[Openvas-commits] r5519 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Oct 13 18:25:54 CEST 2009


Author: reinke
Date: 2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)
New Revision: 5519

Added:
   trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1485.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1490.nasl
   trunk/openvas-plugins/scripts/deb_1902_1.nasl
   trunk/openvas-plugins/scripts/deb_1903_1.nasl
   trunk/openvas-plugins/scripts/deb_1904_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10233.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10237.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10344.nasl
   trunk/openvas-plugins/scripts/fcore_2009_9911.nasl
   trunk/openvas-plugins/scripts/freebsd_virtualbox.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_217_1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_217_2.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_257.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_258.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_259.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_260.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_261.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_262.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1485.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1490.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox1.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox3.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox5.nasl
   trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl
   trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl
   trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl
   trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl
   trunk/openvas-plugins/scripts/sles10_OpenEXR.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php1.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php2.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php3.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_pyt.nasl
   trunk/openvas-plugins/scripts/sles10_apache2.nasl
   trunk/openvas-plugins/scripts/sles10_apache20.nasl
   trunk/openvas-plugins/scripts/sles10_audiofile.nasl
   trunk/openvas-plugins/scripts/sles10_bind.nasl
   trunk/openvas-plugins/scripts/sles10_bind0.nasl
   trunk/openvas-plugins/scripts/sles10_bind1.nasl
   trunk/openvas-plugins/scripts/sles10_boost.nasl
   trunk/openvas-plugins/scripts/sles10_bytefx-data-mys.nasl
   trunk/openvas-plugins/scripts/sles10_bytefx-data-mys0.nasl
   trunk/openvas-plugins/scripts/sles10_bzip2.nasl
   trunk/openvas-plugins/scripts/sles10_cairo.nasl
   trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl
   trunk/openvas-plugins/scripts/sles10_cifs-mount0.nasl
   trunk/openvas-plugins/scripts/sles10_cifs-mount1.nasl
   trunk/openvas-plugins/scripts/sles10_clamav.nasl
   trunk/openvas-plugins/scripts/sles10_clamav0.nasl
   trunk/openvas-plugins/scripts/sles10_clamav1.nasl
   trunk/openvas-plugins/scripts/sles10_clamav2.nasl
   trunk/openvas-plugins/scripts/sles10_clamav3.nasl
   trunk/openvas-plugins/scripts/sles10_clamav4.nasl
   trunk/openvas-plugins/scripts/sles10_clamav5.nasl
   trunk/openvas-plugins/scripts/sles10_clamav6.nasl
   trunk/openvas-plugins/scripts/sles10_compat-curl2.nasl
   trunk/openvas-plugins/scripts/sles10_compat-openssl0.nasl
   trunk/openvas-plugins/scripts/sles10_compat-openssl00.nasl
   trunk/openvas-plugins/scripts/sles10_compat-openssl01.nasl
   trunk/openvas-plugins/scripts/sles10_cups.nasl
   trunk/openvas-plugins/scripts/sles10_cups0.nasl
   trunk/openvas-plugins/scripts/sles10_cups1.nasl
   trunk/openvas-plugins/scripts/sles10_cups2.nasl
   trunk/openvas-plugins/scripts/sles10_cups3.nasl
   trunk/openvas-plugins/scripts/sles10_cups4.nasl
   trunk/openvas-plugins/scripts/sles10_curl.nasl
   trunk/openvas-plugins/scripts/sles10_curl0.nasl
   trunk/openvas-plugins/scripts/sles10_cyrus-imapd.nasl
   trunk/openvas-plugins/scripts/sles10_cyrus-sasl.nasl
   trunk/openvas-plugins/scripts/sles10_dbus-1.nasl
   trunk/openvas-plugins/scripts/sles10_dbus-10.nasl
   trunk/openvas-plugins/scripts/sles10_dhcp.nasl
   trunk/openvas-plugins/scripts/sles10_dhcp0.nasl
   trunk/openvas-plugins/scripts/sles10_emacs.nasl
