_13700.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal515.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox43.nasl
   trunk/openvas-plugins/scripts/freebsd_freeradius5.nasl
   trunk/openvas-plugins/scripts/freebsd_fuser.nasl
   trunk/openvas-plugins/scripts/freebsd_monkey.nasl
   trunk/openvas-plugins/scripts/freebsd_php56.nasl
   trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl
   trunk/openvas-plugins/scripts/freebsd_tptest.nasl
   trunk/openvas-plugins/scripts/glsa_200912_02.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_146_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_189_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_244_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_334.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_335.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_336.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_339.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_340.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_341.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_342.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_344.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1615.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1619.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1642.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1659.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1673.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1680.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1681.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1682.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_062.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_063.nasl
   trunk/openvas-plugins/scripts/ubuntu_873_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_874_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_875_1.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/ovcesa2009_1625.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1646.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1648.nasl
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/ChangeLog	2009-12-30 20:58:43 UTC (rev 6288)
@@ -1,3 +1,102 @@
+2009-12-14  Thomas Reinke <reinke at securityspace.com>
+
+	* scripts/deb_1951_1.nasl,
+	scripts/deb_1952_1.nasl,
+	scripts/deb_1954_1.nasl,
+	scripts/deb_1955_1.nasl,
+	scripts/deb_1956_1.nasl,
+	scripts/deb_1957_1.nasl,
+	scripts/deb_1958_1.nasl,
+	scripts/deb_1960_1.nasl,
+	scripts/deb_1961_1.nasl,
+	scripts/deb_1963_1.nasl,
+	scripts/freebsd_drupal515.nasl,
+	scripts/freebsd_firefox43.nasl,
+	scripts/freebsd_freeradius5.nasl,
+	scripts/freebsd_fuser.nasl,
+	scripts/freebsd_monkey.nasl,
+	scripts/freebsd_php56.nasl,
+	scripts/freebsd_postgresql-client.nasl,
+	scripts/freebsd_tptest.nasl,
+	scripts/glsa_200912_02.nasl,
+	scripts/suse_sa_2009_062.nasl,
+	scripts/suse_sa_2009_063.nasl,
+	scripts/ubuntu_873_1.nasl,
+	scripts/ubuntu_874_1.nasl,
+	scripts/ubuntu_875_1.nasl,
+	scripts/mdksa_2009_146_1.nasl,
+	scripts/mdksa_2009_189_1.nasl,
+	scripts/mdksa_2009_244_1.nasl,
+	scripts/mdksa_2009_334.nasl,
+	scripts/mdksa_2009_335.nasl,
+	scripts/mdksa_2009_336.nasl,
+	scripts/mdksa_2009_339.nasl,
+	scripts/mdksa_2009_340.nasl,
+	scripts/mdksa_2009_341.nasl,
+	scripts/mdksa_2009_342.nasl,
+	scripts/mdksa_2009_344.nasl,
+	scripts/RHSA_2009_1670.nasl,
+	scripts/RHSA_2009_1671.nasl,
+	scripts/RHSA_2009_1673.nasl,
+	scripts/RHSA_2009_1674.nasl,
+	scripts/RHSA_2009_1680.nasl,
+	scripts/RHSA_2009_1681.nasl,
+	scripts/RHSA_2009_1682.nasl,
+	scripts/RHSA_2009_1688.nasl,
+	scripts/RHSA_2009_1689.nasl,
+	scripts/RHSA_2009_1694.nasl,
+	scripts/fcore_2009_12229.nasl,
+	scripts/fcore_2009_12305.nasl,
+	scripts/fcore_2009_12506.nasl,
+	scripts/fcore_2009_12517.nasl,
+	scripts/fcore_2009_12562.nasl,
+	scripts/fcore_2009_12575.nasl,
+	scripts/fcore_2009_12606.nasl,
+	scripts/fcore_2009_12725.nasl,
+	scripts/fcore_2009_12753.nasl,
+	scripts/fcore_2009_12813.nasl,
+	scripts/fcore_2009_12950.nasl,
+	scripts/fcore_2009_12975.nasl,
+	scripts/fcore_2009_13181.nasl,
+	scripts/fcore_2009_13195.nasl,
+	scripts/fcore_2009_13196.nasl,
+	scripts/fcore_2009_13216.nasl,
+	scripts/fcore_2009_13236.nasl,
+	scripts/fcore_2009_13250.nasl,
+	scripts/fcore_2009_13291.nasl,
+	scripts/fcore_2009_13333.nasl,
+	scripts/fcore_2009_13361.nasl,
+	scripts/fcore_2009_13362.nasl,
+	scripts/fcore_2009_13363.nasl,
+	scripts/fcore_2009_13364.nasl,
+	scripts/fcore_2009_13366.nasl,
+	scripts/fcore_2009_13381.nasl,
+	scripts/fcore_2009_13393.nasl,
+	scripts/fcore_2009_13466.nasl,
+	scripts/fcore_2009_13504.nasl,
+	scripts/fcore_2009_13592.nasl,
+	scripts/fcore_2009_13598.nasl,
+	scripts/fcore_2009_13610.nasl,
+	scripts/fcore_2009_13634.nasl,
+	scripts/fcore_2009_13694.nasl,
+	scripts/fcore_2009_13700.nasl,
+	scripts/ovcesa2009_1615.nasl,
+	scripts/ovcesa2009_1619.nasl,
+	scripts/ovcesa2009_1620.nasl,
+	scripts/ovcesa2009_1625.nasl,
+	scripts/ovcesa2009_1642.nasl,
+	scripts/ovcesa2009_1646.nasl,
+	scripts/ovcesa2009_1648.nasl,
+	scripts/ovcesa2009_1659.nasl,
+	scripts/ovcesa2009_1670.nasl,
+	scripts/ovcesa2009_1671.nasl,
+	scripts/ovcesa2009_1673.nasl,
+	scripts/ovcesa2009_1674.nasl,
+	scripts/ovcesa2009_1680.nasl,
+	scripts/ovcesa2009_1681.nasl,
+	scripts/ovcesa2009_1682.nasl:
+	New scripts.
+
 2009-12-23 Michael Meyer <michael.meyer at intevation.de>
 
 	* scripts/smb_nt.inc:

Added: trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1670.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,157 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1670 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66534);
+ script_cve_id("CVE-2009-3612", "CVE-2009-3620", "CVE-2009-3621", "CVE-2009-3726");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1670");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1670.
+
+The kernel packages contain the Linux kernel, the core of any Linux
+operating system.
+
+Security fixes:
+
+* NULL pointer dereference flaws in the r128 driver. Checks to test if the
+Concurrent Command Engine state was initialized were missing in private
+IOCTL functions. An attacker could use these flaws to cause a local denial
+of service or escalate their privileges. (CVE-2009-3620, Important)
+
+* a NULL pointer dereference flaw in the NFSv4 implementation. Several
+NFSv4 file locking functions failed to check whether a file had been opened
+on the server before performing locking operations on it. A local user on a
+system with an NFSv4 share mounted could possibly use this flaw to cause a
+denial of service or escalate their privileges. (CVE-2009-3726, Important)
+
+* a flaw in tcf_fill_node(). A certain data structure in this function was
+not initialized properly before being copied to user-space. This could lead
+to an information leak. (CVE-2009-3612, Moderate)
+
+* unix_stream_connect() did not check if a UNIX domain socket was in the
+shutdown state. This could lead to a deadlock. A local, unprivileged user
+could use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)
+
+Knowledgebase DOC-20536 has steps to mitigate NULL pointer dereference
+flaws.
+
+Users should upgrade to these updated packages, which contain backported
+patches to correct these issues. The system must be rebooted for this
+update to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1670.html
+http://www.redhat.com/security/updates/classification/#important
+http://kbase.redhat.com/faq/docs/DOC-20536
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1670");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE", rpm:"kernel-PAE~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-debuginfo", rpm:"kernel-PAE-debuginfo~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-devel", rpm:"kernel-PAE-devel~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen-debuginfo", rpm:"kernel-xen-debuginfo~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen-devel", rpm:"kernel-xen-devel~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump-debuginfo", rpm:"kernel-kdump-debuginfo~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump-devel", rpm:"kernel-kdump-devel~2.6.18~164.9.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1671.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,137 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1671 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66535);
+ script_cve_id("CVE-2009-2910", "CVE-2009-3613", "CVE-2009-3620", "CVE-2009-3621");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1671");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1671.
+
+The kernel packages contain the Linux kernel, the core of any Linux
+operating system.
+
+This update fixes the following security issues:
+
+* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
+kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
+space exhaustion and a system crash. An attacker on the local network could
+trigger this flaw by using jumbo frames for large amounts of network
+traffic. (CVE-2009-3613, Important)
+
+* NULL pointer dereference flaws were found in the r128 driver in the Linux
+kernel. Checks to test if the Concurrent Command Engine state was
+initialized were missing in private IOCTL functions. An attacker could use
+these flaws to cause a local denial of service or escalate their
+privileges. (CVE-2009-3620, Important)
+
+* an information leak was found in the Linux kernel. On AMD64 systems,
+32-bit processes could access and read certain 64-bit registers by
+temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)
+
+* the unix_stream_connect() function in the Linux kernel did not check if a
+UNIX domain socket was in the shutdown state. This could lead to a
+deadlock. A local, unprivileged user could use this flaw to cause a denial
+of service. (CVE-2009-3621, Moderate)
+
+Users should upgrade to these updated packages, which contain backported
+patches to correct these issues. The system must be rebooted for this
+update to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1671.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1671");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem", rpm:"kernel-hugemem~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem-devel", rpm:"kernel-hugemem-devel~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU", rpm:"kernel-xenU~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU-devel", rpm:"kernel-xenU-devel~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp", rpm:"kernel-largesmp~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp-devel", rpm:"kernel-largesmp-devel~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.9~89.0.18.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1673.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,148 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1673 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66536);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3983", "CVE-2009-3984");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1673");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1673.
+
+SeaMonkey is an open source Web browser, email and newsgroup client, IRC
+chat client, and HTML editor.
+
+Several flaws were found in the processing of malformed web content. A web
+page containing malicious content could cause SeaMonkey to crash or,
+potentially, execute arbitrary code with the privileges of the user running
+SeaMonkey. (CVE-2009-3979)
+
+A flaw was found in the SeaMonkey NT Lan Manager (NTLM) authentication
+protocol implementation. If an attacker could trick a local user that has
+NTLM credentials into visiting a specially-crafted web page, they could
+send arbitrary requests, authenticated with the user's NTLM credentials, to
+other applications on the user's system. (CVE-2009-3983)
+
+A flaw was found in the way SeaMonkey displayed the SSL location bar
+indicator. An attacker could create an unencrypted web page that appears
+to be encrypted, possibly tricking the user into believing they are
+visiting a secure page. (CVE-2009-3984)
+
+All SeaMonkey users should upgrade to these updated packages, which correct
+these issues. After installing the update, SeaMonkey must be restarted for
+the changes to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1673.html
+http://www.redhat.com/security/updates/classification/#critical
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1673");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-nspr", rpm:"seamonkey-nspr~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-nspr-devel", rpm:"seamonkey-nspr-devel~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-nss", rpm:"seamonkey-nss~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-nss-devel", rpm:"seamonkey-nss-devel~1.0.9~0.48.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~51.el4_8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1674.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,129 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1674 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66537);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1674");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1674.
+
+Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
+Runtime environment for Mozilla Firefox.
+
+Several flaws were found in the processing of malformed web content. A web
+page containing malicious content could cause Firefox to crash or,
+potentially, execute arbitrary code with the privileges of the user running
+Firefox. (CVE-2009-3979, CVE-2009-3981, CVE-2009-3986)
+
+A flaw was found in the Firefox NT Lan Manager (NTLM) authentication
+protocol implementation. If an attacker could trick a local user that has
+NTLM credentials into visiting a specially-crafted web page, they could
+send arbitrary requests, authenticated with the user's NTLM credentials, to
+other applications on the user's system. (CVE-2009-3983)
+
+A flaw was found in the way Firefox displayed the SSL location bar
+indicator. An attacker could create an unencrypted web page that appears to
+be encrypted, possibly tricking the user into believing they are visiting a
+secure page. (CVE-2009-3984)
+
+A flaw was found in the way Firefox displayed blank pages after a user
+navigates to an invalid address. If a user visits an attacker-controlled
+web page that results in a blank page, the attacker could inject content
+into that blank page, possibly tricking the user into believing they are
+viewing a legitimate page. (CVE-2009-3985)
+
+For technical details regarding these flaws, refer to the Mozilla security
+advisories for Firefox 3.0.16. You can find a link to the Mozilla
+advisories in the References section of this errata.
+
+All Firefox users should upgrade to these updated packages, which contain
+Firefox version 3.0.16, which corrects these issues. After installing the
+update, Firefox must be restarted for the changes to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1674.html
+http://www.redhat.com/security/updates/classification/#critical
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.16
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1674");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~4.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.0.16~4.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~1.el5_4", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.0.16~1.el5_4", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.16~2.el5_4", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-debuginfo", rpm:"xulrunner-debuginfo~1.9.0.16~2.el5_4", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.0.16~2.el5_4", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.16~2.el5_4", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1680.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1680.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1680.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1680 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66538);
+ script_cve_id("CVE-2009-4035");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1680");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1680.
+
+Xpdf is an X Window System based viewer for Portable Document Format (PDF)
+files.
+
+Petr Gajdos and Christian Kornacker of SUSE reported a buffer overflow flaw
+in Xpdf's Type 1 font parser. A specially-crafted PDF file with an embedded
+Type 1 font could cause Xpdf to crash or, possibly, execute arbitrary code
+when opened. (CVE-2009-4035)
+
+Users are advised to upgrade to this updated package, which contains a
+backported patch to correct this issue.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1680.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1680");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.00~23.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-debuginfo", rpm:"xpdf-debuginfo~3.00~23.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1681.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1681.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1681.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1681 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66539);
+ script_cve_id("CVE-2009-4035");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1681");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1681.
+
+GPdf is a viewer for Portable Document Format (PDF) files.
+
+Petr Gajdos and Christian Kornacker of SUSE reported a buffer overflow flaw
+in GPdf's Type 1 font parser. A specially-crafted PDF file with an embedded
+Type 1 font could cause GPdf to crash or, possibly, execute arbitrary code
+when opened. (CVE-2009-4035)
+
+Users are advised to upgrade to this updated package, which contains a
+backported patch to correct this issue.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1681.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1681");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gpdf", rpm:"gpdf~2.8.2~7.7.2.el4_8.6", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gpdf-debuginfo", rpm:"gpdf-debuginfo~2.8.2~7.7.2.el4_8.6", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1682.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1682.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1682.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1682 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66540);
+ script_cve_id("CVE-2009-4035");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1682");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1682.
+
+The kdegraphics packages contain applications for the K Desktop
+Environment, including KPDF, a viewer for Portable Document Format (PDF)
+files.
+
+Petr Gajdos and Christian Kornacker of SUSE reported a buffer overflow flaw
+in KPDF's Type 1 font parser. A specially-crafted PDF file with an embedded
+Type 1 font could cause KPDF to crash or, possibly, execute arbitrary code
+when opened. (CVE-2009-4035)
+
+Users are advised to upgrade to these updated packages, which contain a
+backported patch to correct this issue.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1682.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1682");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics", rpm:"kdegraphics~3.3.1~17.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-debuginfo", rpm:"kdegraphics-debuginfo~3.3.1~17.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-devel", rpm:"kdegraphics-devel~3.3.1~17.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1688.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1688.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1688.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,99 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1688 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66541);
+ script_cve_id("CVE-2009-4133");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1688");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1688.
+
+Condor is a specialized workload management system for compute-intensive
+jobs. It provides a job queuing mechanism, scheduling policy, priority
+scheme, and resource monitoring and management.
+
+A flaw was found in the way Condor managed jobs. This could allow a user
+that is authorized to submit jobs into Condor to queue a job as if it were
+submitted by a different local user, potentially leading to unauthorized
+access to that user's account. (CVE-2009-4133)
+
+Note: Condor will not run jobs as root; therefore, this flaw cannot lead to
+a compromise of the root user account.
+
+All Red Hat Enterprise MRG 1.2 users are advised to upgrade to these
+updated packages, which contain a backported patch to correct this issue.
+Condor must be restarted for the update to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1688.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1688");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"condor", rpm:"condor~7.4.1~0.7.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-debuginfo", rpm:"condor-debuginfo~7.4.1~0.7.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-kbdd", rpm:"condor-kbdd~7.4.1~0.7.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-qmf-plugins", rpm:"condor-qmf-plugins~7.4.1~0.7.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1689.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1689.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1689.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,102 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1689 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66542);
+ script_cve_id("CVE-2009-4133");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1689");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1689.
+
+Condor is a specialized workload management system for compute-intensive
+jobs. It provides a job queuing mechanism, scheduling policy, priority
+scheme, and resource monitoring and management.
+
+A flaw was found in the way Condor managed jobs. This could allow a user
+that is authorized to submit jobs into Condor to queue a job as if it were
+submitted by a different local user, potentially leading to unauthorized
+access to that user's account. (CVE-2009-4133)
+
+Note: Condor will not run jobs as root; therefore, this flaw cannot lead to
+a compromise of the root user account.
