[Openvas-commits] r3241 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue May 5 16:00:40 CEST 2009


Author: reinke
Date: 2009-05-05 16:00:35 +0200 (Tue, 05 May 2009)
New Revision: 3241

Added:
   trunk/openvas-plugins/scripts/RHSA_2009_0449.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0457.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl
   trunk/openvas-plugins/scripts/deb_1779_1.nasl
   trunk/openvas-plugins/scripts/deb_1780_1.nasl
   trunk/openvas-plugins/scripts/deb_1781_1.nasl
   trunk/openvas-plugins/scripts/deb_1782_1.nasl
   trunk/openvas-plugins/scripts/deb_1784_1.nasl
   trunk/openvas-plugins/scripts/deb_1785_1.nasl
   trunk/openvas-plugins/scripts/deb_1786_1.nasl
   trunk/openvas-plugins/scripts/deb_1787_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3500.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3627.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3639.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3640.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3761.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3789.nasl
   trunk/openvas-plugins/scripts/fcore_2009_3931.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4044.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4064.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4068.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4078.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4083.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4175.nasl
   trunk/openvas-plugins/scripts/fcore_2009_4203.nasl
   trunk/openvas-plugins/scripts/freebsd_drupal511.nasl
   trunk/openvas-plugins/scripts/freebsd_openfire2.nasl
   trunk/openvas-plugins/scripts/glsa_200905_01.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_099.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_101.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_103.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_104.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0449.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/ChangeLog	2009-05-05 14:00:35 UTC (rev 3241)
@@ -1,3 +1,19 @@
+2009-05-05 Thomas Reinke <reinke at securityspace.com>
+	* deb_1779_1.nasl deb_1780_1.nasl deb_1781_1.nasl deb_1782_1.nasl
+	deb_1784_1.nasl deb_1785_1.nasl deb_1786_1.nasl deb_1787_1.nasl
+	freebsd_drupal511.nasl freebsd_openfire2.nasl glsa_200905_01.nasl
+	mdksa_2009_096_1.nasl mdksa_2009_098.nasl mdksa_2009_099.nasl
+	mdksa_2009_101.nasl mdksa_2009_103.nasl mdksa_2009_104.nasl
+	RHSA_2009_0449.nasl RHSA_2009_0451.nasl RHSA_2009_0457.nasl
+	RHSA_2009_0458.nasl RHSA_2009_0459.nasl fcore_2009_3500.nasl
+	fcore_2009_3627.nasl fcore_2009_3639.nasl fcore_2009_3640.nasl
+	fcore_2009_3761.nasl fcore_2009_3789.nasl fcore_2009_3931.nasl
+	fcore_2009_4044.nasl fcore_2009_4064.nasl fcore_2009_4068.nasl
+	fcore_2009_4078.nasl fcore_2009_4083.nasl fcore_2009_4175.nasl
+	fcore_2009_4203.nasl ovcesa2009_0436.nasl ovcesa2009_0449.nasl
+	ovcesa2009_0459.nasl:
+	New scripts
+
 2009-05-05 Chandrashekhar B <bchandra at secpod.com>
 	* scripts/gather-package-list.nasl:
 	Added HP-UX support
@@ -201,6 +217,7 @@
 	scripts/gb_hp_ux_HPSBUX00295.nasl:
 	Added HP-UX Local Security Checks
 
+>>>>>>> .r3240
 2009-05-04 Michael Meyer <mime at gmx.de>
 	* scripts/webcalendar_detect.nasl
 	scripts/jetty_34800.nasl:

Added: trunk/openvas-plugins/scripts/RHSA_2009_0449.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0449.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0449.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,116 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:0449 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63907);
+ script_cve_id("CVE-2009-1313");
+ script_version ("$");
+ name["english"] = "RedHat Security Advisory RHSA-2009:0449";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates announced in
+advisory RHSA-2009:0449.
+
+Mozilla Firefox is an open source Web browser. XULRunner provides the XUL
+Runtime environment for Mozilla Firefox.
+
+A flaw was found in the processing of malformed web content. A web
+page containing malicious content could cause Firefox to crash or,
+potentially, execute arbitrary code as the user running Firefox.
+(CVE-2009-1313)
+
+For technical details regarding this flaw, refer to the Mozilla security
+advisory for Firefox 3.0.10. You can find a link to the Mozilla advisories
+in the References section of this errata.
+
+All Firefox users should upgrade to these updated packages, which contain
+Firefox version 3.0.10, which corrects this issue. After installing the
+update, Firefox must be restarted for the change to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-0449.html
+http://www.redhat.com/security/updates/classification/#critical
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.10
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Redhat Security Advisory RHSA-2009:0449";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Red Hat Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.10~1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.0.10~1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.10~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.0.10~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.10~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-debuginfo", rpm:"xulrunner-debuginfo~1.9.0.10~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.0.10~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.10~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0451.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,171 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:0451 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63908);
+ script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0834", "CVE-2009-0835", "CVE-2009-1046", "CVE-2009-1337");
+ script_version ("$");
+ name["english"] = "RedHat Security Advisory RHSA-2009:0451";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates announced in
+advisory RHSA-2009:0451.
+
+The kernel-rt packages contain the Linux kernel, the core of any Linux
+operating system.
+
+These updated packages fix the following security issues:
+
+* a logic error was found in the do_setlk() function of the Linux kernel
+Network File System (NFS) implementation. If a signal interrupted a lock
+request, the local POSIX lock was incorrectly created. This could cause a
+denial of service on the NFS server if a file descriptor was closed before
+its corresponding lock request returned. (CVE-2008-4307, Important)
+
+* a deficiency was found in the Linux kernel system call auditing
+implementation on 64-bit systems. This could allow a local, unprivileged
+user to circumvent a system call audit configuration, if that configuration
+filtered based on the syscall number or arguments.
+(CVE-2009-0834, Important)
+
+* Chris Evans reported a deficiency in the Linux kernel secure-computing
+implementation on 64-bit systems. This could allow a local, unprivileged
+user to bypass intended access restrictions, if those access restriction
+filters were based on the syscall number or arguments.
+(CVE-2009-0835, Important)
+
+* the exit_notify() function in the Linux kernel did not properly reset the
+exit signal if a process executed a set user ID (setuid) application before
+exiting. This could allow a local, unprivileged user to elevate their
+privileges. (CVE-2009-1337, Important)
+
+* Chris Evans reported a deficiency in the Linux kernel signals
+implementation. The clone() system call permits the caller to indicate the
+signal it wants to receive when its child exits. When clone() is called
+with the CLONE_PARENT flag, it permits the caller to clone a new child that
+shares the same parent as itself, enabling the indicated signal to be sent
+to the caller's parent (instead of the caller), even if the caller's parent
+has different real and effective user IDs. This could lead to a denial of
+service of the parent. (CVE-2009-0028, Moderate)
+
+* an off-by-two error was found in the set_selection() function of the
+Linux kernel. This could allow a local, unprivileged user to cause a denial
+of service when making a selection of characters in a UTF-8 console. Note:
+physical console access is required to exploit this issue.