   trunk/openvas-plugins/scripts/sles10_emacs0.nasl
   trunk/openvas-plugins/scripts/sles10_enscript.nasl
   trunk/openvas-plugins/scripts/sles10_epiphany.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal0.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal1.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal2.nasl
   trunk/openvas-plugins/scripts/sles10_ethereal3.nasl
   trunk/openvas-plugins/scripts/sles10_evolution-data-.nasl
   trunk/openvas-plugins/scripts/sles10_festival.nasl
   trunk/openvas-plugins/scripts/sles10_fetchmail.nasl
   trunk/openvas-plugins/scripts/sles10_fetchmail0.nasl
   trunk/openvas-plugins/scripts/sles10_file.nasl
   trunk/openvas-plugins/scripts/sles10_findutils-locat.nasl
   trunk/openvas-plugins/scripts/sles10_flac.nasl
   trunk/openvas-plugins/scripts/sles10_freeradius.nasl
   trunk/openvas-plugins/scripts/sles10_freetype2.nasl
   trunk/openvas-plugins/scripts/sles10_freetype20.nasl
   trunk/openvas-plugins/scripts/sles10_freetype21.nasl
   trunk/openvas-plugins/scripts/sles10_gd.nasl
   trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl
   trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl
   trunk/openvas-plugins/scripts/sles10_geronimo.nasl
   trunk/openvas-plugins/scripts/sles10_ghostscript-fon.nasl
   trunk/openvas-plugins/scripts/sles10_ghostscript-fon0.nasl
   trunk/openvas-plugins/scripts/sles10_gnutls.nasl
   trunk/openvas-plugins/scripts/sles10_gnutls0.nasl
   trunk/openvas-plugins/scripts/sles10_gnutls1.nasl
   trunk/openvas-plugins/scripts/sles10_gnutls2.nasl
   trunk/openvas-plugins/scripts/sles10_gstreamer010-pl.nasl
   trunk/openvas-plugins/scripts/sles10_gvim.nasl
   trunk/openvas-plugins/scripts/sles10_gvim0.nasl
   trunk/openvas-plugins/scripts/sles10_hal.nasl
   trunk/openvas-plugins/scripts/sles10_hplip.nasl
   trunk/openvas-plugins/scripts/sles10_hplip17.nasl
   trunk/openvas-plugins/scripts/sles10_ia32el.nasl
   trunk/openvas-plugins/scripts/sles10_icu.nasl
   trunk/openvas-plugins/scripts/sles10_icu0.nasl
   trunk/openvas-plugins/scripts/sles10_id3lib.nasl
   trunk/openvas-plugins/scripts/sles10_ipsec-tools.nasl
   trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl
   trunk/openvas-plugins/scripts/sles10_jasper.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm1.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm0.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl
   trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl
   trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl
   trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl
   trunk/openvas-plugins/scripts/sles10_kdelibs3.nasl
   trunk/openvas-plugins/scripts/sles10_kdepim3.nasl
   trunk/openvas-plugins/scripts/sles10_kernel.nasl
   trunk/openvas-plugins/scripts/sles10_kernel0.nasl
   trunk/openvas-plugins/scripts/sles10_kernel1.nasl
   trunk/openvas-plugins/scripts/sles10_kernel2.nasl
   trunk/openvas-plugins/scripts/sles10_kernel3.nasl
   trunk/openvas-plugins/scripts/sles10_kernel4.nasl
   trunk/openvas-plugins/scripts/sles10_kernel5.nasl
   trunk/openvas-plugins/scripts/sles10_kernel6.nasl
   trunk/openvas-plugins/scripts/sles10_kernel7.nasl
   trunk/openvas-plugins/scripts/sles10_kernel8.nasl
   trunk/openvas-plugins/scripts/sles10_krb5.nasl
   trunk/openvas-plugins/scripts/sles10_libapr-util1.nasl
   trunk/openvas-plugins/scripts/sles10_libcdio.nasl
   trunk/openvas-plugins/scripts/sles10_libexif.nasl
   trunk/openvas-plugins/scripts/sles10_libexif5.nasl
   trunk/openvas-plugins/scripts/sles10_liblcms.nasl
   trunk/openvas-plugins/scripts/sles10_liblcms0.nasl
   trunk/openvas-plugins/scripts/sles10_libmikmod.nasl
   trunk/openvas-plugins/scripts/sles10_libnetpbm.nasl
   trunk/openvas-plugins/scripts/sles10_libpng.nasl
   trunk/openvas-plugins/scripts/sles10_libpng0.nasl
   trunk/openvas-plugins/scripts/sles10_libpng1.nasl
   trunk/openvas-plugins/scripts/sles10_libpng2.nasl
   trunk/openvas-plugins/scripts/sles10_libpng3.nasl
   trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl
   trunk/openvas-plugins/scripts/sles10_libsndfile.nasl
   trunk/openvas-plugins/scripts/sles10_libsndfile0.nasl
   trunk/openvas-plugins/scripts/sles10_libsoup.nasl
   trunk/openvas-plugins/scripts/sles10_libtiff.nasl
   trunk/openvas-plugins/scripts/sles10_libtiff0.nasl