+
+All Red Hat Enterprise MRG 1.2 users are advised to upgrade to these
+updated packages, which contain a backported patch to correct this issue.
+Condor must be restarted for the update to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1689.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1689");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"condor", rpm:"condor~7.4.1~0.7.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-debuginfo", rpm:"condor-debuginfo~7.4.1~0.7.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-kbdd", rpm:"condor-kbdd~7.4.1~0.7.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-qmf-plugins", rpm:"condor-qmf-plugins~7.4.1~0.7.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"condor-vm-gahp", rpm:"condor-vm-gahp~7.4.1~0.7.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1694.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,131 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1694 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66543);
+ script_cve_id("CVE-2009-0217", "CVE-2009-3865", "CVE-2009-3866", "CVE-2009-3867", "CVE-2009-3868", "CVE-2009-3869", "CVE-2009-3871", "CVE-2009-3872", "CVE-2009-3873", "CVE-2009-3874", "CVE-2009-3875", "CVE-2009-3876", "CVE-2009-3877");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1694");
+
+ desc = "The remote host is missing updates announced in
+advisory RHSA-2009:1694.
+
+The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and
+the IBM Java 2 Software Development Kit.
+
+This update fixes several vulnerabilities in the IBM Java 2 Runtime
+Environment and the IBM Java 2 Software Development Kit. These
+vulnerabilities are summarized on the IBM Security alerts page listed in
+the References section. (CVE-2009-0217, CVE-2009-3865, CVE-2009-3866,
+CVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,
+CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)
+
+All users of java-1.6.0-ibm are advised to upgrade to these updated
+packages, containing the IBM 1.6.0 SR7 Java release. All running instances
+of IBM Java must be restarted for the update to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1694.html
+http://www.redhat.com/security/updates/classification/#critical
+http://www.ibm.com/developerworks/java/jdk/alerts/
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1694");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1.6.0-ibm", rpm:"java-1.6.0-ibm~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-demo", rpm:"java-1.6.0-ibm-demo~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-devel", rpm:"java-1.6.0-ibm-devel~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-javacomm", rpm:"java-1.6.0-ibm-javacomm~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-jdbc", rpm:"java-1.6.0-ibm-jdbc~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-plugin", rpm:"java-1.6.0-ibm-plugin~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-src", rpm:"java-1.6.0-ibm-src~1.6.0.7~1jpp.3.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm", rpm:"java-1.6.0-ibm~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-accessibility", rpm:"java-1.6.0-ibm-accessibility~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-demo", rpm:"java-1.6.0-ibm-demo~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-devel", rpm:"java-1.6.0-ibm-devel~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-javacomm", rpm:"java-1.6.0-ibm-javacomm~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-jdbc", rpm:"java-1.6.0-ibm-jdbc~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-plugin", rpm:"java-1.6.0-ibm-plugin~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.6.0-ibm-src", rpm:"java-1.6.0-ibm-src~1.6.0.7~1jpp.2.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1951_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1951_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1951_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1951-1 (firefox-sage)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66590);
+ script_cve_id("CVE-2009-4102");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1951-1 (firefox-sage)");
+
+ desc = "The remote host is missing an update to firefox-sage
+announced via advisory DSA 1951-1.
+
+It was discovered that firefox-sage, a lightweight RSS and Atom feed
+reader for Firefox, does not sanitise the RSS feed information
+correctly, which makes it prone to a cross-site scripting and a
+cross-domain scripting attack.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.4.2-0.1+lenny1.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.3.6-4etch1.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem has been fixed in version 1.4.3-3.
+
+
+We recommend that you upgrade your firefox-sage packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201951-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1951-1 (firefox-sage)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"firefox-sage", ver:"1.3.6-4etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-sage", ver:"1.4.2-0.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1952_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1952_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1952_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,135 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1952-1 (asterisk)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66591);
+ script_cve_id("CVE-2009-0041", "CVE-2008-3903", "CVE-2009-3727", "CVE-2008-7220", "CVE-2009-4055", "CVE-2007-2383");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1952-1 (asterisk)");
+
+ desc = "The remote host is missing an update to asterisk
+announced via advisory DSA 1952-1.
+
+
+Several vulnerabilities have been discovered in asterisk, an Open Source
+PBX and telephony toolkit. The Common Vulnerabilities and Exposures
+project identifies the following problems:
+
+CVE-2009-0041
+
+It is possible to determine valid login names via probing, due to the
+IAX2 response from asterisk (AST-2009-001).
+
+CVE-2008-3903
+
+It is possible to determine a valid SIP username, when Digest
+authentication and authalwaysreject are enabled (AST-2009-003).
+
+CVE-2009-3727
+
+It is possible to determine a valid SIP username via multiple crafted
+REGISTER messages (AST-2009-008).
+
+CVE-2008-7220 CVE-2007-2383
+
+It was discovered that asterisk contains an obsolete copy of the
+Prototype JavaScript framework, which is vulnerable to several security
+issues. This copy is unused and now removed from asterisk
+(AST-2009-009).
+
+CVE-2009-4055
+
+It was discovered that it is possible to perform a denial of service
+attack via  RTP comfort noise payload with a long data length
+(AST-2009-010).
+
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1:1.4.21.2~dfsg-3+lenny1.
+
+The security support for asterisk in the oldstable distribution (etch)
+has been discontinued before the end of the regular Etch security
+maintenance life cycle. You are strongly encouraged to upgrade to
+stable.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), these problems have been fixed in version 1:1.6.2.0~rc7-1.
+
+
+We recommend that you upgrade your asterisk packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201952-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1952-1 (asterisk)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"asterisk-sounds-main", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"asterisk-config", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"asterisk-doc", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"asterisk-dev", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"asterisk-dbg", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"asterisk-h323", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"asterisk", ver:"1.4.21.2~dfsg-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1954_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1954_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1954_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,114 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1954-1 (cacti)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66592);
+ script_cve_id("CVE-2007-3112", "CVE-2007-3113", "CVE-2009-4032", "CVE-2009-4112");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1954-1 (cacti)");
+
+ desc = "The remote host is missing an update to cacti
+announced via advisory DSA 1954-1.
+
+Several vulnerabilities have been found in cacti, a frontend to rrdtool
+for monitoring systems and services. The Common Vulnerabilities and
+Exposures project identifies the following problems:
+
+CVE-2007-3112, CVE-2007-3113
+
+It was discovered that cacti is prone to a denial of service via the
+graph_height, graph_width, graph_start and graph_end parameters.
+This issue only affects the oldstable (etch) version of cacti.
+
+CVE-2009-4032
+
+It was discovered that cacti is prone to several cross-site scripting
+attacks via different vectors.
+
+CVE-2009-4112
+
+It has been discovered that cacti allows authenticated administrator
+users to gain access to the host system by executing arbitrary commands
+via the Data Input Method for the Linux - Get Memory Usage setting.
+
+There is no fix for this issue at this stage. Upstream will implement a
+whitelist policy to only allow certain safe commands. For the moment,
+we recommend that such access is only given to trusted users and that
+the options Data Input and User Administration are otherwise
+deactivated.
+
+
+For the oldstable distribution (etch), these problems have been fixed in
+version 0.8.6i-3.6.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 0.8.7b-2.1+lenny1.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 0.8.7e-1.1.
+
+
+We recommend that you upgrade your cacti packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201954-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1954-1 (cacti)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"cacti", ver:"0.8.6i-3.6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"cacti", ver:"0.8.7b-2.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1955_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1955_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1955_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,112 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1955-1 (network-manager/network-manager-applet)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66593);
+ script_cve_id("CVE-2009-0365");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1955-1 (network-manager/network-manager-applet)");
+
+ desc = "The remote host is missing an update to network-manager/network-manager-applet
+announced via advisory DSA 1955-1.
+
+It was discovered that network-manager-applet, a network management
+framework, lacks some dbus restriction rules, which allows local users
+to obtain sensitive information.
+
+If you have locally modified the /etc/dbus-1/system.d/nm-applet.conf
+file, then please make sure that you merge the changes from this fix
+when asked during upgrade.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 0.6.6-4+lenny1 of network-manager-applet.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 0.6.4-6+etch1 of network-manager.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem has been fixed in version 0.7.0.99-1 of
+network-manager-applet.
+
+
+We recommend that you upgrade your network-manager and
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201955-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1955-1 (network-manager/network-manager-applet)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"network-manager-gnome", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"network-manager-dev", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"network-manager", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnm-glib0", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnm-util0", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnm-glib-dev", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnm-util-dev", ver:"0.6.4-6+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"network-manager-gnome", ver:"0.6.6-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1956_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1956_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1956_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,140 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1956-1 (xulrunner)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66594);
+ script_cve_id("CVE-2009-3986", "CVE-2009-3985", "CVE-2009-3984", "CVE-2009-3983", "CVE-2009-3981", "CVE-2009-3979");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1956-1 (xulrunner)");
+
+ desc = "The remote host is missing an update to xulrunner
+announced via advisory DSA 1956-1.
+
+Several remote vulnerabilities have been discovered in Xulrunner, a
+runtime environment for XUL applications, such as the Iceweasel web
+browser. The Common Vulnerabilities and Exposures project identifies
+the following problems:
+
+CVE-2009-3986:
+
+David James discovered that the window.opener property allows Chrome
+privilege escalation.
+
+CVE-2009-3985:
+
+Jordi Chanel discovered a spoofing vulnerability of the URL location bar
+using the document.location property.
+
+CVE-2009-3984:
+
+Jonathan Morgan discovered that the icon indicating a secure connection
+could be spoofed through the document.location property.
+
+CVE-2009-3983:
+
+Takehiro Takahashi discovered that the NTLM implementaion is vulnerable
+to reflection attacks.
+
+CVE-2009-3981:
+
+Jesse Ruderman discovered a crash in the layout engine, which might allow
+the execution of arbitrary code.
+
+CVE-2009-3979:
+
+Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel and Olli Pettay
+discovered crashes in the layout engine, which might allow the execution
+of arbitrary code.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1.9.0.16-1.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 1.9.1.6-1.
+
+We recommend that you upgrade your xulrunner packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201956-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1956-1 (xulrunner)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libmozillainterfaces-java", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dbg", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs1d", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs1d-dbg", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"spidermonkey-bin", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-xpcom", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs-dev", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-gnome-support", ver:"1.9.0.16-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1957_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1957_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1957_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,85 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1957-1 (aria2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66598);
+ script_cve_id("CVE-2009-3575");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1957-1 (aria2)");
+
+ desc = "The remote host is missing an update to aria2
+announced via advisory DSA 1957-1.
+
+It was discovered that aria2, a high speed download utility, is prone
+to a buffer overflow in the DHT routing code, which might lead to the
+execution of arbitrary code.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 0.14.0-1+lenny1. Binaries for powerpc, arm, ia64 and hppa will
+be provided once they are available.
+
+The oldstable distribution (etch) is not affected by this problem.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem has been fixed in version 1.2.0-1.
+
+
+We recommend that you upgrade your aria2 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201957-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1957-1 (aria2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"aria2", ver:"0.14.0-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1958_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1958_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1958_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,108 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1958-1 (libtool)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66599);
+ script_cve_id("CVE-2009-3736");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1958-1 (libtool)");
+
+ desc = "The remote host is missing an update to libtool
+announced via advisory DSA 1958-1.
+
+It was discovered that ltdl, a system-independent dlopen wrapper for
+GNU libtool, can be tricked to load and run modules from an arbitrary
+directory, which might be used to execute arbitrary code with the
+privileges of the user running an application that uses libltdl.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.5.26-4+lenny1.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.5.22-4+etch1.
+
+For the testing distribution (squeeze) and unstable distribution (sid),
+this problem has been fixed in 2.2.6b-1.
+
+
+We recommend that you upgrade your libtool packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201958-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1958-1 (libtool)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libtool-doc", ver:"1.5.22-4+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libtool", ver:"1.5.22-4+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libltdl3", ver:"1.5.22-4+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libltdl3-dev", ver:"1.5.22-4+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libtool-doc", ver:"1.5.26-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libtool", ver:"1.5.26-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libltdl3", ver:"1.5.26-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libltdl3-dev", ver:"1.5.26-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1960_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1960_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1960_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1960-1 (acpid)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66595);
+ script_cve_id("CVE-2009-4235");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1960-1 (acpid)");
+
+ desc = "The remote host is missing an update to acpid
+announced via advisory DSA 1960-1.
+
+It was discovered that acpid, the Advanced Configuration and Power
+Interface event daemon, on the oldstable distribution (etch) creates
+its log file with weak permissions, which might expose sensible
+information or might be abused by a local user to consume all free disk
+space on the same partition of the file.
+
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.0.4-5etch2.
+
+The stable distribution (lenny) in version 1.0.8-1lenny2 and the
+unstable distribution (sid) in version 1.0.10-5, have been updated to
+fix the weak file permissions of the log file created by older
+versions.
+
+
+We recommend that you upgrade your acpid packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201960-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1960-1 (acpid)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"acpid", ver:"1.0.4-5etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"acpid", ver:"1.0.8-1lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1961_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1961_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1961_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,165 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1961-1 (bind9)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66596);
+ script_cve_id("CVE-2009-4022");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1961-1 (bind9)");
+
+ desc = "The remote host is missing an update to bind9
+announced via advisory DSA 1961-1.
+
+Michael Sinatra discovered that the DNS resolver component in BIND
+does not properly check DNS records contained in additional sections
+of DNS responses, leading to a cache poisoning vulnerability.  This
+vulnerability is only present in resolvers which have been configured
+with DNSSEC trust anchors, which is still rare.
+
+Note that this update contains an internal ABI change, which means
+that all BIND-related packages (bind9, dnsutils and the library
+packages) must be updated at the same time (preferably using apt-get
+update and apt-get upgrade).  In the unlikely event that you have
+compiled your own software against libdns, you must recompile this
+programs, too.
+
+For the old stable distribution (etch), this problem has been fixed in
+version 9.3.4-2etch6.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 9.5.1.dfsg.P3-1+lenny1.
+
+For the unstable distribution (sid) and the testing distribution
+(squeeze), this problem has been fixed in version 9.6.1.dfsg.P2-1.
+
+We recommend that you upgrade your bind9 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201961-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1961-1 (bind9)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"bind9-doc", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libisccfg1", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libbind9-0", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libisc11", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libisccc0", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bind9", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdns22", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libbind-dev", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"lwresd", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"dnsutils", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bind9-host", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"liblwres9", ver:"9.3.4-2etch6", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bind9-doc", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdns45", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"liblwres40", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libisc45", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libisccc40", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bind9utils", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libbind-dev", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libbind9-40", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bind9-host", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"dnsutils", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libisccfg40", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bind9", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"lwresd", ver:"9.5.1.dfsg.P3-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1963_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1963_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/deb_1963_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1963-1 (unbound)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66597);
+ script_cve_id("CVE-2009-3602");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1963-1 (unbound)");
+
+ desc = "The remote host is missing an update to unbound
+announced via advisory DSA 1963-1.
+
+It was discovered that Unbound, a DNS resolver, does not properly
+check cryptographic signatures on NSEC3 records.  As a result, zones
+signed with the NSEC3 variant of DNSSEC lose their cryptographic
+protection.  (An attacker would still have to carry out an ordinary
+cache poisoning attack to add bad data to the cache.)
+
+The old stable distribution (etch) does not contain an unbound
+package.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.0.2-1+lenny1.
+
+For the unstable distribution (sid) and the testing distribution
+(squeeze), this problem has been fixed in version 1.3.4-1.
+
+We recommend that you upgrade your unbound package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201963-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1963-1 (unbound)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libunbound-dev", ver:"1.0.2-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"unbound-host", ver:"1.0.2-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libunbound0", ver:"1.0.2-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"unbound", ver:"1.0.2-1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12229.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12229.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12229.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12229 (tomcat-native)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66563);
+ script_cve_id("CVE-2009-3555");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12229 (tomcat-native)");
+
+ desc = "The remote host is missing an update to tomcat-native
+announced via advisory FEDORA-2009-12229.
+
+Update Information:
+
+Update to 1.1.18, implementing a mitigation for CVE-2009-3555.
+http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
+http://marc.info/?l=tomcat-dev&m=125900987921402&w=2
+http://marc.info/?l=tomcat-dev&m=125874793414940&w=2
+http://marc.info/?l=tomcat-user&m=125874793614950&w=2
+
+ChangeLog:
+
+* Tue Nov 24 2009 Ville Skyttä  - 1.1.18-1
+- Update to 1.1.18 (security; CVE-2009-3555).
+* Wed Nov  4 2009 Ville Skyttä  - 1.1.17-1
+- Update to 1.1.17 (#532931).
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update tomcat-native' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12229
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12229 (tomcat-native)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat-native", rpm:"tomcat-native~1.1.18~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat-native-debuginfo", rpm:"tomcat-native-debuginfo~1.1.18~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12305.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12305.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12305.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12305 (tomcat-native)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66562);
+ script_cve_id("CVE-2009-3555");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-12305 (tomcat-native)");
+
+ desc = "The remote host is missing an update to tomcat-native
+announced via advisory FEDORA-2009-12305.