+(CVE-2009-1046, Low)
+
+These updated packages also fix the following bug:
+
+* the __scsi_device_lookup_by_target() function was always returning the
+first matching device, regardless of the state of the device. This meant
+that any valid device listed after a deleted device would not be found. The
+__scsi_device_lookup_by_target() function was modified so that deleted
+devices are skipped, and valid devices are now found. (BZ#495976)
+
+All Red Hat Enterprise MRG users should install this update, which resolves
+these issues. For this update to take effect, the system must be rebooted.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-0451.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Redhat Security Advisory RHSA-2009:0451";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Red Hat Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-rt", rpm:"kernel-rt~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-debug", rpm:"kernel-rt-debug~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-debug-debuginfo", rpm:"kernel-rt-debug-debuginfo~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-debug-devel", rpm:"kernel-rt-debug-devel~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-debuginfo", rpm:"kernel-rt-debuginfo~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-debuginfo-common", rpm:"kernel-rt-debuginfo-common~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-devel", rpm:"kernel-rt-devel~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-trace", rpm:"kernel-rt-trace~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-trace-debuginfo", rpm:"kernel-rt-trace-debuginfo~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-trace-devel", rpm:"kernel-rt-trace-devel~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-vanilla", rpm:"kernel-rt-vanilla~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-vanilla-debuginfo", rpm:"kernel-rt-vanilla-debuginfo~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-vanilla-devel", rpm:"kernel-rt-vanilla-devel~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-rt-doc", rpm:"kernel-rt-doc~2.6.24.7~111.el5rt", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_0457.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0457.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0457.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,115 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:0457 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63909);
+ script_cve_id("CVE-2009-1364");
+ script_version ("$");
+ name["english"] = "RedHat Security Advisory RHSA-2009:0457";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates announced in
+advisory RHSA-2009:0457.
+
+libwmf is a library for reading and converting Windows Metafile Format
+(WMF) vector graphics. libwmf is used by applications such as GIMP and
+ImageMagick.
+
+A pointer use-after-free flaw was found in the GD graphics library embedded
+in libwmf. An attacker could create a specially-crafted WMF file that would
+cause an application using libwmf to crash or, potentially, execute
+arbitrary code as the user running the application when opened by a victim.
+(CVE-2009-1364)
+
+Note: This flaw is specific to the GD graphics library embedded in libwmf.
+It does not affect the GD graphics library from the gd packages, or
+applications using it.
+
+Red Hat would like to thank Tavis Ormandy of the Google Security Team for
+responsibly reporting this flaw.
+
+All users of libwmf are advised to upgrade to these updated packages, which
+contain a backported patch to correct this issue. After installing the
+update, all applications using libwmf must be restarted for the update
+to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-0457.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Redhat Security Advisory RHSA-2009:0457";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Red Hat Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libwmf", rpm:"libwmf~0.2.8.3~5.8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwmf-debuginfo", rpm:"libwmf-debuginfo~0.2.8.3~5.8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwmf-devel", rpm:"libwmf-devel~0.2.8.3~5.8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwmf", rpm:"libwmf~0.2.8.4~10.2", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwmf-debuginfo", rpm:"libwmf-debuginfo~0.2.8.4~10.2", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwmf-devel", rpm:"libwmf-devel~0.2.8.4~10.2", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0458.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,113 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:0458 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63910);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
+ script_version ("$");
+ name["english"] = "RedHat Security Advisory RHSA-2009:0458";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates announced in
+advisory RHSA-2009:0458.
+
+GPdf is a viewer for Portable Document Format (PDF) files.
+
+Multiple integer overflow flaws were found in GPdf's JBIG2 decoder. An
+attacker could create a malicious PDF file that would cause GPdf to crash
+or, potentially, execute arbitrary code when opened. (CVE-2009-0147,
+CVE-2009-1179)
+
+Multiple buffer overflow flaws were found in GPdf's JBIG2 decoder. An
+attacker could create a malicious PDF file that would cause GPdf to crash
+or, potentially, execute arbitrary code when opened. (CVE-2009-0146,
+CVE-2009-1182)
+
+Multiple flaws were found in GPdf's JBIG2 decoder that could lead to the
+freeing of arbitrary memory. An attacker could create a malicious PDF file
+that would cause GPdf to crash or, potentially, execute arbitrary code when
+opened. (CVE-2009-0166, CVE-2009-1180)
+
+Multiple input validation flaws were found in GPdf's JBIG2 decoder. An
+attacker could create a malicious PDF file that would cause GPdf to crash
+or, potentially, execute arbitrary code when opened. (CVE-2009-0800)
+
+Multiple denial of service flaws were found in GPdf's JBIG2 decoder. An
+attacker could create a malicious PDF that would cause GPdf to crash when
+opened. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183)
+
+Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product
+Security team, and Will Dormann of the CERT/CC for responsibly reporting
+these flaws.
+
+Users are advised to upgrade to this updated package, which contains
+backported patches to correct these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-0458.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Redhat Security Advisory RHSA-2009:0458";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Red Hat Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gpdf", rpm:"gpdf~2.8.2~7.7.2.el4_7.4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gpdf-debuginfo", rpm:"gpdf-debuginfo~2.8.2~7.7.2.el4_7.4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/RHSA_2009_0459.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,143 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:0459 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63911);
+ script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0676", "CVE-2009-0834");
+ script_version ("$");
+ name["english"] = "RedHat Security Advisory RHSA-2009:0459";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates to the kernel announced in
+advisory RHSA-2009:0459.
+
+Security fixes:
+
+* a logic error was found in the do_setlk() function of the Linux kernel
+Network File System (NFS) implementation. If a signal interrupted a lock
+request, the local POSIX lock was incorrectly created. This could cause a
+denial of service on the NFS server if a file descriptor was closed before
+its corresponding lock request returned. (CVE-2008-4307, Important)
+
+* a deficiency was found in the Linux kernel system call auditing
+implementation on 64-bit systems. This could allow a local, unprivileged
+user to circumvent a system call audit configuration, if that configuration
+filtered based on the syscall number or arguments.
+(CVE-2009-0834, Important)
+
+* Chris Evans reported a deficiency in the Linux kernel signals
+implementation. The clone() system call permits the caller to indicate the
+signal it wants to receive when its child exits. When clone() is called
+with the CLONE_PARENT flag, it permits the caller to clone a new child that
+shares the same parent as itself, enabling the indicated signal to be sent
+to the caller's parent (instead of the caller), even if the caller's parent
+has different real and effective user IDs. This could lead to a denial of
+service of the parent. (CVE-2009-0028, Moderate)
+
+* the sock_getsockopt() function in the Linux kernel did not properly
+initialize a data structure that can be directly returned to user-space
+when the getsockopt() function is called with SO_BSDCOMPAT optname set.
+This flaw could possibly lead to memory disclosure.
+(CVE-2009-0676, Moderate)
+
+For details on other non-security related bug fixes, please visit
+the referenced advisories.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-0459.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Redhat Security Advisory RHSA-2009:0459";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Red Hat Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem", rpm:"kernel-hugemem~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem-devel", rpm:"kernel-hugemem-devel~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU", rpm:"kernel-xenU~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU-devel", rpm:"kernel-xenU-devel~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp", rpm:"kernel-largesmp~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp-devel", rpm:"kernel-largesmp-devel~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.9~78.0.22.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1779_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1779_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1779_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,129 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1779-1 (apt)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63932);
+ script_cve_id("CVE-2009-1300", "CVE-2009-1358");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1779-1 (apt)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to apt
+announced via advisory DSA 1779-1.
+
+Two vulnerabilities have been discovered in APT, the well-known dpkg
+frontend. The Common Vulnerabilities and Exposures project identifies
+the following problems:
+
+CVE-2009-1300
+
+In time zones where daylight savings time occurs at midnight,
+the apt cron.daily script fails, stopping new security updates
+from being applied automatically.
+
+CVE-2009-1358
+
+A repository that has been signed with an expired or revoked
+OpenPGP key would still be considered valid by APT.
+
+For the old stable distribution (etch), these problems have been fixed in
+version 0.6.46.4-0.1+etch1.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 0.7.20.2+lenny1.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 0.7.21.
+
+We recommend that you upgrade your apt package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201779-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1779-1 (apt)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"apt-doc", ver:"0.6.46.4-0.1+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libapt-pkg-doc", ver:"0.6.46.4-0.1+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apt-utils", ver:"0.6.46.4-0.1+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libapt-pkg-dev", ver:"0.6.46.4-0.1+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apt", ver:"0.6.46.4-0.1+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apt-doc", ver:"0.7.20.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libapt-pkg-doc", ver:"0.7.20.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apt-transport-https", ver:"0.7.20.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libapt-pkg-dev", ver:"0.7.20.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apt-utils", ver:"0.7.20.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apt", ver:"0.7.20.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1780_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1780_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1780_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,97 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1780-1 (libdbd-pg-perl)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63933);
+ script_cve_id("CVE-2009-0663", "CVE-2009-1341");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1780-1 (libdbd-pg-perl)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to libdbd-pg-perl
+announced via advisory DSA 1780-1.
+
+Two vulnerabilities have been discovered in libdbd-pg-perl, the DBI
+driver module for PostgreSQL database access (DBD::Pg).
+
+CVE-2009-0663
+
+A heap-based buffer overflow may allow attackers to execute arbitrary
+code through applications which read rows from the database using the
+pg_getline and getline functions.  (More common retrieval methods,
+such as selectall_arrayref and fetchrow_array, are not affected.)
+
+CVE-2009-1341
+
+A memory leak in the routine which unquotes BYTEA values returned from
+the database allows attackers to cause a denial of service.
+
+For the old stable distribution (etch), these problems have been fixed
+in version 1.49-2+etch1.
+
+For the stable distribution (lenny) and the unstable distribution (sid),
+these problems have been fixed in version 2.1.3-1 before the release of
+lenny.
+
+We recommend that you upgrade your libdbd-pg-perl package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201780-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1780-1 (libdbd-pg-perl)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libdbd-pg-perl", ver:"1.49-2+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1781_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1781_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1781_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,165 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1781-1 (ffmpeg-debian)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63934);
+ script_cve_id("CVE-2009-0385", "CVE-2008-3162");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1781-1 (ffmpeg-debian)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to ffmpeg-debian
+announced via advisory DSA 1781-1.
+
+
+Several vulnerabilities have been discovered in ffmpeg, a multimedia
+player, server and encoder. The Common Vulnerabilities and Exposures
+project identifies the following problems:
+
+
+CVE-2009-0385
+
+It was discovered that watching a malformed 4X movie file could lead to
+the execution of arbitrary code.
+
+CVE-2008-3162
+
+It was discovered that using a crafted STR file can lead to the
+execution of arbitrary code.
+
+
+For the oldstable distribution (etch), these problems have been fixed
+in version 0.cvs20060823-8+etch1.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 0.svn20080206-17+lenny1.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), these problems have been fixed in version 0.svn20080206-16.
+
+
+We recommend that you upgrade your ffmpeg-debian packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201781-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1781-1 (ffmpeg-debian)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libavcodec0d", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavformat-dev", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostproc0d", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavcodec-dev", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ffmpeg", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavformat0d", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostproc-dev", ver:"0.cvs20060823-8+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ffmpeg-doc", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ffmpeg-dbg", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavdevice52", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ffmpeg", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavformat-dev", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostproc51", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostproc-dev", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libswscale-dev", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libswscale0", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavcodec51", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavutil-dev", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavdevice-dev", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavformat52", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavcodec-dev", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavutil49", ver:"0.svn20080206-17+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1782_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1782_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1782_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,110 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1782-1 (mplayer)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63935);
+ script_cve_id("CVE-2009-0385", "CVE-2008-4866", "CVE-2008-5616");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1782-1 (mplayer)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to mplayer
+announced via advisory DSA 1782-1.
+
+
+Several vulnerabilities have been discovered in mplayer, a movie player
+for Unix-like systems. The Common Vulnerabilities and Exposures project
+identifies the following problems:
+
+
+CVE-2009-0385
+
+It was discovered that watching a malformed 4X movie file could lead to
+the execution of arbitrary code.
+
+CVE-2008-4866
+
+It was discovered that multiple buffer overflows could lead to the
+execution of arbitrary code.
+
+CVE-2008-5616
+
+It was discovered that watching a malformed TwinVQ file could lead to
+the execution of arbitrary code.
+
+
+For the oldstable distribution (etch), these problems have been fixed
+in version 1.0~rc1-12etch7.
+
+For the stable distribution (lenny), mplayer links against
+ffmpeg-debian.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), mplayer links against ffmpeg-debian.
+
+
+We recommend that you upgrade your mplayer packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201782-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1782-1 (mplayer)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"mplayer-doc", ver:"1.0~rc1-12etch7", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mplayer", ver:"1.0~rc1-12etch7", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1784_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1784_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1784_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,109 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1784-1 (freetype)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63936);
+ script_cve_id("CVE-2009-0946");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1784-1 (freetype)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to freetype
+announced via advisory DSA 1784-1.
+
+
+Tavis Ormandy discovered several integer overflows in FreeType, a library
+to process and access font files, resulting in heap- or stack-based
+buffer overflows leading to application crashes or the execution
+of arbitrary code via a crafted font file.
+
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 2.2.1-5+etch4.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 2.3.7-2+lenny1.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2.3.9-4.1.
+
+
+We recommend that you upgrade your freetype packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201784-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1784-1 (freetype)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libfreetype6", ver:"2.2.1-5+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6-dev", ver:"2.2.1-5+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"freetype2-demos", ver:"2.2.1-5+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6", ver:"2.3.7-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6-dev", ver:"2.3.7-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"freetype2-demos", ver:"2.3.7-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1785_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1785_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1785_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,113 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1785-1 (wireshark)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63937);
+ script_cve_id("CVE-2009-1210", "CVE-2009-1268", "CVE-2009-1269");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1785-1 (wireshark)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to wireshark
+announced via advisory DSA 1785-1.
+
+Several remote vulnerabilities have been discovered in the Wireshark
+network traffic analyzer, which may lead to denial of service or the
+execution of arbitrary code. The Common Vulnerabilities and Exposures
+project identifies the following problems:
+
+CVE-2009-1210
+
+A format string vulnerability was discovered in the PROFINET
+dissector.
+
+CVE-2009-1268
+
+The dissector for the Check Point High-Availability Protocol
+could be forced to crash.
+
+CVE-2009-1269
+
+Malformed Tektronix files could lead to a crash.
+
+The old stable distribution (etch), is only affected by the
+CPHAP crash, which doesn't warrant an update on its own. The fix
+will be queued up for an upcoming security update or a point release.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1.0.2-3+lenny5.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 1.0.7-1.