+
+Update Information:
+
+Update to 1.1.18, implementing a mitigation for CVE-2009-3555.
+http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
+http://marc.info/?l=tomcat-dev&m=125900987921402&w=2
+http://marc.info/?l=tomcat-dev&m=125874793414940&w=2
+http://marc.info/?l=tomcat-user&m=125874793614950&w=2
+
+ChangeLog:
+
+* Tue Nov 24 2009 Ville Skyttä  - 1.1.18-1
+- Update to 1.1.18 (security; CVE-2009-3555).
+* Wed Nov  4 2009 Ville Skyttä  - 1.1.17-1
+- Update to 1.1.17 (#532931).
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update tomcat-native' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12305
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-12305 (tomcat-native)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat-native", rpm:"tomcat-native~1.1.18~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat-native-debuginfo", rpm:"tomcat-native-debuginfo~1.1.18~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12506.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12506.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12506.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,181 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12506 (asterisk)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66574);
+ script_cve_id("CVE-2009-4055", "CVE-2008-7220");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-12506 (asterisk)");
+
+ desc = "The remote host is missing an update to asterisk
+announced via advisory FEDORA-2009-12506.
+
+Update Information:
+
+Update to 1.6.1.11 to fix AST-2009-010/CVE-2009-4055
+http://downloads.asterisk.org/pub/security/AST-2009-010.html
+
+ChangeLog:
+
+* Mon Nov 30 2009 Jeffrey C. Ollie  - 1.6.1.11-1
+- Update to 1.6.1.11 to fix AST-2009-010/CVE-2009-4055
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update asterisk' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12506
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-12506 (asterisk)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"asterisk", rpm:"asterisk~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ais", rpm:"asterisk-ais~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-alsa", rpm:"asterisk-alsa~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-apidoc", rpm:"asterisk-apidoc~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-curl", rpm:"asterisk-curl~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-dahdi", rpm:"asterisk-dahdi~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-devel", rpm:"asterisk-devel~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-fax", rpm:"asterisk-fax~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-festival", rpm:"asterisk-festival~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ices", rpm:"asterisk-ices~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-jabber", rpm:"asterisk-jabber~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-jack", rpm:"asterisk-jack~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ldap", rpm:"asterisk-ldap~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ldap-fds", rpm:"asterisk-ldap-fds~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-lua", rpm:"asterisk-lua~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-minivm", rpm:"asterisk-minivm~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-misdn", rpm:"asterisk-misdn~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-odbc", rpm:"asterisk-odbc~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-oss", rpm:"asterisk-oss~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-portaudio", rpm:"asterisk-portaudio~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-postgresql", rpm:"asterisk-postgresql~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-radius", rpm:"asterisk-radius~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-skinny", rpm:"asterisk-skinny~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-snmp", rpm:"asterisk-snmp~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-sqlite", rpm:"asterisk-sqlite~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-tds", rpm:"asterisk-tds~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-unistim", rpm:"asterisk-unistim~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-usbradio", rpm:"asterisk-usbradio~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail", rpm:"asterisk-voicemail~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail-imap", rpm:"asterisk-voicemail-imap~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail-odbc", rpm:"asterisk-voicemail-odbc~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail-plain", rpm:"asterisk-voicemail-plain~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-debuginfo", rpm:"asterisk-debuginfo~1.6.1.11~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12517.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12517.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12517.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,181 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12517 (asterisk)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66576);
+ script_cve_id("CVE-2009-4055");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12517 (asterisk)");
+
+ desc = "The remote host is missing an update to asterisk
+announced via advisory FEDORA-2009-12517.
+
+Update Information:
+
+Update to 1.6.1.11 to fix AST-2009-010/CVE-2009-4055
+http://downloads.asterisk.org/pub/security/AST-2009-010.html
+
+ChangeLog:
+
+* Mon Nov 30 2009 Jeffrey C. Ollie  - 1.6.1.11-1
+- Update to 1.6.1.11 to fix AST-2009-010/CVE-2009-4055
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update asterisk' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12517
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12517 (asterisk)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"asterisk", rpm:"asterisk~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ais", rpm:"asterisk-ais~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-alsa", rpm:"asterisk-alsa~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-apidoc", rpm:"asterisk-apidoc~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-curl", rpm:"asterisk-curl~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-dahdi", rpm:"asterisk-dahdi~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-devel", rpm:"asterisk-devel~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-fax", rpm:"asterisk-fax~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-festival", rpm:"asterisk-festival~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ices", rpm:"asterisk-ices~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-jabber", rpm:"asterisk-jabber~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-jack", rpm:"asterisk-jack~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ldap", rpm:"asterisk-ldap~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-ldap-fds", rpm:"asterisk-ldap-fds~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-lua", rpm:"asterisk-lua~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-minivm", rpm:"asterisk-minivm~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-misdn", rpm:"asterisk-misdn~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-odbc", rpm:"asterisk-odbc~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-oss", rpm:"asterisk-oss~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-portaudio", rpm:"asterisk-portaudio~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-postgresql", rpm:"asterisk-postgresql~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-radius", rpm:"asterisk-radius~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-skinny", rpm:"asterisk-skinny~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-snmp", rpm:"asterisk-snmp~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-sqlite", rpm:"asterisk-sqlite~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-tds", rpm:"asterisk-tds~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-unistim", rpm:"asterisk-unistim~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-usbradio", rpm:"asterisk-usbradio~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail", rpm:"asterisk-voicemail~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail-imap", rpm:"asterisk-voicemail-imap~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail-odbc", rpm:"asterisk-voicemail-odbc~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-voicemail-plain", rpm:"asterisk-voicemail-plain~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"asterisk-debuginfo", rpm:"asterisk-debuginfo~1.6.1.11~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12562.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12562.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12562.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,101 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12562 (libtool)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66589);
+ script_cve_id("CVE-2009-3736");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12562 (libtool)");
+
+ desc = "The remote host is missing an update to libtool
+announced via advisory FEDORA-2009-12562.
+
+Update Information:
+
+libltdl may load and execute code from a library in the current directory.
+
+ChangeLog:
+
+* Wed Dec  2 2009 Karsten Hopp  2.2.6-17
+- fix directory name used in libtool tarball
+* Wed Dec  2 2009 Karsten Hopp  2.2.6-16
+- update to 2.2.6b, fixes CVE-2009-3736:
+libltdl may load and execute code from a library in the current directory
+
+References:
+
+[ 1 ] Bug #537941 - CVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory
+https://bugzilla.redhat.com/show_bug.cgi?id=537941
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update libtool' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12562
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12562 (libtool)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libtool", rpm:"libtool~2.2.6~17.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-ltdl", rpm:"libtool-ltdl~2.2.6~17.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-ltdl-devel", rpm:"libtool-ltdl-devel~2.2.6~17.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-debuginfo", rpm:"libtool-debuginfo~2.2.6~17.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12575.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12575.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12575.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,100 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12575 (cacti)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66584);
+ script_cve_id("CVE-2009-4032");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-12575 (cacti)");
+
+ desc = "The remote host is missing an update to cacti
+announced via advisory FEDORA-2009-12575.
+
+Update Information:
+
+This fix contains several official patches from cacti:
+    Command Line Add Graphs Syntax
+    SNMP Invalid Responses 
+    Template Import/Export Duplication
+    Cross-Site Scripting Fixes
+http://www.cacti.net/download_patches.php
+
+ChangeLog:
+
+* Tue Dec  1 2009 Mike McGrath  - 0.8.7e-3
+- Pulling in some official patches
+- #541279
+- #541962
+* Sun Aug 16 2009 Mike McGrath  - 0.8.7e-1
+- Upstream released new version
+* Fri Jul 24 2009 Fedora Release Engineering  - 0.8.7d-4
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
+
+References:
+
+[ 1 ] Bug #541279 - CVE-2009-4032 Cacti: Multiple cross-site scripting flaws
+https://bugzilla.redhat.com/show_bug.cgi?id=541279
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update cacti' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12575
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-12575 (cacti)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cacti", rpm:"cacti~0.8.7e~3.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12606.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12606.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12606.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,107 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12606 (httpd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66557);
+ script_cve_id("CVE-2009-3555", "CVE-2009-3094", "CVE-2009-3095");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12606 (httpd)");
+
+ desc = "The remote host is missing an update to Apache HTTP Server
+announced via advisory FEDORA-2009-12606.
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Thu Dec  3 2009 Joe Orton  - 2.2.14-1
+- update to 2.2.14
+- relax permissions on /var/run/httpd (#495780)
+- Requires(pre): httpd in mod_ssl subpackage (#543275)
+- add partial security fix for CVE-2009-3555 (#533125)
+
+References:
+
+[ 1 ] Bug #521619 - CVE-2009-3094 httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply
+https://bugzilla.redhat.com/show_bug.cgi?id=521619
+[ 2 ] Bug #522209 - CVE-2009-3095 httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header
+https://bugzilla.redhat.com/show_bug.cgi?id=522209
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update httpd' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12606
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12606 (httpd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"httpd", rpm:"httpd~2.2.14~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"httpd-devel", rpm:"httpd-devel~2.2.14~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"httpd-tools", rpm:"httpd-tools~2.2.14~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mod_ssl", rpm:"mod_ssl~2.2.14~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"httpd-debuginfo", rpm:"httpd-debuginfo~2.2.14~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"httpd-manual", rpm:"httpd-manual~2.2.14~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12725.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12725.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12725.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,97 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12725 (libtool)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66572);
+ script_cve_id("CVE-2009-3736");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-12725 (libtool)");
+
+ desc = "The remote host is missing an update to libtool
+announced via advisory FEDORA-2009-12725.
+
+ChangeLog:
+
+* Thu Dec  3 2009 Karsten Hopp  2.2.6-11.3
+- require gcc-4.4.1 from F-11-updates
+* Wed Dec  2 2009 Karsten Hopp  2.2.6-11.2
+- update to 2.2.6b, fixes CVE-2009-3736:
+libltdl may load and execute code from a library in the current directory
+
+References:
+
+[ 1 ] Bug #537941 - CVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory
+https://bugzilla.redhat.com/show_bug.cgi?id=537941
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update libtool' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12725
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-12725 (libtool)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libtool", rpm:"libtool~2.2.6~11.fc11.3", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-ltdl", rpm:"libtool-ltdl~2.2.6~11.fc11.3", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-ltdl-devel", rpm:"libtool-ltdl-devel~2.2.6~11.fc11.3", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-debuginfo", rpm:"libtool-debuginfo~2.2.6~11.fc11.3", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12753.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12753.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12753.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12753 (PyXML)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66580);
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12753 (PyXML)");
+
+ desc = "The remote host is missing an update to PyXML
+announced via advisory FEDORA-2009-12753.
+
+Update Information:
+
+Use system xpat library
+
+ChangeLog:
+
+* Mon Nov  2 2009 Roman Rakus  - 0.8.4-17
+- Use system expat library
+* Fri Oct 30 2009 Roman Rakus  - 0.8.4-16
+- Fix buffer over read
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update PyXML' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12753
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12753 (PyXML)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"PyXML", rpm:"PyXML~0.8.4~17.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"PyXML-debuginfo", rpm:"PyXML-debuginfo~0.8.4~17.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12813.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12813.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12813.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,153 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12813 (gcc)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66588);
+ script_cve_id("CVE-2009-3736");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12813 (gcc)");
+
+ desc = "The remote host is missing an update to gcc
+announced via advisory FEDORA-2009-12813.
+
+ChangeLog:
+
+* Tue Dec 22 2009 Jakub Jelinek  4.4.2-20
+- fix MEM_SIZE of reload created stack slots (#548825,
+PR rtl-optimization/42429)
+- fix addition of one character long filenames in fastjar (#549493)
+
+References:
+
+[ 1 ] Bug #537941 - CVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory
+https://bugzilla.redhat.com/show_bug.cgi?id=537941
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update gcc' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12813
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12813 (gcc)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cpp", rpm:"cpp~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc", rpm:"gcc~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-c++", rpm:"gcc-c++~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-gfortran", rpm:"gcc-gfortran~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-gnat", rpm:"gcc-gnat~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-java", rpm:"gcc-java~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-objc", rpm:"gcc-objc~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-objc++", rpm:"gcc-objc++~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgcc", rpm:"libgcc~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgcj", rpm:"libgcj~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgcj-devel", rpm:"libgcj-devel~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgcj-src", rpm:"libgcj-src~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgfortran", rpm:"libgfortran~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgnat", rpm:"libgnat~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgnat-devel", rpm:"libgnat-devel~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgomp", rpm:"libgomp~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmudflap", rpm:"libmudflap~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmudflap-devel", rpm:"libmudflap-devel~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libobjc", rpm:"libobjc~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libstdc++", rpm:"libstdc++~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libstdc++-devel", rpm:"libstdc++-devel~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libstdc++-docs", rpm:"libstdc++-docs~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gcc-debuginfo", rpm:"gcc-debuginfo~4.4.2~20.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12950.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12950.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12950.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,119 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12950 (gtk2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66571);
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12950 (gtk2)");
+
+ desc = "The remote host is missing an update to gtk2
+announced via advisory FEDORA-2009-12950.
+
+Update Information:
+
+This update fixes a crasher issue in gtk2 involving out of process
+windows.  Side effects of the bug are sporadic panel crashes, and
+occasional crashes in gnome-screensaver when typing an invalid
+password.
+
+This update also addresses a crash in Inkscape when using the text tool.
+
+ChangeLog:
+
+* Tue Dec  8 2009 Matthias Clasen  - 2.18.5-1
+- Update to 2.18.5
+* Tue Dec  1 2009 Matthias Clasen  - 2.18.4-3
+- Fix a mistranslated format string in no_NO (#500067)
+* Tue Dec  1 2009 Matthias Clasen  - 2.18.4-2
+- Make compose sequences for āō consistent (#510741)
+* Tue Dec  1 2009 Matthias Clasen  - 2.18.4-1
+- Update to 2.18.4
+- See http://download.gnome.org/sources/gtk+/2.18/gtk+-2.18.4.news
+
+References:
+
+[ 1 ] Bug #540308 - [abrt] crash detected in gnome-screensaver-2.28.0-6.fc12 (BadDrawable)
+https://bugzilla.redhat.com/show_bug.cgi?id=540308
+[ 2 ] Bug #538156 - [abrt] crash detected in gnome-panel-2.28.0-13.fc12 (/usr/libexec/notification-area-applet)
+https://bugzilla.redhat.com/show_bug.cgi?id=538156
+[ 3 ] Bug #544590 - Using text tool crashes inkscape
+https://bugzilla.redhat.com/show_bug.cgi?id=544590
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update gtk2' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12950
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12950 (gtk2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gtk2", rpm:"gtk2~2.18.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gtk2-devel", rpm:"gtk2-devel~2.18.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gtk2-devel-docs", rpm:"gtk2-devel-docs~2.18.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gtk2-immodule-xim", rpm:"gtk2-immodule-xim~2.18.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gtk2-immodules", rpm:"gtk2-immodules~2.18.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gtk2-debuginfo", rpm:"gtk2-debuginfo~2.18.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_12975.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_12975.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_12975.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-12975 (trac)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66575);
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-12975 (trac)");
+
+ desc = "The remote host is missing an update to trac
+announced via advisory FEDORA-2009-12975.
+
+Update Information:
+
+Update to new upstream release including security fixes.
+
+ChangeLog:
+
+* Sat Dec  5 2009 Felix Schwarz  - 0.11.6-1
+- New upstream release
+
+References:
+
+[ 1 ] Bug #542394 - trac: please update to the latest stable version (0.11.4 -> 0.11.6)
+https://bugzilla.redhat.com/show_bug.cgi?id=542394
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update trac' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-12975
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-12975 (trac)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"trac", rpm:"trac~0.11.6~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13181.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13181.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13181.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13181 (coreutils)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66560);
+ script_cve_id("CVE-2009-4135");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13181 (coreutils)");
+
+ desc = "The remote host is missing an update to coreutils
+announced via advisory FEDORA-2009-13181.
+
+Update Information:
+
+CVE-2009-4135 : Unsafe temporary directory use in distcheck rule
+
+ChangeLog:
+
+* Fri Dec 11 2009 Ondrej Vasik  - 7.6-8
+- CVE-2009-4135 : Unsafe temporary directory use in distcheck rule
+
+References:
+
+[ 1 ] Bug #545439 - CVE-2009-4135 coreutils: Unsafe temporary directory use in distcheck rule
+https://bugzilla.redhat.com/show_bug.cgi?id=545439
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update coreutils' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13181
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13181 (coreutils)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"coreutils", rpm:"coreutils~7.6~8.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"coreutils-libs", rpm:"coreutils-libs~7.6~8.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"coreutils-debuginfo", rpm:"coreutils-debuginfo~7.6~8.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13195.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13195.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13195.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13195 (merkaartor)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66555);
+ script_cve_id("CVE-2009-4193");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13195 (merkaartor)");
+
+ desc = "The remote host is missing an update to merkaartor
+announced via advisory FEDORA-2009-13195.
+
+Update Information:
+
+This update fixes a possible symlink attack on the debug log merkaartor.log by
+no longer writing it out by default.