+
+We recommend that you upgrade your wireshark packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201785-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1785-1 (wireshark)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"wireshark", ver:"1.0.2-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wireshark-common", ver:"1.0.2-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"tshark", ver:"1.0.2-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wireshark-dev", ver:"1.0.2-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1786_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1786_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1786_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,94 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1786-1 (acpid)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63938);
+ script_cve_id("CVE-2009-0798");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1786-1 (acpid)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to acpid
+announced via advisory DSA 1786-1.
+
+
+It was discovered that acpid, a daemon for delivering ACPI events, is
+prone to a denial of service attack by opening a large number of UNIX
+sockets, which are not closed properly.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.0.8-1lenny1.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.0.4-5etch1.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem has been fixed in version 1.0.10-1.
+
+
+We recommend that you upgrade your acpid packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201786-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1786-1 (acpid)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"acpid", ver:"1.0.4-5etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"acpid", ver:"1.0.8-1lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1787_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1787_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/deb_1787_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,325 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1787-1 (linux-2.6.24)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63939);
+ script_cve_id("CVE-2008-4307", "CVE-2008-5079", "CVE-2008-5395", "CVE-2008-5700", "CVE-2008-5701", "CVE-2008-5702", "CVE-2009-0028", "CVE-2009-0029", "CVE-2009-0031", "CVE-2009-0065", "CVE-2009-0269", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0745", "CVE-2009-0834", "CVE-2009-0859", "CVE-2009-1046", "CVE-2009-1192", "CVE-2009-1242", "CVE-2009-1265", "CVE-2009-1337", "CVE-2009-1338", "CVE-2009-1439");
+ script_version ("$");
+ name["english"] = "Debian Security Advisory DSA 1787-1 (linux-2.6.24)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to linux-2.6.24
+announced via advisory DSA 1787-1.
+
+Several vulnerabilities have been discovered in the Linux kernel that
+may lead to a denial of service or privilege escalation. For details,
+please visit the referenced security advisories.
+
+For the stable distribution (etch), these problems have been fixed in
+version 2.6.24-6~etchnhalf.8etch1.
+
+We recommend that you upgrade your linux-2.6.24 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201787-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Debian Security Advisory DSA 1787-1 (linux-2.6.24)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Debian Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"linux-tree-2.6.24", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-doc-2.6.24", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-support-2.6.24-etchnhalf.1", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-manual-2.6.24", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-source-2.6.24", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-patch-debian-2.6.24", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-alpha", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-alpha-legacy", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-alpha-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-alpha-generic", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-alpha-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-alpha-generic", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-common", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-alpha-legacy", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-amd64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-amd64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-amd64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-ixp4xx", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-iop32x", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-footbridge", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-footbridge", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-ixp4xx", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-iop32x", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-arm", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-parisc64-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-parisc-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-hppa", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-parisc", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-parisc", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-parisc64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-parisc64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-parisc64-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-parisc-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-686", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-486", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-686-bigmem", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-i386", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-686-bigmem", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-486", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-686", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-mckinley", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-itanium", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-itanium", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-mckinley", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-ia64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-5kc-malta", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-r4k-ip22", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-mips", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-r4k-ip22", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-r5k-ip32", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-r5k-ip32", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-5kc-malta", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-4kc-malta", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-4kc-malta", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-r5k-cobalt", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-mipsel", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-r5k-cobalt", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-powerpc", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-powerpc-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-powerpc", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-powerpc-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-powerpc-miboot", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-powerpc64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-powerpc-miboot", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-powerpc64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-powerpc", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-s390-tape", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-s390", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-s390", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-s390", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-s390x", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-s390x", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-all-sparc", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-sparc64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-sparc64", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.24-etchnhalf.1-sparc64-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.24-etchnhalf.1-sparc64-smp", ver:"2.6.24-6~etchnhalf.8etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3500.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3500.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3500.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3500 (pam_ssh)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63927);
+ script_cve_id("CVE-2009-1273");
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-3500 (pam_ssh)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to pam_ssh
+announced via advisory FEDORA-2009-3500.
+
+References:
+
+[ 1 ] Bug #492153 - CVE-2009-1273 pam_ssh: Password prompt varies for existent and non-existent users
+https://bugzilla.redhat.com/show_bug.cgi?id=492153
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update pam_ssh' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3500
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-3500 (pam_ssh)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"pam_ssh", rpm:"pam_ssh~1.92~10.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pam_ssh-debuginfo", rpm:"pam_ssh-debuginfo~1.92~10.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3627.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3627.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3627.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3627 (pam_ssh)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63931);
+ script_cve_id("CVE-2009-1273");
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-3627 (pam_ssh)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to pam_ssh
+announced via advisory FEDORA-2009-3627.
+
+ChangeLog:
+
+* Thu Mar 26 2009 Dmitry Butskoy  - 1.92-10
+- Always use standard Password: prompt for the first password's inquire
+in a PAM chain (#492153)
+
+References:
+
+[ 1 ] Bug #492153 - CVE-2009-1273 pam_ssh: Password prompt varies for existent and non-existent users
+https://bugzilla.redhat.com/show_bug.cgi?id=492153
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update pam_ssh' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3627
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-3627 (pam_ssh)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"pam_ssh", rpm:"pam_ssh~1.92~10.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pam_ssh-debuginfo", rpm:"pam_ssh-debuginfo~1.92~10.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3639.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3639.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3639.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,85 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3639 (bash-completion)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63924);
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-3639 (bash-completion)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to bash-completion
+announced via advisory FEDORA-2009-3639.
+
+Update to version 1.0: http://git.debian.org/?p=bash-completion/bash-completion.git;a=blob;f=CHANGES;hb=28cdfc9243da41f5bdb29b7515482354c01438d3
+
+References:
+
+[ 1 ] Bug #492589 - bash-completion: does not properly quote some characters
+https://bugzilla.redhat.com/show_bug.cgi?id=492589
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update bash-completion' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3639
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-3639 (bash-completion)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bash-completion", rpm:"bash-completion~1.0~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3640.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3640.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3640.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,85 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3640 (bash-completion)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63925);
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-3640 (bash-completion)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to bash-completion
+announced via advisory FEDORA-2009-3640.
+
+Update to version 1.0: http://git.debian.org/?p=bash-completion/bash-completion.git;a=blob;f=CHANGES;hb=28cdfc9243da41f5bdb29b7515482354c01438d3
+
+References:
+
+[ 1 ] Bug #492589 - bash-completion: does not properly quote some characters
+https://bugzilla.redhat.com/show_bug.cgi?id=492589
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update bash-completion' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3640
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-3640 (bash-completion)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bash-completion", rpm:"bash-completion~1.0~2.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3761.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3761.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3761.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3761 (prewikka)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63919);
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-3761 (prewikka)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to prewikka
+announced via advisory FEDORA-2009-3761.
+
+The permissions on the prewikka.conf file are world readable and contain the sql
+database password used by prewikka. This update makes it readable just by the
+apache group.
+
+ChangeLog:
+
+* Fri Apr 17 2009 Steve Grubb  0.9.14-2
+- Change default perms on conf file
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update prewikka' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3761
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-3761 (prewikka)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"prewikka", rpm:"prewikka~0.9.14~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3789.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3789.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3789.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,89 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3789 (prewikka)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63918);
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-3789 (prewikka)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to prewikka
+announced via advisory FEDORA-2009-3789.
+
+The permissions on the prewikka.conf file are world readable and contain the sql
+database password used by prewikka. This update makes it readable just by the
+apache group.
+
+ChangeLog:
+
+* Fri Apr 17 2009 Steve Grubb  0.9.14-2
+- Change default perms on conf file
+* Thu Apr 24 2008 Steve Grubb  0.9.14-1
+- new upstream release
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update prewikka' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3789
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-3789 (prewikka)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"prewikka", rpm:"prewikka~0.9.14~2.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_3931.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_3931.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_3931.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,103 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-3931 (prelude-manager)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63930);
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-3931 (prelude-manager)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to prelude-manager
+announced via advisory FEDORA-2009-3931.
+
+Update Information:
+
+The configuration file of prelude-manager contains a database password and is
+world readable. This update restricts permissions to the root account.
+
+ChangeLog:
+
+* Wed Apr 22 2009 Steve Grubb  0.9.14.2-2
+- Adjusted permissions on dirs and conf files
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update prelude-manager' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3931
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-3931 (prelude-manager)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"prelude-manager", rpm:"prelude-manager~0.9.14.2~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-db", rpm:"prelude-manager-db~plugin~0.9.14.2", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-devel", rpm:"prelude-manager-devel~0.9.14.2~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-smtp", rpm:"prelude-manager-smtp~plugin~0.9.14.2", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-xml", rpm:"prelude-manager-xml~plugin~0.9.14.2", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-debuginfo", rpm:"prelude-manager-debuginfo~0.9.14.2~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4044.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4044.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4044.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,103 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4044 (prelude-manager)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63929);
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-4044 (prelude-manager)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to prelude-manager
+announced via advisory FEDORA-2009-4044.
+
+Update Information:
+
+The configuration file of prelude-manager contains a database password and is
+world readable. This update restricts permissions to the root account.
+
+ChangeLog:
+
+* Wed Apr 22 2009 Steve Grubb  0.9.14.2-2
+- Adjusted permissions on dirs and conf files
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update prelude-manager' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4044
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-4044 (prelude-manager)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"prelude-manager", rpm:"prelude-manager~0.9.14.2~2.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-db", rpm:"prelude-manager-db~plugin~0.9.14.2", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-devel", rpm:"prelude-manager-devel~0.9.14.2~2.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-smtp", rpm:"prelude-manager-smtp~plugin~0.9.14.2", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-xml", rpm:"prelude-manager-xml~plugin~0.9.14.2", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"prelude-manager-debuginfo", rpm:"prelude-manager-debuginfo~0.9.14.2~2.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4064.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4064.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4064.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,102 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4064 (libmodplug)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63920);
+ script_cve_id("CVE-2009-1438");
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-4064 (libmodplug)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to libmodplug
+announced via advisory FEDORA-2009-4064.
+
+Update to 0.8.7:
+http://sourceforge.net/project/shownotes.php?group_id=1275&release_id=675660
+http://sourceforge.net/project/shownotes.php?group_id=1275&release_id=677065
+http://sourceforge.net/project/shownotes.php?group_id=1275&release_id=678622
+
+ChangeLog:
+
+* Mon Apr 27 2009 Ville Skyttä  - 1:0.8.7-1
+- Update to 0.8.7 (security, #496834).
+* Tue Apr 14 2009 Ville Skyttä  - 1:0.8.5-1
+- Update to 0.8.5, should fix #483146.
+
+References:
+
+[ 1 ] Bug #496834 - CVE-2009-1438: libmodplug: Integer overflow in the MED files loading routine
+https://bugzilla.redhat.com/show_bug.cgi?id=496834
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update libmodplug' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4064
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-4064 (libmodplug)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libmodplug", rpm:"libmodplug~0.8.7~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmodplug-devel", rpm:"libmodplug-devel~0.8.7~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmodplug-debuginfo", rpm:"libmodplug-debuginfo~0.8.7~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4068.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4068.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4068.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4068 (libmodplug)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63921);
+ script_cve_id("CVE-2009-1438");
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-4068 (libmodplug)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to libmodplug
+announced via advisory FEDORA-2009-4068.
+
+Update to 0.8.7:
+http://sourceforge.net/project/shownotes.php?group_id=1275&release_id=675660
+http://sourceforge.net/project/shownotes.php?group_id=1275&release_id=677065
+http://sourceforge.net/project/shownotes.php?group_id=1275&release_id=678622
+
+References:
+
+[ 1 ] Bug #496834 - CVE-2009-1438: libmodplug: Integer overflow in the MED files loading routine
+https://bugzilla.redhat.com/show_bug.cgi?id=496834
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update libmodplug' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4068
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-4068 (libmodplug)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libmodplug", rpm:"libmodplug~0.8.7~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmodplug-devel", rpm:"libmodplug-devel~0.8.7~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmodplug-debuginfo", rpm:"libmodplug-debuginfo~0.8.7~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4078.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4078.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4078.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,110 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4078 (xulrunner)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63922);
+ script_cve_id("CVE-2009-1313");
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-4078 (xulrunner)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to xulrunner
+announced via advisory FEDORA-2009-4078.
+
+Update Information:
+
+Update to Firefox 3.0.10 fixing one security issue:
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.10
+
+Depending packages rebuilt against new Firefox are also included
+in this update.  Additional bugs fixed in other packages:
+
+- totem: Fix YouTube plugin following web site changes
+
+ChangeLog:
+
+* Mon Apr 27 2009 Jan Horak  - 1.9.0.10-1
+- Update to 1.9.0.10
+* Tue Apr 21 2009 Christopher Aillon  - 1.9.0.9-1
+- Update to 1.9.0.9
+
+References:
+
+[ 1 ] Bug #497447 - CVE-2009-1313 Firefox crash in nsTextFrame::ClearTextRun()
+https://bugzilla.redhat.com/show_bug.cgi?id=497447
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update xulrunner' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4078
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-4078 (xulrunner)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.10~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.0.10~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.10~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-debuginfo", rpm:"xulrunner-debuginfo~1.9.0.10~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4083.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4083.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4083.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,104 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4083 (epiphany)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63923);
+ script_cve_id("CVE-2009-1313");
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-4083 (epiphany)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to epiphany
+announced via advisory FEDORA-2009-4083.
+
+Update to Firefox 3.0.10 fixing one security issue:
+http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.10
+
+Depending packages rebuilt against new Firefox are also included in
+this update.  Additional bugs fixed in other packages:
+- totem: Fix YouTube plugin following web site changes
+
+ChangeLog:
+
+* Mon Apr 27 2009 Christopher Aillon  - 2.24.3-6
+- Rebuild against newer gecko
+* Tue Apr 21 2009 Christopher Aillon  - 2.24.3-5
+- Rebuild against newer gecko
+
+References:
+
+[ 1 ] Bug #497447 - CVE-2009-1313 Firefox crash in nsTextFrame::ClearTextRun()
+https://bugzilla.redhat.com/show_bug.cgi?id=497447
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update epiphany' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4083
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-4083 (epiphany)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"epiphany", rpm:"epiphany~2.24.3~6.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"epiphany-devel", rpm:"epiphany-devel~2.24.3~6.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"epiphany-debuginfo", rpm:"epiphany-debuginfo~2.24.3~6.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4175.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4175.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4175.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4175 (drupal)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63926);
+ script_version ("$");
+ name["english"] = "Fedora Core 10 FEDORA-2009-4175 (drupal)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to drupal
+announced via advisory FEDORA-2009-4175.