+
+ChangeLog:
+
+* Thu Dec 10 2009 Sven Lankes  - 0.14-2
+- Write log to /dev/null unless specified (bz# 544284)
+
+References:
+
+[ 1 ] Bug #544284 - CVE-2009-4193 Merkaartor: System files integrity break-out via symlink attack on log file
+https://bugzilla.redhat.com/show_bug.cgi?id=544284
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update merkaartor' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13195
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13195 (merkaartor)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"merkaartor", rpm:"merkaartor~0.14~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"merkaartor-debuginfo", rpm:"merkaartor-debuginfo~0.14~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13196.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13196.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13196.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13196 (merkaartor)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66556);
+ script_cve_id("CVE-2009-4193");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13196 (merkaartor)");
+
+ desc = "The remote host is missing an update to merkaartor
+announced via advisory FEDORA-2009-13196.
+
+Update Information:
+
+This update fixes a possible symlink attack on the debug log merkaartor.log by
+no longer writing it out by default.
+
+ChangeLog:
+
+* Thu Dec 10 2009 Sven Lankes  - 0.14-2
+- Write log to /dev/null unless specified (bz# 544284)
+
+References:
+
+[ 1 ] Bug #544284 - CVE-2009-4193 Merkaartor: System files integrity break-out via symlink attack on log file
+https://bugzilla.redhat.com/show_bug.cgi?id=544284
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update merkaartor' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13196
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13196 (merkaartor)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"merkaartor", rpm:"merkaartor~0.14~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"merkaartor-debuginfo", rpm:"merkaartor-debuginfo~0.14~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13216.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13216.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13216.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13216 (coreutils)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66559);
+ script_cve_id("CVE-2009-4135");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13216 (coreutils)");
+
+ desc = "The remote host is missing an update to coreutils
+announced via advisory FEDORA-2009-13216.
+
+Update Information:
+
+CVE-2009-4135 : Unsafe temporary directory use in distcheck rule
+
+ChangeLog:
+
+* Fri Dec 11 2009 Ondrej Vasik  - 7.2-5
+- CVE-2009-4135 : Unsafe temporary directory use in distcheck rule
+
+References:
+
+[ 1 ] Bug #545439 - CVE-2009-4135 coreutils: Unsafe temporary directory use in distcheck rule
+https://bugzilla.redhat.com/show_bug.cgi?id=545439
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update coreutils' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13216
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13216 (coreutils)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"coreutils", rpm:"coreutils~7.2~5.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"coreutils-debuginfo", rpm:"coreutils-debuginfo~7.2~5.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13236.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13236.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13236.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,109 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13236 (proftpd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66585);
+ script_cve_id("CVE-2009-3555", "CVE-2009-3639");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13236 (proftpd)");
+
+ desc = "The remote host is missing an update to proftpd
+announced via advisory FEDORA-2009-13236.
+
+Update Information:
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Thu Dec 10 2009 Paul Howarth  1.3.2c-1
+- Update to 1.3.2c, addressing the following issues:
+- SSL/TLS renegotiation vulnerability (CVE-2009-3555, bug 3324)
+- Failed database transaction can cause mod_quotatab to loop (bug 3228)
+- Segfault in mod_wrap (bug 3332)
+-  sections can have  problems (bug 3337)
+- mod_wrap2 segfaults when a valid user retries the USER command (bug 3341)
+- mod_auth_file handles 'getgroups' request incorrectly (bug 3347)
+- Segfault caused by scrubbing zero-length portion of memory (bug 3350)
+- Drop upstreamed segfault patch
+
+References:
+
+[ 1 ] Bug #533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation
+https://bugzilla.redhat.com/show_bug.cgi?id=533125
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update proftpd' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13236
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13236 (proftpd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2c~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-ldap", rpm:"proftpd-ldap~1.3.2c~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mysql", rpm:"proftpd-mysql~1.3.2c~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-postgresql", rpm:"proftpd-postgresql~1.3.2c~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-debuginfo", rpm:"proftpd-debuginfo~1.3.2c~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13250.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13250.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13250.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,114 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13250 (proftpd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66583);
+ script_cve_id("CVE-2009-3555");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13250 (proftpd)");
+
+ desc = "The remote host is missing an update to proftpd
+announced via advisory FEDORA-2009-13250.
+
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Thu Dec 10 2009 Paul Howarth  1.3.2c-1
+- Update to 1.3.2c, addressing the following issues:
+- SSL/TLS renegotiation vulnerability (CVE-2009-3555, bug 3324)
+- Failed database transaction can cause mod_quotatab to loop (bug 3228)
+- Segfault in mod_wrap (bug 3332)
+-  sections can have  problems (bug 3337)
+- mod_wrap2 segfaults when a valid user retries the USER command (bug 3341)
+- mod_auth_file handles 'getgroups' request incorrectly (bug 3347)
+- Segfault caused by scrubbing zero-length portion of memory (bug 3350)
+- Drop upstreamed segfault patch
+* Thu Dec 10 2009 Paul Howarth  1.3.2b-3
+- Add patch for upstream bug 3350 - segfault on auth failures
+* Wed Dec  9 2009 Paul Howarth  1.3.2b-2
+- Reduce the mod_facts patch to the single commit addressing the issue with
+directory names with glob characters (#521634), avoiding introducing a
+further problem with  (#544002)
+
+References:
+
+[ 1 ] Bug #533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation
+https://bugzilla.redhat.com/show_bug.cgi?id=533125
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update proftpd' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13250
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13250 (proftpd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2c~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-ldap", rpm:"proftpd-ldap~1.3.2c~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mysql", rpm:"proftpd-mysql~1.3.2c~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-postgresql", rpm:"proftpd-postgresql~1.3.2c~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-debuginfo", rpm:"proftpd-debuginfo~1.3.2c~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13291.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13291.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13291.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,81 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13291 (drupal)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66558);
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13291 (drupal)");
+
+ desc = "The remote host is missing an update to drupal
+announced via advisory FEDORA-2009-13291.
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Thu Dec 17 2009 Jon Ciesla  - 6.15-1
+- Update to 6.15, SA-CORE-2009-009.
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update drupal' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13291
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13291 (drupal)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"drupal", rpm:"drupal~6.15~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13333.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13333.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13333.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,102 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13333 (firefox)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66561);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3982", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986", "CVE-2009-3388", "CVE-2009-3389");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13333 (firefox)");
+
+ desc = "The remote host is missing an update to firefox
+announced via advisory FEDORA-2009-13333.
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Wed Dec 16 2009 Jan Horak  - 3.5.6-1
+- Update to 3.5.6
+* Thu Nov  5 2009 Jan Horak  - 3.5.5-1
+- Update to 3.5.5
+* Mon Oct 26 2009 Jan Horak  - 3.5.4-1
+- Updated to 3.5.4
+
+References:
+
+[ 1 ] Bug #546694 - CVE-2009-3979 Mozilla crash with evidence of memory corruption
+https://bugzilla.redhat.com/show_bug.cgi?id=546694
+[ 2 ] Bug #546720 - CVE-2009-3983 Mozilla NTLM reflection vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=546720
+[ 3 ] Bug #546722 - CVE-2009-3984 Mozilla SSL spoofing with document.location and empty SSL response page
+https://bugzilla.redhat.com/show_bug.cgi?id=546722
+[ 4 ] Bug #546726 - CVE-2009-3985 Mozilla URL spoofing via invalid document.location
+https://bugzilla.redhat.com/show_bug.cgi?id=546726
+[ 5 ] Bug #546724 - CVE-2009-3986 Mozilla Chrome privilege escalation via window.opener
+https://bugzilla.redhat.com/show_bug.cgi?id=546724
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update firefox' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13333
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13333 (firefox)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.5.6~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.5.6~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13361.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13361.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13361.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,89 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13361 (rubygem-actionpack)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66564);
+ script_cve_id("CVE-2009-4214", "CVE-2009-3009");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13361 (rubygem-actionpack)");
+
+ desc = "The remote host is missing an update to rubygem-actionpack
+announced via advisory FEDORA-2009-13361.
+
+Update Information:
+
+Fix CVE-2009-4214 (bz 542786)
+
+ChangeLog:
+
+* Thu Dec 10 2009 David Lutterkort  - 1:2.3.2-4
+- Patch for CVE-2009-4214 (bz 542786)
+
+References:
+
+[ 1 ] Bug #542786 - rubygem-actionpack: XSS weakness in strip_tags
+https://bugzilla.redhat.com/show_bug.cgi?id=542786
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update rubygem-actionpack' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13361
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13361 (rubygem-actionpack)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rubygem-actionpack", rpm:"rubygem-actionpack~2.3.2~4.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13362.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13362.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13362.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13362 (seamonkey)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66565);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3982", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986", "CVE-2009-3388", "CVE-2009-3389");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13362 (seamonkey)");
+
+ desc = "The remote host is missing an update to seamonkey
+announced via advisory FEDORA-2009-13362.
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Thu Dec 17 2009 Jan Horak  - 2.0.1-1
+- Update to 2.0.1
+
+References:
+
+[ 1 ] Bug #546694 - CVE-2009-3979 Mozilla crash with evidence of memory corruption
+https://bugzilla.redhat.com/show_bug.cgi?id=546694
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update seamonkey' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13362
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13362 (seamonkey)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~2.0.1~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~2.0.1~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13363.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13363.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13363.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,131 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13363 (postgresql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66566);
+ script_cve_id("CVE-2009-4136", "CVE-2009-4034");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13363 (postgresql)");
+
+ desc = "The remote host is missing an update to postgresql
+announced via advisory FEDORA-2009-13363.
+
+Update Information:
+
+Update to latest upstream point releases
+
+ChangeLog:
+
+* Wed Dec 16 2009 Tom Lane  8.3.9-1
+- Update to PostgreSQL 8.3.9, for various fixes described at
+http://www.postgresql.org/docs/8.3/static/release-8-3-9.html
+including two security issues
+Related: #546321
+Related: #547662
+
+References:
+
+[ 1 ] Bug #546321 - CVE-2009-4136 postgresql: SQL privilege escalation via modifications to session-local state
+https://bugzilla.redhat.com/show_bug.cgi?id=546321
+[ 2 ] Bug #547662 - CVE-2009-4034 postgresql: incorrect verification of SSL certificates with NUL in name
+https://bugzilla.redhat.com/show_bug.cgi?id=547662
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update postgresql' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13363
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13363 (postgresql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-plperl", rpm:"postgresql-plperl~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-plpython", rpm:"postgresql-plpython~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pltcl", rpm:"postgresql-pltcl~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-python", rpm:"postgresql-python~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-tcl", rpm:"postgresql-tcl~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-test", rpm:"postgresql-test~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-debuginfo", rpm:"postgresql-debuginfo~8.3.9~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13364.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13364.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13364.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,76 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13364 (drupal)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66567);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13364 (drupal)");
+
+ desc = "The remote host is missing an update to drupal
+announced via advisory FEDORA-2009-13364.
+
+For details, please visit the referenced advisories.
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update drupal' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13364
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13364 (drupal)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"drupal", rpm:"drupal~6.15~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13366.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13366.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13366.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,125 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13366 (gnome-python2-extras)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66568);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3982", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986", "CVE-2009-3388", "CVE-2009-3389");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13366 (gnome-python2-extras)");
+
+ desc = "The remote host is missing an update to gnome-python2-extras
+announced via advisory FEDORA-2009-13366.
+
+Update Information:
+
+Update to new upstream Firefox version 3.5.6, fixing multiple security issues
+detailed in the upstream advisories:
+http://www.mozilla.org/security/known-vulnerabilities/firefox35.html#firefox3.5.6
+Update also includes all packages depending on gecko-libs rebuilt against
+new version of Firefox / XULRunner.
+
+ChangeLog:
+
+* Wed Dec 16 2009 Jan Horak  - 2.25.3-14
+- Rebuild against newer gecko
+
+References:
+
+[ 1 ] Bug #546694 - CVE-2009-3979 Mozilla crash with evidence of memory corruption
+https://bugzilla.redhat.com/show_bug.cgi?id=546694
+[ 2 ] Bug #546720 - CVE-2009-3983 Mozilla NTLM reflection vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=546720
+[ 3 ] Bug #546722 - CVE-2009-3984 Mozilla SSL spoofing with document.location and empty SSL response page
+https://bugzilla.redhat.com/show_bug.cgi?id=546722
+[ 4 ] Bug #546726 - CVE-2009-3985 Mozilla URL spoofing via invalid document.location
+https://bugzilla.redhat.com/show_bug.cgi?id=546726
+[ 5 ] Bug #546724 - CVE-2009-3986 Mozilla Chrome privilege escalation via window.opener
+https://bugzilla.redhat.com/show_bug.cgi?id=546724
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update gnome-python2-extras' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13366
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13366 (gnome-python2-extras)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gnome-python2-extras", rpm:"gnome-python2-extras~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-gda", rpm:"gnome-python2-gda~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-gda", rpm:"gnome-python2-gda~devel~2.25.3", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-gdl", rpm:"gnome-python2-gdl~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-gtkhtml2", rpm:"gnome-python2-gtkhtml2~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-gtkmozembed", rpm:"gnome-python2-gtkmozembed~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-gtkspell", rpm:"gnome-python2-gtkspell~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-libegg", rpm:"gnome-python2-libegg~2.25.3~14.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python2-extras", rpm:"gnome-python2-extras~debuginfo~2.25.3", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13381.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13381.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13381.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,136 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13381 (postgresql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66569);
+ script_cve_id("CVE-2009-4136", "CVE-2009-4034");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13381 (postgresql)");
+
+ desc = "The remote host is missing an update to postgresql
+announced via advisory FEDORA-2009-13381.
+
+Update Information:
+
+Update to latest upstream point releases
+
+ChangeLog:
+
+* Wed Dec 16 2009 Tom Lane  8.4.2-1
+- Update to PostgreSQL 8.4.2, for various fixes described at
+http://www.postgresql.org/docs/8.4/static/release-8-4-2.html
+including two security issues
+Related: #546321
+Related: #547662
+- Use -N not the obsolete -n in useradd call
+Resolves: #495727
+- Clean up specfile to eliminate rpmlint gripes, mainly by removing
+no-longer-needed provisions for superseding rh-postgresql
+- add sparc/sparc64 to multilib header support
+
+References:
+
+[ 1 ] Bug #546321 - CVE-2009-4136 postgresql: SQL privilege escalation via modifications to session-local state
+https://bugzilla.redhat.com/show_bug.cgi?id=546321
+[ 2 ] Bug #547662 - CVE-2009-4034 postgresql: incorrect verification of SSL certificates with NUL in name
+https://bugzilla.redhat.com/show_bug.cgi?id=547662
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update postgresql' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13381
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13381 (postgresql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-plperl", rpm:"postgresql-plperl~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-plpython", rpm:"postgresql-plpython~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pltcl", rpm:"postgresql-pltcl~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-python", rpm:"postgresql-python~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-tcl", rpm:"postgresql-tcl~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-test", rpm:"postgresql-test~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-debuginfo", rpm:"postgresql-debuginfo~8.4.2~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13393.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13393.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13393.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,89 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13393 (rubygem-actionpack)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66570);
+ script_cve_id("CVE-2009-4214");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13393 (rubygem-actionpack)");
+
+ desc = "The remote host is missing an update to rubygem-actionpack
+announced via advisory FEDORA-2009-13393.
+
+Update Information:
+
+Fix CVE-2009-4214 (bz 542786)
+
+ChangeLog:
+
+* Thu Dec 10 2009 David Lutterkort  - 1:2.3.4-3
+- Patch for CVE-2009-4214 (bz 542786)
+
+References:
+
+[ 1 ] Bug #542786 - rubygem-actionpack: XSS weakness in strip_tags
+https://bugzilla.redhat.com/show_bug.cgi?id=542786
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update rubygem-actionpack' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13393
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13393 (rubygem-actionpack)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rubygem-actionpack", rpm:"rubygem-actionpack~2.3.4~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13466.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13466.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13466.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,136 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13466 (mysql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66573);
+ script_cve_id("CVE-2009-4019", "CVE-2009-4028");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13466 (mysql)");
+
+ desc = "The remote host is missing an update to mysql
+announced via advisory FEDORA-2009-13466.
+
+MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
+client/server implementation consisting of a server daemon (mysqld)
+and many different client programs and libraries. The base package
+contains the standard MySQL client programs and generic MySQL files.