+
+6.11, Fix for SA-CORE-2009-005.    See http://drupal.org/node/449078 for more
+information.    Remember to log in to your site as the admin user before
+upgrading this package. After upgrading the package, browse to
+http://host/drupal/update.php to run the upgrade script.
+
+ChangeLog:
+
+* Thu Apr 30 2009 Jon Ciesla  - 6.11-1
+- Update to 6.11, SA-CORE-2009-005.
+* Mon Apr 27 2009 Jon Ciesla  - 6.10-2
+- Added SELinux/sendmail note to README, BZ 497642.
+
+References:
+
+[ 1 ] Bug #498643 - drupal: XSS vulnerability in < 6.11 (SA-CORE-2009-005)
+https://bugzilla.redhat.com/show_bug.cgi?id=498643
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update drupal' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4175
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 10 FEDORA-2009-4175 (drupal)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"drupal", rpm:"drupal~6.11~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_4203.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_4203.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/fcore_2009_4203.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,96 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-4203 (drupal)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63928);
+ script_cve_id("CVE-2008-3661");
+ script_version ("$");
+ name["english"] = "Fedora Core 9 FEDORA-2009-4203 (drupal)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to drupal
+announced via advisory FEDORA-2009-4203.
+
+6.11, Fix for SA-CORE-2009-005.    See http://drupal.org/node/449078 for more
+information.    Remember to log in to your site as the admin user before
+upgrading this package. After upgrading the package, browse to
+http://host/drupal/update.php to run the upgrade script.
+
+ChangeLog:
+
+* Thu Apr 30 2009 Jon Ciesla  - 6.11-1
+- Update to 6.11, SA-CORE-2009-005.
+* Mon Apr 27 2009 Jon Ciesla  - 6.10-2
+- Added SELinux/sendmail note to README, BZ 497642.
+
+References:
+
+[ 1 ] Bug #498643 - drupal: XSS vulnerability in < 6.11 (SA-CORE-2009-005)
+https://bugzilla.redhat.com/show_bug.cgi?id=498643
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update drupal' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-4203
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Fedora Core 9 FEDORA-2009-4203 (drupal)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Fedora Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"drupal", rpm:"drupal~6.11~1.fc9", rls:"FC9")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_drupal511.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_drupal511.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/freebsd_drupal511.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,88 @@
+#
+#VID 7a1ab8d4-35c1-11de-9672-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 7a1ab8d4-35c1-11de-9672-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63944);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: drupal5";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   drupal5
+   drupal6
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://drupal.org/node/449078
+http://www.vuxml.org/freebsd/7a1ab8d4-35c1-11de-9672-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: drupal5";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"drupal5");
+if(!isnull(bver) && revcomp(a:bver, b:"5.17")<0) {
+    security_note(0, data:"Package drupal5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"drupal6");
+if(!isnull(bver) && revcomp(a:bver, b:"6.11")<0) {
+    security_note(0, data:"Package drupal6 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_openfire2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openfire2.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/freebsd_openfire2.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,81 @@
+#
+#VID e3e30d99-58a8-4a3f-8059-a8b7cd59b881
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID e3e30d99-58a8-4a3f-8059-a8b7cd59b881
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63943);
+ script_version ("$");
+ name["english"] = "FreeBSD Ports: openfire";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: openfire
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/advisories/34984/
+http://www.vuxml.org/freebsd/e3e30d99-58a8-4a3f-8059-a8b7cd59b881.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "FreeBSD Ports: openfire";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "FreeBSD Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"openfire");
+if(!isnull(bver) && revcomp(a:bver, b:"3.6.3")==0) {
+    security_note(0, data:"Package openfire version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/glsa_200905_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200905_01.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/glsa_200905_01.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,90 @@
+#
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from Gentoo's XML based advisory
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+                                                                                
+if(description)
+{
+ script_id(63940);
+ script_cve_id("CVE-2008-1897", "CVE-2008-2119", "CVE-2008-3263", "CVE-2008-3264", "CVE-2008-3903", "CVE-2008-5558", "CVE-2009-0041");
+ script_version ("$");
+ name["english"] = "Gentoo Security Advisory GLSA 200905-01 (asterisk)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates announced in
+advisory GLSA 200905-01.
+
+Multiple vulnerabilities have been found in Asterisk allowing for Denial of
+    Service and username disclosure.
+
+Solution:
+All Asterisk users should upgrade to the latest version:
+
+    # emerge --sync
+    # emerge --ask --oneshot --verbose '>=net-misc/asterisk-1.2.32'
+
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200905-01
+http://bugs.gentoo.org/show_bug.cgi?id=218966
+http://bugs.gentoo.org/show_bug.cgi?id=224835
+http://bugs.gentoo.org/show_bug.cgi?id=232696
+http://bugs.gentoo.org/show_bug.cgi?id=232698
+http://bugs.gentoo.org/show_bug.cgi?id=237476
+http://bugs.gentoo.org/show_bug.cgi?id=250748
+http://bugs.gentoo.org/show_bug.cgi?id=254304
+
+Risk factor : Medium";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Gentoo Security Advisory GLSA 200905-01 (asterisk)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Gentoo Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/gentoo");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-gentoo.inc");
+vuln = 0;
+if(ispkgvuln(pkg:"net-misc/asterisk", unaffected: make_list("ge 1.2.32"), vulnerable: make_list("lt 1.2.32"))) {
+    vuln=1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/mdksa_2009_096_1.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,153 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:096-1 (printer-drivers)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(63912);
+ script_cve_id("CVE-2007-6725", "CVE-2009-0583", "CVE-2009-0584", "CVE-2009-0792");
+ script_version ("$");
+ name["english"] = "Mandrake Security Advisory MDVSA-2009:096-1 (printer-drivers)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to printer-drivers
+announced via advisory MDVSA-2009:096-1.
+
+A buffer underflow in Ghostscript's CCITTFax decoding filter allows
+remote attackers to cause denial of service and possibly to execute
+arbitrary by using a crafted PDF file (CVE-2007-6725).
+
+Multiple interger overflows in Ghostsript's International Color
+Consortium Format Library (icclib) allows attackers to cause denial
+of service (heap-based buffer overflow and application crash) and
+possibly execute arbirary code by using either a PostScript or PDF
+file with crafte embedded images (CVE-2009-0583, CVE-2009-0584).
+
+Multiple interger overflows in Ghostsript's International Color
+Consortium Format Library (icclib) allows attackers to cause denial
+of service (heap-based buffer overflow and application crash) and
+possibly execute arbirary code by using either a PostScript or PDF
+file with crafte embedded images. Note: this issue exists because of
+an incomplete fix for CVE-2009-0583 (CVE-2009-0792).
+
+This update provides fixes for that vulnerabilities.
+
+Update:
+
+The previous update went with a wrong require version of perl-base
+in the foomatic-db-engine package. It is fixed on this update.
+
+Affected: Corporate 3.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:096-1
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Mandrake Security Advisory MDVSA-2009:096-1 (printer-drivers)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Mandrake Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups-drivers", rpm:"cups-drivers~1.1~138.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"foomatic-db", rpm:"foomatic-db~3.0.1~0.20040828.1.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"foomatic-db-engine", rpm:"foomatic-db-engine~3.0.1~0.20040828.1.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"foomatic-filters", rpm:"foomatic-filters~3.0.1~0.20040828.1.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript", rpm:"ghostscript~7.07~19.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-module-X", rpm:"ghostscript-module-X~7.07~19.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gimpprint", rpm:"gimpprint~4.2.7~2.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgimpprint1", rpm:"libgimpprint1~4.2.7~2.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgimpprint1-devel", rpm:"libgimpprint1-devel~4.2.7~2.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libijs0", rpm:"libijs0~0.34~76.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libijs0-devel", rpm:"libijs0-devel~0.34~76.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"printer-filters", rpm:"printer-filters~1.0~138.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"printer-testpages", rpm:"printer-testpages~1.0~138.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"printer-utils", rpm:"printer-utils~1.0~138.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gimpprint1", rpm:"lib64gimpprint1~4.2.7~2.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gimpprint1-devel", rpm:"lib64gimpprint1-devel~4.2.7~2.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ijs0", rpm:"lib64ijs0~0.34~76.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64ijs0-devel", rpm:"lib64ijs0-devel~0.34~76.7.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_098.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_098.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/mdksa_2009_098.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,229 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:098 (krb5)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(63913);
+ script_cve_id("CVE-2009-0844", "CVE-2009-0846", "CVE-2009-0847", "CVE-2009-0845");
+ script_version ("$");
+ name["english"] = "Mandrake Security Advisory MDVSA-2009:098 (krb5)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to krb5
+announced via advisory MDVSA-2009:098.
+
+Multiple vulnerabilities has been found and corrected in krb5:
+
+The get_input_token function in the SPNEGO implementation in MIT
+Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to
+cause a denial of service (daemon crash) and possibly obtain sensitive
+information via a crafted length value that triggers a buffer over-read
+(CVE-2009-0844).
+
+The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in
+the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before
+1.6.4 allows remote attackers to cause a denial of service (daemon
+crash) or possibly execute arbitrary code via vectors involving an
+invalid DER encoding that triggers a free of an uninitialized pointer
+(CVE-2009-0846).
+
+The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5
+(aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to
+cause a denial of service (application crash) via a crafted length
+value that triggers an erroneous malloc call, related to incorrect
+calculations with pointer arithmetic (CVE-2009-0847).
+
+The updated packages have been patched to correct these issues.
+
+Update:
+
+krb5 packages for Mandriva Linux Corporate Server 3 and 4 are not
+affected by CVE-2009-0844 and CVE-2009-0845
+
+Affected: 2008.1, 2009.0, Corporate 3.0, Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:098
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Mandrake Security Advisory MDVSA-2009:098 (krb5)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Mandrake Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ftp-client-krb5", rpm:"ftp-client-krb5~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-server-krb5", rpm:"ftp-server-krb5~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5", rpm:"krb5~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-server", rpm:"krb5-server~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-workstation", rpm:"krb5-workstation~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb53", rpm:"libkrb53~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb53-devel", rpm:"libkrb53-devel~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-client-krb5", rpm:"telnet-client-krb5~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-server-krb5", rpm:"telnet-server-krb5~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb53", rpm:"lib64krb53~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb53-devel", rpm:"lib64krb53-devel~1.6.3~6.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-client-krb5", rpm:"ftp-client-krb5~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-server-krb5", rpm:"ftp-server-krb5~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5", rpm:"krb5~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-server", rpm:"krb5-server~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-workstation", rpm:"krb5-workstation~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb53", rpm:"libkrb53~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb53-devel", rpm:"libkrb53-devel~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-client-krb5", rpm:"telnet-client-krb5~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-server-krb5", rpm:"telnet-server-krb5~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb53", rpm:"lib64krb53~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb53-devel", rpm:"lib64krb53-devel~1.6.3~6.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-client-krb5", rpm:"ftp-client-krb5~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-server-krb5", rpm:"ftp-server-krb5~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-server", rpm:"krb5-server~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-workstation", rpm:"krb5-workstation~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb51", rpm:"libkrb51~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb51-devel", rpm:"libkrb51-devel~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-client-krb5", rpm:"telnet-client-krb5~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-server-krb5", rpm:"telnet-server-krb5~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb51", rpm:"lib64krb51~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb51-devel", rpm:"lib64krb51-devel~1.3~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-client-krb5", rpm:"ftp-client-krb5~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ftp-server-krb5", rpm:"ftp-server-krb5~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-server", rpm:"krb5-server~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-workstation", rpm:"krb5-workstation~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb53", rpm:"libkrb53~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libkrb53-devel", rpm:"libkrb53-devel~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-client-krb5", rpm:"telnet-client-krb5~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"telnet-server-krb5", rpm:"telnet-server-krb5~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb53", rpm:"lib64krb53~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64krb53-devel", rpm:"lib64krb53-devel~1.4.3~5.7.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_099.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_099.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/mdksa_2009_099.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,146 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:099 (openafs)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(63914);
+ script_cve_id("CVE-2009-1250", "CVE-2009-1251");
+ script_version ("$");
+ name["english"] = "Mandrake Security Advisory MDVSA-2009:099 (openafs)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to openafs
+announced via advisory MDVSA-2009:099.
+
+Multiple vulnerabilities has been found and corrected in openafs:
+
+The cache manager in the client in OpenAFS 1.0 through 1.4.8 and
+1.5.0 through 1.5.58 on Linux allows remote attackers to cause a
+denial of service (system crash) via an RX response with a large
+error-code value that is interpreted as a pointer and dereferenced,
+related to use of the ERR_PTR macro (CVE-2009-1250).
+
+Heap-based buffer overflow in the cache manager in the client in
+OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms
+allows remote attackers to cause a denial of service (system crash)
+or possibly execute arbitrary code via an RX response containing
+more data than specified in a request, related to use of XDR arrays
+(CVE-2009-1251).
+
+The updated packages have been patched to correct these issues.
+
+Affected: 2008.1, 2009.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:099
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Mandrake Security Advisory MDVSA-2009:099 (openafs)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Mandrake Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dkms-libafs", rpm:"dkms-libafs~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenafs1", rpm:"libopenafs1~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenafs-devel", rpm:"libopenafs-devel~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs", rpm:"openafs~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs-client", rpm:"openafs-client~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs-doc", rpm:"openafs-doc~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs-server", rpm:"openafs-server~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openafs1", rpm:"lib64openafs1~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openafs-devel", rpm:"lib64openafs-devel~1.4.6~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dkms-libafs", rpm:"dkms-libafs~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenafs1", rpm:"libopenafs1~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenafs-devel", rpm:"libopenafs-devel~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs", rpm:"openafs~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs-client", rpm:"openafs-client~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs-doc", rpm:"openafs-doc~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openafs-server", rpm:"openafs-server~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openafs1", rpm:"lib64openafs1~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openafs-devel", rpm:"lib64openafs-devel~1.4.7~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_101.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_101.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/mdksa_2009_101.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,147 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:101 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(63915);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0800", "CVE-2009-0799", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
+ script_version ("$");
+ name["english"] = "Mandrake Security Advisory MDVSA-2009:101 (xpdf)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to xpdf
+announced via advisory MDVSA-2009:101.
+
+Multiple buffer overflows in the JBIG2 decoder allows remote
+attackers to cause a denial of service (crash) via a crafted PDF file
+(CVE-2009-0146).