+
+Update Information:
+
+- Update to MySQL 5.1.41, for various fixes described at
+http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
+including security fixes
+- Stop waiting during service mysqld start if mysqld_safe exits
+
+ChangeLog:
+
+* Thu Dec 17 2009 Tom Lane  5.1.41-2
+- Update to MySQL 5.1.41, for various fixes described at
+http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
+including fixes for CVE-2009-4019
+Related: #540906
+- Stop waiting during service mysqld start if mysqld_safe exits
+Resolves: #544095
+* Tue Nov 10 2009 Tom Lane  5.1.40-1
+- Update to MySQL 5.1.40, for various fixes described at
+http://dev.mysql.com/doc/refman/5.1/en/news-5-1-40.html
+- Do not force the --log-error setting in mysqld init script
+Resolves: #533736
+
+References:
+
+[ 1 ] Bug #540906 - CVE-2009-4019 mysql: DoS (crash) when comparing GIS items from subquery and when handling subqueires in WHERE  and assigning a SELECT result to a @variable
+https://bugzilla.redhat.com/show_bug.cgi?id=540906
+[ 2 ] Bug #541233 - CVE-2009-4028 mysql: client SSL certificate verification flaw
+https://bugzilla.redhat.com/show_bug.cgi?id=541233
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update mysql' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13466
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13466 (mysql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mysql", rpm:"mysql~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-bench", rpm:"mysql-bench~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-cluster", rpm:"mysql-cluster~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-devel", rpm:"mysql-devel~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-embedded", rpm:"mysql-embedded~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-embedded-devel", rpm:"mysql-embedded-devel~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-libs", rpm:"mysql-libs~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-server", rpm:"mysql-server~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-test", rpm:"mysql-test~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-debuginfo", rpm:"mysql-debuginfo~5.1.41~2.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13504.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13504.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13504.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,126 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13504 (mysql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66577);
+ script_cve_id("CVE-2009-4019", "CVE-2009-4028");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13504 (mysql)");
+
+ desc = "The remote host is missing an update to mysql
+announced via advisory FEDORA-2009-13504.
+
+Update Information:
+
+- Update to MySQL 5.1.41, for various fixes described at
+http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
+including security fixes
+- Stop waiting during service mysqld start if mysqld_safe exits
+
+ChangeLog:
+
+* Thu Dec 17 2009 Tom Lane  5.1.41-2
+- Update to MySQL 5.1.41, for various fixes described at
+http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
+including fixes for CVE-2009-4019
+Related: #540906
+- Stop waiting during service mysqld start if mysqld_safe exits
+Resolves: #544095
+
+References:
+
+[ 1 ] Bug #540906 - CVE-2009-4019 mysql: DoS (crash) when comparing GIS items from subquery and when handling subqueires in WHERE  and assigning a SELECT result to a @variable
+https://bugzilla.redhat.com/show_bug.cgi?id=540906
+[ 2 ] Bug #541233 - CVE-2009-4028 mysql: client SSL certificate verification flaw
+https://bugzilla.redhat.com/show_bug.cgi?id=541233
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update mysql' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13504
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13504 (mysql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mysql", rpm:"mysql~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-bench", rpm:"mysql-bench~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-cluster", rpm:"mysql-cluster~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-devel", rpm:"mysql-devel~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-embedded", rpm:"mysql-embedded~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-embedded-devel", rpm:"mysql-embedded-devel~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-libs", rpm:"mysql-libs~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-server", rpm:"mysql-server~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-test", rpm:"mysql-test~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-debuginfo", rpm:"mysql-debuginfo~5.1.41~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13592.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13592.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13592.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,103 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13592 (wireshark)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66578);
+ script_cve_id("CVE-2009-4376", "CVE-2009-4377");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13592 (wireshark)");
+
+ desc = "The remote host is missing an update to wireshark
+announced via advisory FEDORA-2009-13592.
+
+For details, please visit the referenced advisories.
+
+ChangeLog:
+
+* Fri Dec 18 2009 Patrick Monnerat  1.2.5-3
+- Autoconf macro for plugin development.
+* Fri Dec 18 2009 Radek Vokal  - 1.2.5-2
+- upgrade to 1.2.5
+- fixes security vulnaribilities, see http://www.wireshark.org/security/wnpa-sec-2009-09.html
+- split -devel package (#547899, #203642, #218451)
+- removing root warning dialog (#543709)
+- enable lua support - http://wiki.wireshark.org/Lua
+- attempt to fix filter crash on 64bits
+
+References:
+
+[ 1 ] Bug #549578 - CVE-2009-4377 wireshark: invalid pointer dereference in SMB/SMB2 dissectors
+https://bugzilla.redhat.com/show_bug.cgi?id=549578
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update wireshark' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13592
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13592 (wireshark)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.2.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-devel", rpm:"wireshark-devel~1.2.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-gnome", rpm:"wireshark-gnome~1.2.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-debuginfo", rpm:"wireshark-debuginfo~1.2.5~3.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13598.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13598.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13598.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,94 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13598 (phpldapadmin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66579);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13598 (phpldapadmin)");
+
+ desc = "The remote host is missing an update to phpldapadmin
+announced via advisory FEDORA-2009-13598.
+
+Update Information:
+
+Upgrade to 1.2.0.4
+A vulnerability has been discovered on phpLDAPadmin
+version 1.1.x, which can be exploited by malicious people
+to disclose sensitive information. See http://secunia.com/advisories/37848/
+This update upgrades phpldapadmin to the latest version 1.2.0.4,
+which is not affected.
+
+ChangeLog:
+
+* Wed Dec 23 2009 Dmitry Butskoy  - 1.2.0.4-1
+- Upgrade to 1.2.0.4 . Fixes #549559
+- Allow local IPv6 address by default
+
+References:
+
+[ 1 ] Bug #549559 - phpldapadmin: local file inclusion vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=549559
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update phpldapadmin' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13598
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13598 (phpldapadmin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"phpldapadmin", rpm:"phpldapadmin~1.2.0.4~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13610.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13610.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13610.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,100 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13610 (viewvc)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66586);
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13610 (viewvc)");
+
+ desc = "The remote host is missing an update to viewvc
+announced via advisory FEDORA-2009-13610.
+
+Update Information:
+
+* security fix: add root listing support of per-root authz config
+* security fix: query.py requires 'forbidden' authorizer (or none) in config
+* fix URL-ification of truncated log messages (issue #3)
+* fix regexp input validation (issue #426, #427, #440)
+* add support for configurable tab-to-spaces conversion
+* fix not-a-sequence error in diff view
+* allow viewvc-install to work when templates-contrib is absent
+* minor template improvements/corrections
+* expose revision metadata in diff view (issue #431)
+* markup file/directory item property URLs and email addresses (issue #434)
+* make ViewVC cross copies in Subversion history by default
+* fix bug that caused standalone.py failure under Python 1.5.2 (issue #442)
+* fix support for per-vhost overrides of authorizer parameters (issue #411)
+* fix root name identification in query.py interface
+
+ChangeLog:
+
+* Wed Dec 23 2009 Bojan Smojver  - 1.1.3-1
+- bump up to 1.1.3
+- drop patch for upstream issue #427
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update viewvc' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13610
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13610 (viewvc)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"viewvc", rpm:"viewvc~1.1.3~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"viewvc-httpd", rpm:"viewvc-httpd~1.1.3~1.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13634.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13634.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13634.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,100 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13634 (viewvc)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66587);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13634 (viewvc)");
+
+ desc = "The remote host is missing an update to viewvc
+announced via advisory FEDORA-2009-13634.
+
+Update Information:
+
+* security fix: add root listing support of per-root authz config
+* security fix: query.py requires 'forbidden' authorizer (or none) in config
+* fix URL-ification of truncated log messages (issue #3)
+* fix regexp input validation (issue #426, #427, #440)
+* add support for configurable tab-to-spaces conversion
+* fix not-a-sequence error in diff view
+* allow viewvc-install to work when templates-contrib is absent
+* minor template improvements/corrections
+* expose revision metadata in diff view (issue #431)
+* markup file/directory item property URLs and email addresses (issue #434)
+* make ViewVC cross copies in Subversion history by default
+* fix bug that caused standalone.py failure under Python 1.5.2 (issue #442)
+* fix support for per-vhost overrides of authorizer parameters (issue #411)
+* fix root name identification in query.py interface
+
+ChangeLog:
+
+* Wed Dec 23 2009 Bojan Smojver  - 1.1.3-1
+- bump up to 1.1.3
+- drop patch for upstream issue #427
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update viewvc' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13634
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13634 (viewvc)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"viewvc", rpm:"viewvc~1.1.3~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"viewvc-httpd", rpm:"viewvc-httpd~1.1.3~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13694.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13694.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13694.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,164 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13694 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66581);
+ script_cve_id("CVE-2009-3547", "CVE-2009-3638", "CVE-2009-3624", "CVE-2009-3621", "CVE-2009-3620", "CVE-2009-3612", "CVE-2009-2909", "CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-4410");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-13694 (kernel)");
+
+ desc = "The remote host is missing an update to the linux kernel
+announced via advisory FEDORA-2009-13694.
+
+Update Information:
+
+Fix a local DoS when using fuse.
+
+ChangeLog:
+
+* Thu Dec 24 2009 Kyle McMartin  2.6.30.10-105
+- fuse: fix kunmap in fuse_ioctl_copy_user, #549400
+* Tue Dec  8 2009 Chuck Ebbert  2.6.30.10-104
+- Copy fix for #540580 from F-12.
+* Fri Dec  4 2009 Kyle McMartin  2.6.30.10-103
+- 2.6.30.10
+- nuke ipv4-fix-null-ptr-deref-in-ip_fragment.patch, it's in the latest
+stable release.
+
+References:
+
+[ 1 ] Bug #549400 - CVE-2009-4410 kernel: fuse_ioctl_copy_user() dos
+https://bugzilla.redhat.com/show_bug.cgi?id=549400
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update kernel' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13694
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-13694 (kernel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~i586~2.6.30.10", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE", rpm:"kernel-PAE~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-devel", rpm:"kernel-PAE-devel~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug", rpm:"kernel-PAEdebug~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug-devel", rpm:"kernel-PAEdebug-devel~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~i686~2.6.30.10", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-debuginfo", rpm:"kernel-PAE-debuginfo~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug-debuginfo", rpm:"kernel-PAEdebug-debuginfo~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-bootwrapper", rpm:"kernel-bootwrapper~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~ppc~2.6.30.10", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-debuginfo", rpm:"kernel-smp-debuginfo~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~ppc64~2.6.30.10", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~x86_64~2.6.30.10", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~2.6.30.10~105.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_13700.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_13700.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/fcore_2009_13700.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,161 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-13700 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66582);
+ script_cve_id("CVE-2009-4131");
+ script_version ("$Revision$");
+ script_name("Fedora Core 12 FEDORA-2009-13700 (kernel)");
+
+ desc = "The remote host is missing an update to the linux kernel
+announced via advisory FEDORA-2009-13700.
+
+Update Information:
+
+Linux 2.6.31.9 for stable.
+
+ChangeLog:
+
+* Mon Dec 21 2009 Dave Airlie  2.6.31.9-174
+- revert rv410 fix broke some things
+* Mon Dec 21 2009 Ben Skeggs  2.6.31.9-173
+- nouveau: fix dim panel issues on certain laptops (rh#547554)
+- nouveau: fix some issues when running without ctxprogs
+- nouveau: fix error handling in init paths
+- nouveau: add vga arbitration hooks
+- nouveau: fix nv04 sw methods
+* Fri Dec 18 2009 Kyle McMartin  2.6.31.9-172
+- stable update 2.6.31.9
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update kernel' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-13700
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 12 FEDORA-2009-13700 (kernel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE", rpm:"kernel-PAE~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-devel", rpm:"kernel-PAE-devel~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug", rpm:"kernel-PAEdebug~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug-devel", rpm:"kernel-PAEdebug-devel~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~i686~2.6.31.9", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-debuginfo", rpm:"kernel-PAE-debuginfo~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug-debuginfo", rpm:"kernel-PAEdebug-debuginfo~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perf", rpm:"perf~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-bootwrapper", rpm:"kernel-bootwrapper~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~ppc~2.6.31.9", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-debuginfo", rpm:"kernel-smp-debuginfo~2.6.31.9~174.fc12", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~ppc64~2.6.31.9", rls:"FC12")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~x86_64~2.6.31.9", rls:"FC12")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_drupal515.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal515.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_drupal515.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,84 @@
+#
+#VID 751823d4-f189-11de-9344-00248c9b4be7
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 751823d4-f189-11de-9344-00248c9b4be7
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66607);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: drupal5");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   drupal5
+   drupal6
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://drupal.org/node/661586
+http://www.vuxml.org/freebsd/751823d4-f189-11de-9344-00248c9b4be7.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: drupal5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"drupal5");
+if(!isnull(bver) && revcomp(a:bver, b:"5.21")<0) {
+    security_note(0, data:"Package drupal5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"drupal6");
+if(!isnull(bver) && revcomp(a:bver, b:"6.15")<0) {
+    security_note(0, data:"Package drupal6 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_firefox43.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox43.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_firefox43.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,107 @@
+#
+#VID 01c57d20-ea26-11de-bd39-00248c9b4be7
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 01c57d20-ea26-11de-bd39-00248c9b4be7
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66613);
+ script_cve_id("CVE-2009-3388", "CVE-2009-3389", "CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3981", "CVE-2009-3982", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: firefox");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   firefox
+   linux-firefox
+   seamonkey
+   linux-seamonkey
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.mozilla.org/security/announce/2009/mfsa2009-71.html
+http://www.mozilla.org/security/announce/2009/mfsa2009-70.html
+http://www.mozilla.org/security/announce/2009/mfsa2009-69.html
+http://www.mozilla.org/security/announce/2009/mfsa2009-68.html
+http://www.mozilla.org/security/announce/2009/mfsa2009-67.html
+http://www.mozilla.org/security/announce/2009/mfsa2009-66.html
+http://www.mozilla.org/security/announce/2009/mfsa2009-65.html
+http://www.vuxml.org/freebsd/01c57d20-ea26-11de-bd39-00248c9b4be7.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: firefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.5.*,1")>0 && revcomp(a:bver, b:"3.5.6,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"3.*,1")>0 && revcomp(a:bver, b:"3.0.16,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.0.16,1")<0) {
+    security_note(0, data:"Package linux-firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"2.0.1")<0) {
+    security_note(0, data:"Package seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"2.0.1")<0) {
+    security_note(0, data:"Package linux-seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_freeradius5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_freeradius5.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_freeradius5.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,86 @@
+#
+#VID 1b3f854b-e4bd-11de-b276-000d8787e1be
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 1b3f854b-e4bd-11de-b276-000d8787e1be
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66614);
+ script_cve_id("CVE-2009-3111");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: freeradius");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: freeradius
+
+CVE-2009-3111
+The rad_decode function in FreeRADIUS before 1.1.8 allows remote
+attackers to cause a denial of service (radiusd crash) via zero-length
+Tunnel-Password attributes.  NOTE: this is a regression error related
+to CVE-2003-0967.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3111
+http://freeradius.org/security.html
+http://www.milw0rm.com/exploits/9642
+http://www.vuxml.org/freebsd/1b3f854b-e4bd-11de-b276-000d8787e1be.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: freeradius");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"freeradius");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.8")<0) {
+    security_note(0, data:"Package freeradius version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_fuser.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_fuser.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_fuser.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,77 @@
+#
+#VID 4d6076fe-ee7a-11de-9cd0-001a926c7637
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 4d6076fe-ee7a-11de-9cd0-001a926c7637
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66608);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: fuser");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: fuser
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/141852
+http://www.vuxml.org/freebsd/4d6076fe-ee7a-11de-9cd0-001a926c7637.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: fuser");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"fuser");
+if(!isnull(bver) && revcomp(a:bver, b:"1142334561_2")<0) {
+    security_note(0, data:"Package fuser version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_monkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_monkey.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_monkey.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,78 @@
+#
+#VID 4465c897-ee5c-11de-b6ef-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 4465c897-ee5c-11de-b6ef-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66609);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: monkey");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: monkey
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://census-labs.com/news/2009/12/14/monkey-httpd/
+http://groups.google.com/group/monkeyd/browse_thread/thread/055b4e9b83973861/
+http://www.vuxml.org/freebsd/4465c897-ee5c-11de-b6ef-00215c6a37bb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: monkey");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"monkey");
+if(!isnull(bver) && revcomp(a:bver, b:"0.9.3")<0) {
+    security_note(0, data:"Package monkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_php56.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php56.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_php56.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,111 @@
+#
+#VID 39a25a63-eb5c-11de-b650-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 39a25a63-eb5c-11de-b650-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66610);
+ script_cve_id("CVE-2009-3557", "CVE-2009-3558", "CVE-2009-4017", "CVE-2009-4142", "CVE-2009-4143");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: php5");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: php5
+
+CVE-2009-3557
+The tempnam function in ext/standard/file.c in PHP before 5.2.12 and
+5.3.x before 5.3.1 allows context-dependent attackers to bypass
+safe_mode restrictions, and create files in group-writable or
+world-writable directories, via the dir and prefix arguments.
+
+CVE-2009-3558
+The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12
+and 5.3.x before 5.3.1 allows context-dependent attackers to bypass
+open_basedir restrictions, and create FIFO files, via the pathname and
+mode arguments, as demonstrated by creating a .htaccess file.
+
+CVE-2009-4017
+PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number
+of temporary files created when handling a multipart/form-data POST
+request, which allows remote attackers to cause a denial of service
+(resource exhaustion), and makes it easier for remote attackers to
+exploit local file inclusion vulnerabilities, via multiple requests,
+related to lack of support for the max_file_uploads directive.
+
+CVE-2009-4142
+The htmlspecialchars function in PHP before 5.2.12 does not properly
+handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences,
+and (3) invalid EUC-JP sequences, which allows remote attackers to
+conduct cross-site scripting (XSS) attacks by placing a crafted byte
+sequence before a special character.
+
+CVE-2009-4143
+PHP before 5.2.12 does not properly handle session data, which has
+unspecified impact and attack vectors related to (1) interrupt
+corruption of the SESSION superglobal array and (2) the
+session.save_path directive.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.php.net/releases/5_2_12.php
+http://www.vuxml.org/freebsd/39a25a63-eb5c-11de-b650-00215c6a37bb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: php5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"php5");
+if(!isnull(bver) && revcomp(a:bver, b:"5.2.12")<0) {
+    security_note(0, data:"Package php5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_postgresql-client.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,145 @@
+#
+#VID e7bc5600-eaa0-11de-bd9c-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID e7bc5600-eaa0-11de-bd9c-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66611);
+ script_cve_id("CVE-2009-4034", "CVE-2009-4136");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: postgresql-client, postgresql-server");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   postgresql-client
+   postgresql-server
+
+CVE-2009-4034
+PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before
+8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before
+8.4.2 does not properly handle a '\0' character in a domain name in
+the subject's Common Name (CN) field of an X.509 certificate, which
+(1) allows man-in-the-middle attackers to spoof arbitrary SSL-based
+PostgreSQL servers via a crafted server certificate issued by a
+legitimate Certification Authority, and (2) allows remote attackers to
+bypass intended client-hostname restrictions via a crafted client
+certificate issued by a legitimate Certification Authority, a related
+issue to CVE-2009-2408.
+
+CVE-2009-4136
+PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before
+8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before
+8.4.2 does not properly manage session-local state during execution of
+an index function by a database superuser, which allows remote
+authenticated users to gain privileges via a table with crafted index
+functions, as demonstrated by functions that modify (1) search_path or
+(2) a prepared statement, a related issue to CVE-2007-6600 and
+CVE-2009-3230.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: postgresql-client, postgresql-server");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"postgresql-client");
+if(!isnull(bver) && revcomp(a:bver, b:"7.4")>=0 && revcomp(a:bver, b:"7.4.27")<0) {
+    security_note(0, data:"Package postgresql-client version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.0")>=0 && revcomp(a:bver, b:"8.0.23")<0) {
+    security_note(0, data:"Package postgresql-client version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.1")>=0 && revcomp(a:bver, b:"8.1.19")<0) {
+    security_note(0, data:"Package postgresql-client version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.2")>=0 && revcomp(a:bver, b:"8.2.15")<0) {
+    security_note(0, data:"Package postgresql-client version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.3")>=0 && revcomp(a:bver, b:"8.3.9")<0) {
+    security_note(0, data:"Package postgresql-client version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.4")>=0 && revcomp(a:bver, b:"8.4.2")<0) {
+    security_note(0, data:"Package postgresql-client version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"postgresql-server");
+if(!isnull(bver) && revcomp(a:bver, b:"7.4")>=0 && revcomp(a:bver, b:"7.4.27")<0) {
+    security_note(0, data:"Package postgresql-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.0")>=0 && revcomp(a:bver, b:"8.0.23")<0) {
+    security_note(0, data:"Package postgresql-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.1")>=0 && revcomp(a:bver, b:"8.1.19")<0) {
+    security_note(0, data:"Package postgresql-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.2")>=0 && revcomp(a:bver, b:"8.2.15")<0) {
+    security_note(0, data:"Package postgresql-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.3")>=0 && revcomp(a:bver, b:"8.3.9")<0) {
+    security_note(0, data:"Package postgresql-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"8.4")>=0 && revcomp(a:bver, b:"8.4.2")<0) {
+    security_note(0, data:"Package postgresql-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_tptest.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_tptest.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/freebsd_tptest.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,76 @@
+#
+#VID 5486669e-ea9f-11de-bd9c-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 5486669e-ea9f-11de-bd9c-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66612);
+ script_bugtraq_id(33785);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: tptest");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: tptest
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: tptest");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"tptest");
+if(!isnull(bver) && revcomp(a:bver, b:"0")>0) {
+    security_note(0, data:"Package tptest version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/glsa_200912_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200912_02.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/glsa_200912_02.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,95 @@
+#
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from Gentoo's XML based advisory
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+                                                                                
+if(description)
+{
+ script_id(66602);
+ script_cve_id("CVE-2007-5380", "CVE-2007-6077", "CVE-2008-4094", "CVE-2008-7248", "CVE-2009-2422", "CVE-2009-3009", "CVE-2009-3086", "CVE-2009-4214");
+ script_version ("$Revision$");
+ script_name("Gentoo Security Advisory GLSA 200912-02 (rails)");
+
+ desc = "The remote host is missing updates announced in
+advisory GLSA 200912-02.
+
+Multiple vulnerabilities have been discovered in Rails, the worst of which
+    leading to the execution of arbitrary SQL statements.
+
+Solution:
+All Ruby on Rails 2.3.x users should upgrade to the latest version:
+
+    # emerge --sync
+    # emerge --ask --oneshot --verbose '>=dev-ruby/rails-2.3.5'
+
+All Ruby on Rails 2.2.x users should upgrade to the latest version:
+
+    # emerge --sync
+    # emerge --ask --oneshot --verbose '=dev-ruby/rails-2.2.3-r1'
+
+NOTE: All applications using Ruby on Rails should also be configured to
+    use the latest version available by running 'rake rails:update' inside
+    the application directory.
+
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200912-02
+http://bugs.gentoo.org/show_bug.cgi?id=200159
+http://bugs.gentoo.org/show_bug.cgi?id=237385
+http://bugs.gentoo.org/show_bug.cgi?id=247549
+http://bugs.gentoo.org/show_bug.cgi?id=276279
+http://bugs.gentoo.org/show_bug.cgi?id=283396
+http://bugs.gentoo.org/show_bug.cgi?id=294797
+http://www.gentoo.org/security/en/glsa/glsa-200711-17.xml
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Gentoo Security Advisory GLSA 200912-02 (rails)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Gentoo Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/gentoo");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-gentoo.inc");
+vuln = 0;
+if(ispkgvuln(pkg:"dev-ruby/rails", unaffected: make_list("ge 2.3.5", "rge 2.2.3-r1"), vulnerable: make_list("lt 2.2.2"))) {
+    vuln=1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_146_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_146_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_146_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,126 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:146-1 (imap)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66554);
+ script_cve_id("CVE-2008-5005", "CVE-2008-5006", "CVE-2008-5514");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:146-1 (imap)");
+
+ desc = "The remote host is missing an update to imap
+announced via advisory MDVSA-2009:146-1.
+
+Security vulnerabilities has been identified and fixed in University
+of Washington IMAP Toolkit:
+
+Multiple stack-based buffer overflows in (1) University of Washington
+IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine
+2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain
+privileges by specifying a long folder extension argument on the
+command line to the tmail or dmail program; and (b) remote attackers to
+execute arbitrary code by sending e-mail to a destination mailbox name
+composed of a username and '+' character followed by a long string,
+processed by the tmail or possibly dmail program (CVE-2008-5005).
+
+smtp.c in the c-client library in University of Washington IMAP Toolkit
+2007b allows remote SMTP servers to cause a denial of service (NULL
+pointer dereference and application crash) by responding to the QUIT
+command with a close of the TCP connection instead of the expected
+221 response code (CVE-2008-5006).
+
+Off-by-one error in the rfc822_output_char function in the RFC822BUFFER
+routines in the University of Washington (UW) c-client library, as
+used by the UW IMAP toolkit before imap-2007e and other applications,
+allows context-dependent attackers to cause a denial of service (crash)
+via an e-mail message that triggers a buffer overflow (CVE-2008-5514).
+
+The updated packages have been patched to prevent this. Note that the
+software was renamed to c-client starting from Mandriva Linux 2009.0
+and only provides the shared c-client library for the imap functions
+in PHP.
+
+Update:
+
+Packages for 2008.0 are provided for Corporate Desktop 2008.0
+customers.
+
+Affected: 2008.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:146-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:146-1 (imap)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"imap", rpm:"imap~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imap-devel", rpm:"imap-devel~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imap-utils", rpm:"imap-utils~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libc-client-php0", rpm:"libc-client-php0~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libc-client-php-devel", rpm:"libc-client-php-devel~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64c-client-php0", rpm:"lib64c-client-php0~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64c-client-php-devel", rpm:"lib64c-client-php-devel~2006j~1.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_189_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_189_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_189_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:189-1 (apache-mod_auth_mysql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66553);
+ script_cve_id("CVE-2008-2384");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:189-1 (apache-mod_auth_mysql)");
+
+ desc = "The remote host is missing an update to apache-mod_auth_mysql
+announced via advisory MDVSA-2009:189-1.
+
+A vulnerability has been found and corrected in mod_auth_mysql:
+
+SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql
+(aka libapache2-mod-auth-mysql) module for the Apache HTTP Server
+2.x allows remote attackers to execute arbitrary SQL commands via
+multibyte character encodings for unspecified input (CVE-2008-2384).
+
+This update provides fixes for this vulnerability.
+
+Update:
+
+Packages for 2008.0 are provided for Corporate Desktop 2008.0
+customers.
+
+Affected: 2008.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:189-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:189-1 (apache-mod_auth_mysql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache-mod_auth_mysql", rpm:"apache-mod_auth_mysql~3.0.0~13.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_244_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_244_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_244_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:244-1 (xfig)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66551);
+ script_cve_id("CVE-2009-1962");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:244-1 (xfig)");
+
+ desc = "The remote host is missing an update to xfig
+announced via advisory MDVSA-2009:244-1.
+
+A vulnerability was discovered and corrected in xfig:
+
+Xfig in Debian GNU/Linux, possibly 3.2.5, allows local users to
+read and write arbitrary files via a symlink attack on the (1)
+xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err,
+(4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7)
+xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10)
+xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID]
+is a process ID (CVE-2009-1962).
+
+This update provides a solution to this vulnerability.
+
+Update:
+
+Packages for 2008.0 are provided for Corporate Desktop 2008.0
+customers.
+
+Affected: 2008.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:244-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:244-1 (xfig)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xfig", rpm:"xfig~3.2.5~0.11.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_334.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_334.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_334.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:334 (poppler)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66544);
+ script_cve_id("CVE-2009-0791", "CVE-2009-3605", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:334 (poppler)");
+
+ desc = "The remote host is missing an update to poppler
+announced via advisory MDVSA-2009:334.
+
+Affected: Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:334
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:334 (poppler)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpoppler0", rpm:"libpoppler0~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler0-devel", rpm:"libpoppler0-devel~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt0", rpm:"libpoppler-qt0~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt0-devel", rpm:"libpoppler-qt0-devel~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler0", rpm:"lib64poppler0~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler0-devel", rpm:"lib64poppler0-devel~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt0", rpm:"lib64poppler-qt0~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt0-devel", rpm:"lib64poppler-qt0-devel~0.4.1~3.10.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_335.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_335.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_335.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,195 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:335 (ffmpeg)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66545);
+ script_cve_id("CVE-2007-6718", "CVE-2008-4610");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:335 (ffmpeg)");
+
+ desc = "The remote host is missing an update to ffmpeg
+announced via advisory MDVSA-2009:335.
+
+A vulnerability was discovered and corrected in ffmpeg:
+
+MPlayer allows remote attackers to cause a denial of service
+(application crash) via (1) a malformed AAC file, as demonstrated
+by lol-vlc.aac; or (2) a malformed Ogg Media (OGM) file, as
+demonstrated by lol-ffplay.ogm, different vectors than CVE-2007-6718
+(CVE-2008-4610).
+
+Packages for 2008.0 are being provided due to extended support for
+Corporate products.
+
+This update provides a solution to this vulnerability.
+
+Affected: 2008.0, 2009.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:335
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:335 (ffmpeg)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ffmpeg", rpm:"ffmpeg~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libavformats51", rpm:"libavformats51~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libavutil49", rpm:"libavutil49~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg51", rpm:"libffmpeg51~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg51-devel", rpm:"libffmpeg51-devel~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg51-static-devel", rpm:"libffmpeg51-static-devel~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64avformats51", rpm:"lib64avformats51~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64avutil49", rpm:"lib64avutil49~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg51", rpm:"lib64ffmpeg51~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg51-devel", rpm:"lib64ffmpeg51-devel~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg51-static-devel", rpm:"lib64ffmpeg51-static-devel~0.4.9~3.pre1.8994.2.4mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ffmpeg", rpm:"ffmpeg~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libavformats52", rpm:"libavformats52~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libavutil49", rpm:"libavutil49~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg51", rpm:"libffmpeg51~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg-devel", rpm:"libffmpeg-devel~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg-static-devel", rpm:"libffmpeg-static-devel~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libswscaler0", rpm:"libswscaler0~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64avformats52", rpm:"lib64avformats52~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64avutil49", rpm:"lib64avutil49~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg51", rpm:"lib64ffmpeg51~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg-devel", rpm:"lib64ffmpeg-devel~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg-static-devel", rpm:"lib64ffmpeg-static-devel~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64swscaler0", rpm:"lib64swscaler0~0.4.9~3.pre1.14161.1.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ffmpeg", rpm:"ffmpeg~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libavformats52", rpm:"libavformats52~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libavutil49", rpm:"libavutil49~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg51", rpm:"libffmpeg51~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg-devel", rpm:"libffmpeg-devel~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libffmpeg-static-devel", rpm:"libffmpeg-static-devel~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libswscaler0", rpm:"libswscaler0~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64avformats52", rpm:"lib64avformats52~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64avutil49", rpm:"lib64avutil49~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg51", rpm:"lib64ffmpeg51~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg-devel", rpm:"lib64ffmpeg-devel~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ffmpeg-static-devel", rpm:"lib64ffmpeg-static-devel~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64swscaler0", rpm:"lib64swscaler0~0.4.9~3.pre1.14161.1.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_336.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_336.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_336.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,251 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:336 (koffice)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66546);
+ script_cve_id("CVE-2009-3606", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:336 (koffice)");
+
+ desc = "The remote host is missing an update to koffice
+announced via advisory MDVSA-2009:336.
+
+Security vulnerabilities have been discovered and fixed in pdf
+processing code embedded in koffice package (CVE-2009-3606 and
+CVE-2009-3609).
+
+This update fixes these vulnerabilities.
+
+Packages for 2008.0 are being provided due to extended support for
+Corporate products.
+
+Affected: 2008.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:336
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:336 (koffice)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"koffice", rpm:"koffice~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-karbon", rpm:"koffice-karbon~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kexi", rpm:"koffice-kexi~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kformula", rpm:"koffice-kformula~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kivio", rpm:"koffice-kivio~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-koshell", rpm:"koffice-koshell~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kplato", rpm:"koffice-kplato~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kpresenter", rpm:"koffice-kpresenter~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-krita", rpm:"koffice-krita~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kspread", rpm:"koffice-kspread~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kugar", rpm:"koffice-kugar~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-kword", rpm:"koffice-kword~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"koffice-progs", rpm:"koffice-progs~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-karbon", rpm:"libkoffice2-karbon~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-karbon-devel", rpm:"libkoffice2-karbon-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kexi", rpm:"libkoffice2-kexi~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kexi-devel", rpm:"libkoffice2-kexi-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kformula", rpm:"libkoffice2-kformula~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kformula-devel", rpm:"libkoffice2-kformula-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kivio", rpm:"libkoffice2-kivio~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kivio-devel", rpm:"libkoffice2-kivio-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-koshell", rpm:"libkoffice2-koshell~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kplato", rpm:"libkoffice2-kplato~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kpresenter", rpm:"libkoffice2-kpresenter~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kpresenter-devel", rpm:"libkoffice2-kpresenter-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-krita", rpm:"libkoffice2-krita~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-krita-devel", rpm:"libkoffice2-krita-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kspread", rpm:"libkoffice2-kspread~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kspread-devel", rpm:"libkoffice2-kspread-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kugar", rpm:"libkoffice2-kugar~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kugar-devel", rpm:"libkoffice2-kugar-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kword", rpm:"libkoffice2-kword~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-kword-devel", rpm:"libkoffice2-kword-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-progs", rpm:"libkoffice2-progs~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkoffice2-progs-devel", rpm:"libkoffice2-progs-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-karbon", rpm:"lib64koffice2-karbon~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-karbon-devel", rpm:"lib64koffice2-karbon-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kexi", rpm:"lib64koffice2-kexi~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kexi-devel", rpm:"lib64koffice2-kexi-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kformula", rpm:"lib64koffice2-kformula~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kformula-devel", rpm:"lib64koffice2-kformula-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kivio", rpm:"lib64koffice2-kivio~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kivio-devel", rpm:"lib64koffice2-kivio-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-koshell", rpm:"lib64koffice2-koshell~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kplato", rpm:"lib64koffice2-kplato~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kpresenter", rpm:"lib64koffice2-kpresenter~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kpresenter-devel", rpm:"lib64koffice2-kpresenter-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-krita", rpm:"lib64koffice2-krita~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-krita-devel", rpm:"lib64koffice2-krita-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kspread", rpm:"lib64koffice2-kspread~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kspread-devel", rpm:"lib64koffice2-kspread-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kugar", rpm:"lib64koffice2-kugar~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kugar-devel", rpm:"lib64koffice2-kugar-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kword", rpm:"lib64koffice2-kword~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-kword-devel", rpm:"lib64koffice2-kword-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-progs", rpm:"lib64koffice2-progs~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64koffice2-progs-devel", rpm:"lib64koffice2-progs-devel~1.6.3~9.3mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_339.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_339.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_339.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,897 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:339 (firefox)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66547);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-2654", "CVE-2009-3985", "CVE-2009-3986", "CVE-2009-3987");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:339 (firefox)");
+
+ desc = "The remote host is missing an update to firefox
+announced via advisory MDVSA-2009:339.