+
+Multiple integer overflows in the JBIG2 decoder allows remote
+attackers to cause a denial of service (crash) via a crafted PDF file
+(CVE-2009-0147).
+
+An integer overflow in the JBIG2 decoder has unspecified
+impact. (CVE-2009-0165).
+
+A free of uninitialized memory flaw in the the JBIG2 decoder allows
+remote to cause a denial of service (crash) via a crafted PDF file
+(CVE-2009-0166).
+
+Multiple input validation flaws in the JBIG2 decoder allows
+remote attackers to execute arbitrary code via a crafted PDF file
+(CVE-2009-0800).
+
+An out-of-bounds read flaw in the JBIG2 decoder allows remote
+attackers to cause a denial of service (crash) via a crafted PDF file
+(CVE-2009-0799).
+
+An integer overflow in the JBIG2 decoder allows remote attackers to
+execute arbitrary code via a crafted PDF file (CVE-2009-1179).
+
+A free of invalid data flaw in the JBIG2 decoder allows remote
+attackers to execute arbitrary code via a crafted PDF (CVE-2009-1180).
+
+A NULL pointer dereference flaw in the JBIG2 decoder allows remote
+attackers to cause denial of service (crash) via a crafted PDF file
+(CVE-2009-1181).
+
+Multiple buffer overflows in the JBIG2 MMR decoder allows remote
+attackers to cause denial of service or to execute arbitrary code
+via a crafted PDF file (CVE-2009-1182, CVE-2009-1183).
+
+This update provides fixes for that vulnerabilities.
+
+Affected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:101
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Mandrake Security Advisory MDVSA-2009:101 (xpdf)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Mandrake Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~8.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-common", rpm:"xpdf-common~3.02~8.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.02~8.2mdv2008.0", rls:"MNDK_2008.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-common", rpm:"xpdf-common~3.02~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~12.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-common", rpm:"xpdf-common~3.02~12.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~0.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.02~0.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~0.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.02~0.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_103.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_103.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/mdksa_2009_103.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,139 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:103 (udev)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(63916);
+ script_cve_id("CVE-2009-1185", "CVE-2009-1186");
+ script_version ("$");
+ name["english"] = "Mandrake Security Advisory MDVSA-2009:103 (udev)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to udev
+announced via advisory MDVSA-2009:103.
+
+Security vulnerabilities have been identified and fixed in udev.
+
+udev before 1.4.1 does not verify whether a NETLINK message originates
+from kernel space, which allows local users to gain privileges by
+sending a NETLINK message from user space (CVE-2009-1185).
+
+Buffer overflow in the util_path_encode function in
+udev/lib/libudev-util.c in udev before 1.4.1 allows local users to
+cause a denial of service (service outage) via vectors that trigger
+a call with crafted arguments (CVE-2009-1186).
+
+The updated packages have been patched to prevent this.
+
+Affected: 2008.1, 2009.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:103
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Mandrake Security Advisory MDVSA-2009:103 (udev)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Mandrake Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libvolume_id0", rpm:"libvolume_id0~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvolume_id0-devel", rpm:"libvolume_id0-devel~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev", rpm:"udev~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev-doc", rpm:"udev-doc~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev-tools", rpm:"udev-tools~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64volume_id0", rpm:"lib64volume_id0~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64volume_id0-devel", rpm:"lib64volume_id0-devel~118~6.3mnb1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libudev0", rpm:"libudev0~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libudev0-devel", rpm:"libudev0-devel~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvolume_id1", rpm:"libvolume_id1~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvolume_id1-devel", rpm:"libvolume_id1-devel~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev", rpm:"udev~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev-doc", rpm:"udev-doc~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64udev0", rpm:"lib64udev0~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64udev0-devel", rpm:"lib64udev0-devel~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64volume_id1", rpm:"lib64volume_id1~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64volume_id1-devel", rpm:"lib64volume_id1-devel~128~2.2mnb2", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_104.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_104.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/mdksa_2009_104.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:104 (udev)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(63917);
+ script_cve_id("CVE-2009-1185");
+ script_version ("$");
+ name["english"] = "Mandrake Security Advisory MDVSA-2009:104 (udev)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing an update to udev
+announced via advisory MDVSA-2009:104.
+
+udev before 1.4.1 does not verify whether a NETLINK message originates
+from kernel space, which allows local users to gain privileges by
+sending a NETLINK message from user space (CVE-2009-1185).
+
+The updated packages have been patched to prevent this.
+
+Affected: Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:104
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "Mandrake Security Advisory MDVSA-2009:104 (udev)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "Mandrake Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"udev", rpm:"udev~068~34.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev-doc", rpm:"udev-doc~068~34.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"udev-tools", rpm:"udev-tools~068~34.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Modified: trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0436.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -1,4 +1,4 @@
-#CESA-2009:0436 63904 2
+#CESA-2009:0436 63904 4
 # $Id$
 # Description: Auto-generated from advisory CESA-2009:0436 (firefox)
 #
@@ -81,6 +81,9 @@
 if(isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.9~1.el5", rls:"CentOS5")) {
     vuln = 1;
 }
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.9~1.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
 
 if(vuln) {
     security_hole(0);

Added: trunk/openvas-plugins/scripts/ovcesa2009_0449.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0449.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0449.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,90 @@
+#CESA-2009:0449 63945 4
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:0449 (firefox)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63945);
+ script_cve_id("CVE-2009-1313");
+ script_version ("$");
+ name["english"] = "CentOS Security Advisory CESA-2009:0449 (firefox)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates to firefox announced in
+advisory CESA-2009:0449.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0449
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0449
+https://rhn.redhat.com/errata/RHSA-2009-0449.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "CentOS Security Advisory CESA-2009:0449 (firefox)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "CentOS Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.10~1.el5.centos", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.0.10~1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.0.10~1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xulrunner-devel-unstable", rpm:"xulrunner-devel-unstable~1.9.0.10~1.el5", rls:"CentOS5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.0.10~1.el4.centos", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl	2009-05-05 12:54:02 UTC (rev 3240)
+++ trunk/openvas-plugins/scripts/ovcesa2009_0459.nasl	2009-05-05 14:00:35 UTC (rev 3241)
@@ -0,0 +1,108 @@
+#CESA-2009:0459 63946 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:0459 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(63946);
+ script_cve_id("CVE-2008-4307", "CVE-2009-0028", "CVE-2009-0676", "CVE-2009-0834");
+ script_version ("$");
+ name["english"] = "CentOS Security Advisory CESA-2009:0459 (kernel)";
+ script_name(english:name["english"]);
+
+ desc["english"] = "
+The remote host is missing updates to kernel announced in
+advisory CESA-2009:0459.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0459
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0459
+https://rhn.redhat.com/errata/RHSA-2009-0459.html
+
+Risk factor : High";
+
+ script_description(english:desc["english"]);
+
+ summary["english"] = "CentOS Security Advisory CESA-2009:0459 (kernel)";
+ script_summary(english:summary["english"]);
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright(english:"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ family["english"] = "CentOS Local Security Checks";
+ script_family(english:family["english"]);
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp", rpm:"kernel-largesmp~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp-devel", rpm:"kernel-largesmp-devel~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU", rpm:"kernel-xenU~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU-devel", rpm:"kernel-xenU-devel~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem", rpm:"kernel-hugemem~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem-devel", rpm:"kernel-hugemem-devel~2.6.9~78.0.22.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list