+
+Security issues were identified and fixed in firefox 3.0.x.
+For details, please visit the referenced advisories.
+
+Additionally, some packages which require so, have been rebuilt and
+are being provided as updates.
+
+Affected: 2008.0, 2009.1, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:339
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.16
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:339 (firefox)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mn", rpm:"firefox-mn~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtotem-plparser7", rpm:"libtotem-plparser7~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtotem-plparser-devel", rpm:"libtotem-plparser-devel~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner1.9", rpm:"libxulrunner1.9~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner-unstable-devel", rpm:"libxulrunner-unstable-devel~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-firefox-ext-blogrovr", rpm:"mozilla-firefox-ext-blogrovr~1.1.798~0.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-firefox-ext-foxmarks", rpm:"mozilla-firefox-ext-foxmarks~2.7.2~0.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-firefox-ext-scribefire", rpm:"mozilla-firefox-ext-scribefire~3.2.3~0.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"totem", rpm:"totem~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"totem-common", rpm:"totem-common~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"totem-gstreamer", rpm:"totem-gstreamer~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"totem-mozilla", rpm:"totem-mozilla~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"totem-mozilla-gstreamer", rpm:"totem-mozilla-gstreamer~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.22.1~0.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64totem-plparser7", rpm:"lib64totem-plparser7~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64totem-plparser-devel", rpm:"lib64totem-plparser-devel~2.20.1~1.10mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner1.9", rpm:"lib64xulrunner1.9~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner-unstable-devel", rpm:"lib64xulrunner-unstable-devel~1.9.0.16~0.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle", rpm:"beagle~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-crawl-system", rpm:"beagle-crawl-system~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-doc", rpm:"beagle-doc~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-epiphany", rpm:"beagle-epiphany~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-evolution", rpm:"beagle-evolution~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-gui", rpm:"beagle-gui~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-gui-qt", rpm:"beagle-gui-qt~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"beagle-libs", rpm:"beagle-libs~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"epiphany", rpm:"epiphany~2.26.1~1.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"epiphany-devel", rpm:"epiphany-devel~2.26.1~1.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ext-beagle", rpm:"firefox-ext-beagle~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ext-blogrovr", rpm:"firefox-ext-blogrovr~1.1.798~2.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ext-foxmarks", rpm:"firefox-ext-foxmarks~2.7.2~2.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ext-mozvoikko", rpm:"firefox-ext-mozvoikko~0.9.6~2.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ext-r-kiosk", rpm:"firefox-ext-r-kiosk~0.7.2~2.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ext-scribefire", rpm:"firefox-ext-scribefire~3.2.3~2.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mn", rpm:"firefox-mn~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-theme-kde4ff", rpm:"firefox-theme-kde4ff~0.14~9.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.25.3~3.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"google-gadgets-common", rpm:"google-gadgets-common~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"google-gadgets-gtk", rpm:"google-gadgets-gtk~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"google-gadgets-qt", rpm:"google-gadgets-qt~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"google-gadgets-xul", rpm:"google-gadgets-xul~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libggadget1.0_0", rpm:"libggadget1.0_0~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libggadget-gtk1.0_0", rpm:"libggadget-gtk1.0_0~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libggadget-qt1.0_0", rpm:"libggadget-qt1.0_0~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgoogle-gadgets-devel", rpm:"libgoogle-gadgets-devel~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopensc2", rpm:"libopensc2~0.11.7~1.8mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopensc-devel", rpm:"libopensc-devel~0.11.7~1.8mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner1.9", rpm:"libxulrunner1.9~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner-unstable-devel", rpm:"libxulrunner-unstable-devel~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-plugin-opensc", rpm:"mozilla-plugin-opensc~0.11.7~1.8mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-thunderbird-beagle", rpm:"mozilla-thunderbird-beagle~0.3.9~9.9mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"opensc", rpm:"opensc~0.11.7~1.8mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xpcom", rpm:"python-xpcom~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.26.0~3.6mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ggadget1.0_0", rpm:"lib64ggadget1.0_0~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ggadget-gtk1.0_0", rpm:"lib64ggadget-gtk1.0_0~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ggadget-qt1.0_0", rpm:"lib64ggadget-qt1.0_0~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64google-gadgets-devel", rpm:"lib64google-gadgets-devel~0.10.5~8.7mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64opensc2", rpm:"lib64opensc2~0.11.7~1.8mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64opensc-devel", rpm:"lib64opensc-devel~0.11.7~1.8mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner1.9", rpm:"lib64xulrunner1.9~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner-unstable-devel", rpm:"lib64xulrunner-unstable-devel~1.9.0.16~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mn", rpm:"firefox-mn~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.19.1~20.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner1.9", rpm:"libxulrunner1.9~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxulrunner-unstable-devel", rpm:"libxulrunner-unstable-devel~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.24.0~3.12mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner1.9", rpm:"lib64xulrunner1.9~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xulrunner-unstable-devel", rpm:"lib64xulrunner-unstable-devel~1.9.0.16~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_340.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_340.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_340.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:340 (jpgraph)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66548);
+ script_cve_id("CVE-2009-4422");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:340 (jpgraph)");
+
+ desc = "The remote host is missing an update to jpgraph
+announced via advisory MDVSA-2009:340.
+
+A vulnerability has been found and corrected in jpgraph:
+
+Multiple cross-site scripting (XSS) vulnerabilities in the
+GetURLArguments function in jpgraph.php in Aditus Consulting JpGraph
+3.0.6 allow remote attackers to inject arbitrary web script or HTML
+via a key to csim_in_html_ex1.php, and other unspecified vectors
+(CVE-2009-4422).
+
+This update provides a solution to this vulnerability.
+
+Affected: Corporate 4.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:340
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:340 (jpgraph)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"php5-jpgraph", rpm:"php5-jpgraph~2.1.1~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-jpgraph-doc", rpm:"php5-jpgraph-doc~2.1.1~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-jpgraph", rpm:"php-jpgraph~2.3.3~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-jpgraph-doc", rpm:"php-jpgraph-doc~2.3.3~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_341.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_341.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_341.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,83 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:341 (dstat)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66549);
+ script_cve_id("CVE-2009-3894", "CVE-2009-4081");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:341 (dstat)");
+
+ desc = "The remote host is missing an update to dstat
+announced via advisory MDVSA-2009:341.
+
+Multiple vulnerabilities has been found and corrected in dstat:
+
+Multiple untrusted search path vulnerabilities in dstat before 0.7.0
+allow local users to gain privileges via a Trojan horse Python module
+in (1) the current working directory or (2) a certain subdirectory
+of the current working directory (CVE-2009-3894, CVE-2009-4081).
+
+This update provides a solution to these vulnerabilities.
+
+Affected: Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:341
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:341 (dstat)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dstat", rpm:"dstat~0.6.1~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_342.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_342.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_342.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:342 (acpid)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66550);
+ script_cve_id("CVE-2009-4033", "CVE-2009-4235");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:342 (acpid)");
+
+ desc = "The remote host is missing an update to acpid
+announced via advisory MDVSA-2009:342.
+
+Multiple vulnerabilities has been found and corrected in acpid:
+
+A certain Red Hat patch for acpid 1.0.4 effectively triggers a call
+to the open function with insufficient arguments, which might allow
+local users to leverage weak permissions on /var/log/acpid, and obtain
+sensitive information by reading this file, cause a denial of service
+by overwriting this file, or gain privileges by executing this file
+(CVE-2009-4033).
+
+acpid 1.0.4 sets an unrestrictive umask, which might allow local users
+to leverage weak permissions on /var/log/acpid, and obtain sensitive
+information by reading this file or cause a denial of service by
+overwriting this file, a different vulnerability than CVE-2009-4033
+(CVE-2009-4235).
+
+This update provides a solution to these vulnerabilities.
+
+Affected: Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:342
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:342 (acpid)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"acpid", rpm:"acpid~1.0.4~6.4.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_344.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_344.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/mdksa_2009_344.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:344 (perl-DBD-Pg)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66552);
+ script_cve_id("CVE-2009-1341", "CVE-2009-0663");
+ script_version ("$Revision$");
+ script_name("Mandriva Security Advisory MDVSA-2009:344 (perl-DBD-Pg)");
+
+ desc = "The remote host is missing an update to perl-DBD-Pg
+announced via advisory MDVSA-2009:344.
+
+Multiple vulnerabilities was discovered and corrected in perl-DBD-Pg:
+
+Heap-based buffer overflow in the DBD::Pg module for Perl might allow
+context-dependent attackers to execute arbitrary code via unspecified
+input to an application that uses the getline and pg_getline functions
+to read database rows.
+
+Memory leak in the dequote_bytea function in quote.c in the DBD::Pg
+(aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows
+context-dependent attackers to cause a denial of service (memory
+consumption) by fetching data with BYTEA columns (CVE-2009-1341).
+
+Packages for 2008.0 are provided for Corporate Desktop 2008.0
+customers.
+
+This update provides a fix for these vulnerabilities.
+
+Affected: 2008.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:344
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandriva Security Advisory MDVSA-2009:344 (perl-DBD-Pg)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl-DBD-Pg", rpm:"perl-DBD-Pg~1.49~2.1mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1615.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1615.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1615.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,92 @@
+#CESA-2009:1615 66617 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1615 (xerces-j2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66617);
+ script_cve_id("CVE-2009-2625");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1615 (xerces-j2)");
+
+ desc = "The remote host is missing updates to xerces-j2 announced in
+advisory CESA-2009:1615.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1615
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1615
+https://rhn.redhat.com/errata/RHSA-2009-1615.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1615 (xerces-j2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xerces-j2", rpm:"xerces-j2~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-demo", rpm:"xerces-j2-demo~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-apis", rpm:"xerces-j2-javadoc-apis~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-impl", rpm:"xerces-j2-javadoc-impl~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-other", rpm:"xerces-j2-javadoc-other~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-xni", rpm:"xerces-j2-javadoc-xni~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-scripts", rpm:"xerces-j2-scripts~2.7.1~7jpp.2.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1619.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1619.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1619.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,74 @@
+#CESA-2009:1619 66616 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1619 (dstat)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66616);
+ script_cve_id("CVE-2009-3894");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1619 (dstat)");
+
+ desc = "The remote host is missing updates to dstat announced in
+advisory CESA-2009:1619.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1619
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1619
+https://rhn.redhat.com/errata/RHSA-2009-1619.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1619 (dstat)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dstat", rpm:"dstat~0.6.6~3.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1620.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,95 @@
+#CESA-2009:1620 66615 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1620 (bind)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66615);
+ script_cve_id("CVE-2009-4022");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1620 (bind)");
+
+ desc = "The remote host is missing updates to bind announced in
+advisory CESA-2009:1620.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1620
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1620
+https://rhn.redhat.com/errata/RHSA-2009-1620.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1620 (bind)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bind", rpm:"bind~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-chroot", rpm:"bind-chroot~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-libbind-devel", rpm:"bind-libbind-devel~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-libs", rpm:"bind-libs~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-sdb", rpm:"bind-sdb~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"caching-nameserver", rpm:"caching-nameserver~9.3.6~4.P1.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1625.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1625.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1625.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -1,4 +1,4 @@
-#CESA-2009:1625 66468 4
+#CESA-2009:1625 66468 6
 # $Id$
 # Description: Auto-generated from advisory CESA-2009:1625 (expat)
 #
@@ -77,6 +77,12 @@
 if(isrpmvuln(pkg:"expat-devel", rpm:"expat-devel~1.95.7~4.el4_8.2", rls:"CentOS4")) {
     vuln = 1;
 }
+if(isrpmvuln(pkg:"expat", rpm:"expat~1.95.8~8.3.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"expat-devel", rpm:"expat-devel~1.95.8~8.3.el5_4.2", rls:"CentOS5")) {
+    vuln = 1;
+}
 
 if(vuln) {
     security_hole(0);

Added: trunk/openvas-plugins/scripts/ovcesa2009_1642.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1642.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1642.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,74 @@
+#CESA-2009:1642 66619 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1642 (acpid)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66619);
+ script_cve_id("CVE-2009-4033");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1642 (acpid)");
+
+ desc = "The remote host is missing updates to acpid announced in
+advisory CESA-2009:1642.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1642
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1642
+https://rhn.redhat.com/errata/RHSA-2009-1642.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1642 (acpid)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"acpid", rpm:"acpid~1.0.4~9.el5_4.1", rls:"CentOS5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1646.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1646.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1646.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -1,4 +1,4 @@
-#CESA-2009:1646 66528 4
+#CESA-2009:1646 66528 6
 # $Id$
 # Description: Auto-generated from advisory CESA-2009:1646 (libtool)
 #
@@ -77,6 +77,15 @@
 if(isrpmvuln(pkg:"libtool-libs", rpm:"libtool-libs~1.5.6~5.el4_8", rls:"CentOS4")) {
     vuln = 1;
 }
+if(isrpmvuln(pkg:"libtool", rpm:"libtool~1.5.22~7.el5_4", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-ltdl", rpm:"libtool-ltdl~1.5.22~7.el5_4", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtool-ltdl-devel", rpm:"libtool-ltdl-devel~1.5.22~7.el5_4", rls:"CentOS5")) {
+    vuln = 1;
+}
 
 if(vuln) {
     security_hole(0);

Modified: trunk/openvas-plugins/scripts/ovcesa2009_1648.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1648.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1648.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -1,4 +1,4 @@
-#CESA-2009:1648 66527 2
+#CESA-2009:1648 66527 6
 # $Id$
 # Description: Auto-generated from advisory CESA-2009:1648 (ntp)
 #
@@ -68,6 +68,12 @@
 if(isrpmvuln(pkg:"ntp", rpm:"ntp~4.2.0.a.20040617~8.el4_8.1", rls:"CentOS4")) {
     vuln = 1;
 }
+if(isrpmvuln(pkg:"ntp", rpm:"ntp~4.2.0.a.20040617~8.el4_8.2.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ntp", rpm:"ntp~4.2.2p1~9.el5.centos.2.1", rls:"CentOS5")) {
+    vuln = 1;
+}
 
 if(vuln) {
     security_hole(0);

Added: trunk/openvas-plugins/scripts/ovcesa2009_1659.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1659.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1659.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,83 @@
+#CESA-2009:1659 66620 1
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1659 (kvm)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66620);
+ script_cve_id("CVE-2009-4031");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1659 (kvm)");
+
+ desc = "The remote host is missing updates to kvm announced in
+advisory CESA-2009:1659.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1659
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1659
+https://rhn.redhat.com/errata/RHSA-2009-1659.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1659 (kvm)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kmod-kvm", rpm:"kmod-kvm~83~105.el5_4.13", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kvm", rpm:"kvm~83~105.el5_4.13", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kvm-qemu-img", rpm:"kvm-qemu-img~83~105.el5_4.13", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kvm-tools", rpm:"kvm-tools~83~105.el5_4.13", rls:"CentOS5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1670.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,101 @@
+#CESA-2009:1670 66618 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1670 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66618);
+ script_cve_id("CVE-2009-3612", "CVE-2009-3620", "CVE-2009-3621", "CVE-2009-3726");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1670 (kernel)");
+
+ desc = "The remote host is missing updates to kernel announced in
+advisory CESA-2009:1670.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1670
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1670
+https://rhn.redhat.com/errata/RHSA-2009-1670.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1670 (kernel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE", rpm:"kernel-PAE~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-devel", rpm:"kernel-PAE-devel~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen-devel", rpm:"kernel-xen-devel~2.6.18~164.9.1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1671.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,104 @@
+#CESA-2009:1671 66622 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1671 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66622);
+ script_cve_id("CVE-2009-2910", "CVE-2009-3613", "CVE-2009-3620", "CVE-2009-3621");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1671 (kernel)");
+
+ desc = "The remote host is missing updates to kernel announced in
+advisory CESA-2009:1671.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1671
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1671
+https://rhn.redhat.com/errata/RHSA-2009-1671.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1671 (kernel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem", rpm:"kernel-hugemem~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem-devel", rpm:"kernel-hugemem-devel~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU", rpm:"kernel-xenU~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU-devel", rpm:"kernel-xenU-devel~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp", rpm:"kernel-largesmp~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp-devel", rpm:"kernel-largesmp-devel~2.6.9~89.0.18.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1673.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1673.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1673.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,89 @@
+#CESA-2009:1673 66623 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1673 (seamonkey)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66623);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3983", "CVE-2009-3984");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1673 (seamonkey)");
+
+ desc = "The remote host is missing updates to seamonkey announced in
+advisory CESA-2009:1673.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1673
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1673
+https://rhn.redhat.com/errata/RHSA-2009-1673.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1673 (seamonkey)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~51.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~51.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~51.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~51.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~51.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~51.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1674.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,86 @@
+#CESA-2009:1674 66621 4
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1674 (firefox)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66621);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1674 (firefox)");
+
+ desc = "The remote host is missing updates to firefox announced in
+advisory CESA-2009:1674.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1674
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1674
+https://rhn.redhat.com/errata/RHSA-2009-1674.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1674 (firefox)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~1.el5.centos", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.16~2.el5_4", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.0.16~2.el5_4", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.16~2.el5_4", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.16~4.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1680.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1680.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1680.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,74 @@
+#CESA-2009:1680 66624 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1680 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66624);
+ script_cve_id("CVE-2009-4035");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1680 (xpdf)");
+
+ desc = "The remote host is missing updates to xpdf announced in
+advisory CESA-2009:1680.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1680
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1680
+https://rhn.redhat.com/errata/RHSA-2009-1680.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1680 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.00~23.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1681.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1681.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1681.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,74 @@
+#CESA-2009:1681 66625 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1681 (gpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66625);
+ script_cve_id("CVE-2009-4035");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1681 (gpdf)");
+
+ desc = "The remote host is missing updates to gpdf announced in
+advisory CESA-2009:1681.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1681
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1681
+https://rhn.redhat.com/errata/RHSA-2009-1681.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1681 (gpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gpdf", rpm:"gpdf~2.8.2~7.7.2.el4_8.6", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1682.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1682.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1682.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,77 @@
+#CESA-2009:1682 66626 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1682 (kdegraphics)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66626);
+ script_cve_id("CVE-2009-4035");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1682 (kdegraphics)");
+
+ desc = "The remote host is missing updates to kdegraphics announced in
+advisory CESA-2009:1682.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1682
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1682
+https://rhn.redhat.com/errata/RHSA-2009-1682.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1682 (kdegraphics)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics", rpm:"kdegraphics~3.3.1~17.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-devel", rpm:"kdegraphics-devel~3.3.1~17.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sa_2009_062.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_062.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_062.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,85 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SA:2009:062 (flash-player)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66600);
+ script_cve_id("CVE-2009-3794", "CVE-2009-3796", "CVE-2009-3797", "CVE-2009-3798", "CVE-2009-3799", "CVE-2009-3800", "CVE-2009-3951");
+ script_version ("$Revision$");
+ script_name("SuSE Security Advisory SUSE-SA:2009:062 (flash-player)");
+
+ desc = "The remote host is missing updates announced in
+advisory SUSE-SA:2009:062.
+
+A security update was released for the Adobe Flash Player 10.
+
+Specially crafted Flash (SWF) files can cause overflows in
+flash-player. Attackers could potentially exploit that to execute
+arbitrary code.
+
+Fixed packages for Adobe Flash Player 9 (the version found in SUSE
+Linux Enterprise 10, Novell Linux Desktop 9 and openSUSE 11.0) will
+hopefully be released in the new year.
+
+Solution:
+Update your system with the packages as indicated in
+the referenced security advisory.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:062
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SA:2009:062 (flash-player)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"flash-player", rpm:"flash-player~10.0.42.34~0.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"flash-player", rpm:"flash-player~10.0.42.34~0.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sa_2009_063.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_063.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_063.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,253 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SA:2009:063 (MozillaFirefox)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66601);
+ script_cve_id("CVE-2009-3388", "CVE-2009-3389", "CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3981", "CVE-2009-3982", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
+ script_version ("$Revision$");
+ script_name("SuSE Security Advisory SUSE-SA:2009:063 (MozillaFirefox)");
+
+ desc = "The remote host is missing updates announced in
+advisory SUSE-SA:2009:063.
+
+The Mozilla Firefox browsers and XUL engines were updated to the
+current stable releases fixing lots of bugs and various security
+issues.
+
+SUSE Linux Enterprise 10 SP2, SP3, SUSE Linux Enterprise 11 and
+openSUSE 11.2 were updated to Firefox 3.5.6.
+openSUSE 11.0 and 11.1 were updated to Firefox 3.0.16.
+
+The following security issues were fixed:
+* MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982
+Crashes with evidence of memory corruption (rv:1.9.1.6)
+CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
+
+* MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816)
+Memory safety fixes in liboggplay media library
+CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
+
+* MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613)
+Integer overflow, crash in libtheora video library
+CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
+
+* MFSA 2009-68/CVE-2009-3983 (bmo#487872)
+NTLM reflection vulnerability
+CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
+
+* MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232)
+Location bar spoofing vulnerabilities
+CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
+
+
+* MFSA 2009-70/CVE-2009-3986 (bmo#522430)
+Privilege escalation via chrome window.opener
+CVSS v2 Base Score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C)
+
+Solution:
+Update your system with the packages as indicated in
+the referenced security advisory.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:063
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SA:2009:063 (MozillaFirefox)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox-debuginfo", rpm:"MozillaFirefox-debuginfo~3.5.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-debugsource", rpm:"MozillaFirefox-debugsource~3.5.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-debuginfo", rpm:"mozilla-xulrunner191-debuginfo~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-debugsource", rpm:"mozilla-xulrunner191-debugsource~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xpcom191-debuginfo", rpm:"python-xpcom191-debuginfo~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.5.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-branding-upstream", rpm:"MozillaFirefox-branding-upstream~3.5.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations-common", rpm:"MozillaFirefox-translations-common~3.5.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations-other", rpm:"MozillaFirefox-translations-other~3.5.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191", rpm:"mozilla-xulrunner191~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-devel", rpm:"mozilla-xulrunner191-devel~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-gnomevfs", rpm:"mozilla-xulrunner191-gnomevfs~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-translations-common", rpm:"mozilla-xulrunner191-translations-common~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-translations-other", rpm:"mozilla-xulrunner191-translations-other~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xpcom191", rpm:"python-xpcom191~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-debuginfo", rpm:"MozillaFirefox-debuginfo~3.0.16~0.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-debugsource", rpm:"MozillaFirefox-debugsource~3.0.16~0.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-debuginfo", rpm:"mozilla-xulrunner190-debuginfo~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-debugsource", rpm:"mozilla-xulrunner190-debugsource~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.0.16~0.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-branding-upstream", rpm:"MozillaFirefox-branding-upstream~3.0.16~0.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.0.16~0.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-devel", rpm:"mozilla-xulrunner190-devel~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xpcom190", rpm:"python-xpcom190~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-debuginfo", rpm:"MozillaFirefox-debuginfo~3.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-debugsource", rpm:"MozillaFirefox-debugsource~3.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-debuginfo", rpm:"mozilla-xulrunner190-debuginfo~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-debugsource", rpm:"mozilla-xulrunner190-debugsource~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-devel", rpm:"mozilla-xulrunner190-devel~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-64bit", rpm:"mozilla-xulrunner190-64bit~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-64bit", rpm:"mozilla-xulrunner190-gnomevfs-64bit~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-64bit", rpm:"mozilla-xulrunner190-translations-64bit~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-debuginfo-32bit", rpm:"mozilla-xulrunner191-debuginfo-32bit~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-32bit", rpm:"mozilla-xulrunner191-32bit~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-gnomevfs-32bit", rpm:"mozilla-xulrunner191-gnomevfs-32bit~1.9.1.6~1.1.1", rls:"openSUSE11.2")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-debuginfo-32bit", rpm:"mozilla-xulrunner190-debuginfo-32bit~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-32bit", rpm:"mozilla-xulrunner190-32bit~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-32bit", rpm:"mozilla-xulrunner190-gnomevfs-32bit~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-32bit", rpm:"mozilla-xulrunner190-translations-32bit~1.9.0.16~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-32bit", rpm:"mozilla-xulrunner190-32bit~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-32bit", rpm:"mozilla-xulrunner190-gnomevfs-32bit~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-32bit", rpm:"mozilla-xulrunner190-translations-32bit~1.9.0.16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_873_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_873_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ubuntu_873_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,349 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-873-1 (xulrunner-1.9)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66605);
+ script_cve_id("CVE-2009-3979", "CVE-2009-3981", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-873-1 (xulrunner-1.9)");
+
+ desc = "The remote host is missing an update to xulrunner-1.9
+announced via advisory USN-873-1.
+
+Details follow:
+
+Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel, Olli Pettay, and
+David James discovered several flaws in the browser and JavaScript engines
+of Firefox. If a user were tricked into viewing a malicious website, a
+remote attacker could cause a denial of service or possibly execute
+arbitrary code with the privileges of the user invoking the program.
+(CVE-2009-3979, CVE-2009-3981, CVE-2009-3986)
+
+Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox.
+If an NTLM authenticated user visited a malicious website, a remote
+attacker could send requests to other applications, authenticated as the
+user. (CVE-2009-3983)
+
+Jonathan Morgan discovered that Firefox did not properly display SSL
+indicators under certain circumstances. This could be used by an attacker
+to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)
+
+Jordi Chancel discovered that Firefox did not properly display invalid URLs
+for a blank page. If a user were tricked into accessing a malicious
+website, an attacker could exploit this to spoof the location bar, such as
+in a phishing attack. (CVE-2009-3985)
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 8.04 LTS:
+  firefox-3.0                     3.0.16+nobinonly-0ubuntu0.8.04.1
+  xulrunner-1.9                   1.9.0.16+nobinonly-0ubuntu0.8.04.1
+
+Ubuntu 8.10:
+  abrowser                        3.0.16+nobinonly-0ubuntu0.8.10.1
+  firefox-3.0                     3.0.16+nobinonly-0ubuntu0.8.10.1
+  xulrunner-1.9                   1.9.0.16+nobinonly-0ubuntu0.8.10.1
+
+Ubuntu 9.04:
+  abrowser                        3.0.16+nobinonly-0ubuntu0.9.04.1
+  firefox-3.0                     3.0.16+nobinonly-0ubuntu0.9.04.1
+  xulrunner-1.9                   1.9.0.16+nobinonly-0ubuntu0.9.04.1
+
+After a standard system upgrade you need to restart Firefox and any
+applications that use xulrunner to effect the necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-873-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-873-1 (xulrunner-1.9)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"firefox-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-venkman", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-libthai", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-venkman", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dom-inspector", ver:"1.9.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-venkman", ver:"1.9.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0", ver:"3.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dev", ver:"1.9.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-gnome-support", ver:"1.9.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9", ver:"1.9.0.16+nobinonly-0ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-venkman", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-libthai", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-venkman", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dom-inspector", ver:"1.9.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-venkman", ver:"1.9.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.0-branding", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-branding", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dev", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0", ver:"3.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dev", ver:"1.9.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-gnome-support", ver:"1.9.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9", ver:"1.9.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.0.16+nobinonly-0ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-dev", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-dev", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-dev", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-venkman", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-granparadiso", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-libthai", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-dom-inspector", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk-venkman", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-trunk", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dom-inspector", ver:"1.9.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-venkman", ver:"1.9.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.0-branding", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-branding", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dev", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-gnome-support", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0", ver:"3.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dev", ver:"1.9.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-gnome-support", ver:"1.9.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9", ver:"1.9.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.0.16+nobinonly-0ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_874_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_874_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ubuntu_874_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,204 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-874-1 (xulrunner-1.9.1)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66606);
+ script_cve_id("CVE-2009-3388", "CVE-2009-3389", "CVE-2009-3979", "CVE-2009-3980", "CVE-2009-3982", "CVE-2009-3983", "CVE-2009-3984", "CVE-2009-3985", "CVE-2009-3986");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-874-1 (xulrunner-1.9.1)");
+
+ desc = "The remote host is missing an update to xulrunner-1.9.1
+announced via advisory USN-874-1.
+
+Details follow:
+
+Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel, Olli Pettay, and
+David James discovered several flaws in the browser and JavaScript engines
+of Firefox. If a user were tricked into viewing a malicious website, a
+remote attacker could cause a denial of service or possibly execute
+arbitrary code with the privileges of the user invoking the program.
+(CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3986)
+
+Takehiro Takahashi discovered flaws in the NTLM implementation in Firefox.
+If an NTLM authenticated user visited a malicious website, a remote
+attacker could send requests to other applications, authenticated as the
+user. (CVE-2009-3983)
+
+Jonathan Morgan discovered that Firefox did not properly display SSL
+indicators under certain circumstances. This could be used by an attacker
+to spoof an encrypted page, such as in a phishing attack. (CVE-2009-3984)
+
+Jordi Chancel discovered that Firefox did not properly display invalid URLs
+for a blank page. If a user were tricked into accessing a malicious
+website, an attacker could exploit this to spoof the location bar, such as
+in a phishing attack. (CVE-2009-3985)
+
+David Keeler, Bob Clary, and Dan Kaminsky discovered several flaws in third
+party media libraries. If a user were tricked into opening a crafted media
+file, a remote attacker could cause a denial of service or possibly execute
+arbitrary code with the privileges of the user invoking the program.
+(CVE-2009-3388, CVE-2009-3389)
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 9.10:
+  firefox-3.5                     3.5.6+nobinonly-0ubuntu0.9.10.1
+  xulrunner-1.9.1                 1.9.1.6+nobinonly-0ubuntu0.9.10.1
+
+After a standard system upgrade you need to restart Firefox and any
+applications that use xulrunner to effect the necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-874-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-874-1 (xulrunner-1.9.1)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"abrowser", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dev", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.1-dbg", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.1-dev", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-gnome-support", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.0-branding", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.0", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.1-branding", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.1", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.5", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-branding", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-dom-inspector", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-gnome-support", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0-venkman", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.0", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.1-branding", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.1-gnome-support", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.1", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-dom-inspector", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"abrowser-3.5-branding", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.5-branding", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.5-dbg", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.5-dev", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.5-gnome-support", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"firefox-3.5", ver:"3.5.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1-dbg", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1-dev", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1-gnome-support", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1-testsuite-dev", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1-testsuite", ver:"1.9.1.6+nobinonly-0ubuntu0.9.10.1", rls:"UBUNTU9.10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_875_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_875_1.nasl	2009-12-30 20:40:24 UTC (rev 6287)
+++ trunk/openvas-plugins/scripts/ubuntu_875_1.nasl	2009-12-30 20:58:43 UTC (rev 6288)
@@ -0,0 +1,263 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-875-1 (redhat-cluster-suite)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66604);
+ script_cve_id("CVE-2008-4192", "CVE-2008-4579", "CVE-2008-4580", "CVE-2008-6552", "CVE-2008-6560");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-875-1 (redhat-cluster-suite)");
+
+ desc = "The remote host is missing an update to redhat-cluster-suite
+announced via advisory USN-875-1.
+
+Details follow:
+
+Multiple insecure temporary file handling vulnerabilities were discovered
+in Red Hat Cluster. A local attacker could exploit these to overwrite
+arbitrary local files via symlinks. (CVE-2008-4192, CVE-2008-4579,
+CVE-2008-4580, CVE-2008-6552)
+
+It was discovered that CMAN did not properly handle malformed configuration
+files. An attacker could cause a denial of service (via CPU consumption and
+memory corruption) in a node if the attacker were able to modify the
+cluster configuration for the node. (CVE-2008-6560)
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 6.06 LTS:
+  ccs                             1.20060222-0ubuntu6.3
+  cman                            1.20060222-0ubuntu6.3
+  fence                           1.20060222-0ubuntu6.3
+  libcman1                        1.20060222-0ubuntu6.3
+  rgmanager                       1.20060222-0ubuntu6.3
+
+Ubuntu 8.04 LTS:
+  cman                            2.20080227-0ubuntu1.3
+  gfs2-tools                      2.20080227-0ubuntu1.3
+  rgmanager                       2.20080227-0ubuntu1.3
+
+Ubuntu 8.10:
+  cman                            2.20080826-0ubuntu1.3
+  gfs2-tools                      2.20080826-0ubuntu1.3
+  rgmanager                       2.20080826-0ubuntu1.3
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-875-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-875-1 (redhat-cluster-suite)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"redhat-cluster-suite", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"redhat-cluster-suite-source", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ccs", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"cman", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"fence-gnbd", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"fence", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gfs-tools", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gnbd-client", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gnbd-server", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gulm", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libccs-dev", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlm-dev", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlm1", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgulm-dev", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgulm1", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmagma1", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"magma-plugins", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"magma", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"rgmanager", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcman-dev", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcman1", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libiddev-dev", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmagma-dev", ver:"1.20060222-0ubuntu6.3", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"redhat-cluster-suite", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"redhat-cluster-source", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"cman", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gfs-tools", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gfs2-tools", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gnbd-client", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gnbd-server", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcman-dev", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcman2", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlm-dev", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlm2", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"rgmanager", ver:"2.20080227-0ubuntu1.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"redhat-cluster-suite", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"redhat-cluster-source", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"cman", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gfs-tools", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gfs2-tools", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gnbd-client", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"gnbd-server", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libccs-dev", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libccs3", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcman-dev", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcman3", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlm-dev", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlm3", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlmcontrol-dev", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libdlmcontrol3", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfence-dev", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfence3", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"rgmanager", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libccs-perl", ver:"2.20080826-0ubuntu1.3", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list