   trunk/openvas-plugins/scripts/sles10_libtiff1.nasl
   trunk/openvas-plugins/scripts/sles10_libvirt.nasl
   trunk/openvas-plugins/scripts/sles10_libvorbis.nasl
   trunk/openvas-plugins/scripts/sles10_libvorbis0.nasl
   trunk/openvas-plugins/scripts/sles10_libxml2.nasl
   trunk/openvas-plugins/scripts/sles10_libxml20.nasl
   trunk/openvas-plugins/scripts/sles10_libxml21.nasl
   trunk/openvas-plugins/scripts/sles10_libxml22.nasl
   trunk/openvas-plugins/scripts/sles10_libxml23.nasl
   trunk/openvas-plugins/scripts/sles10_libxslt.nasl
   trunk/openvas-plugins/scripts/sles10_libxslt0.nasl
   trunk/openvas-plugins/scripts/sles10_mailman.nasl
   trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl
   trunk/openvas-plugins/scripts/sles10_mtr.nasl
   trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl
   trunk/openvas-plugins/scripts/sles10_mutt.nasl
   trunk/openvas-plugins/scripts/sles10_mutt0.nasl
   trunk/openvas-plugins/scripts/sles10_mysql.nasl
   trunk/openvas-plugins/scripts/sles10_mysql0.nasl
   trunk/openvas-plugins/scripts/sles10_mysql1.nasl
   trunk/openvas-plugins/scripts/sles10_nagios-plugins.nasl
   trunk/openvas-plugins/scripts/sles10_nagios.nasl
   trunk/openvas-plugins/scripts/sles10_nagios0.nasl
   trunk/openvas-plugins/scripts/sles10_net-snmp.nasl
   trunk/openvas-plugins/scripts/sles10_net-snmp0.nasl
   trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl
   trunk/openvas-plugins/scripts/sles10_netatalk.nasl
   trunk/openvas-plugins/scripts/sles10_nfs-utils.nasl
   trunk/openvas-plugins/scripts/sles10_open-iscsi.nasl
   trunk/openvas-plugins/scripts/sles10_openldap2-clien.nasl
   trunk/openvas-plugins/scripts/sles10_openldap2.nasl
   trunk/openvas-plugins/scripts/sles10_openldap20.nasl
   trunk/openvas-plugins/scripts/sles10_opensc.nasl
   trunk/openvas-plugins/scripts/sles10_opensc0.nasl
   trunk/openvas-plugins/scripts/sles10_opensc1.nasl
   trunk/openvas-plugins/scripts/sles10_openslp.nasl
   trunk/openvas-plugins/scripts/sles10_openssh.nasl
   trunk/openvas-plugins/scripts/sles10_openssh0.nasl
   trunk/openvas-plugins/scripts/sles10_openssl.nasl
   trunk/openvas-plugins/scripts/sles10_openssl0.nasl
   trunk/openvas-plugins/scripts/sles10_openssl1.nasl
   trunk/openvas-plugins/scripts/sles10_openssl2.nasl
   trunk/openvas-plugins/scripts/sles10_openswan.nasl
   trunk/openvas-plugins/scripts/sles10_openswan0.nasl
   trunk/openvas-plugins/scripts/sles10_openswan1.nasl
   trunk/openvas-plugins/scripts/sles10_pam_krb5.nasl
   trunk/openvas-plugins/scripts/sles10_pam_mount.nasl
   trunk/openvas-plugins/scripts/sles10_pam_mount0.nasl
   trunk/openvas-plugins/scripts/sles10_pcre.nasl
   trunk/openvas-plugins/scripts/sles10_perl-Net-DNS.nasl
   trunk/openvas-plugins/scripts/sles10_perl-Tk.nasl
   trunk/openvas-plugins/scripts/sles10_perl.nasl
   trunk/openvas-plugins/scripts/sles10_perl0.nasl
   trunk/openvas-plugins/scripts/sles10_poppler.nasl
   trunk/openvas-plugins/scripts/sles10_poppler0.nasl
   trunk/openvas-plugins/scripts/sles10_postfix.nasl
   trunk/openvas-plugins/scripts/sles10_postfix0.nasl
   trunk/openvas-plugins/scripts/sles10_postgresql-pl.nasl
   trunk/openvas-plugins/scripts/sles10_postgresql.nasl
   trunk/openvas-plugins/scripts/sles10_postgresql0.nasl
   trunk/openvas-plugins/scripts/sles10_postgresql1.nasl
   trunk/openvas-plugins/scripts/sles10_python.nasl
   trunk/openvas-plugins/scripts/sles10_python0.nasl
   trunk/openvas-plugins/scripts/sles10_python1.nasl
   trunk/openvas-plugins/scripts/sles10_quagga.nasl
   trunk/openvas-plugins/scripts/sles10_rsh.nasl
   trunk/openvas-plugins/scripts/sles10_rsync.nasl
   trunk/openvas-plugins/scripts/sles10_squid.nasl
   trunk/openvas-plugins/scripts/sles10_squid0.nasl
   trunk/openvas-plugins/scripts/sles10_star.nasl
   trunk/openvas-plugins/scripts/sles10_strongswan.nasl
   trunk/openvas-plugins/scripts/sles10_strongswan0.nasl
   trunk/openvas-plugins/scripts/sles10_strongswan1.nasl
   trunk/openvas-plugins/scripts/sles10_strongswan2.nasl
   trunk/openvas-plugins/scripts/sles10_strongswan3.nasl
   trunk/openvas-plugins/scripts/sles10_struts.nasl
   trunk/openvas-plugins/scripts/sles10_t1lib.nasl
   trunk/openvas-plugins/scripts/sles10_tcpdump.nasl
   trunk/openvas-plugins/scripts/sles10_tk.nasl
   trunk/openvas-plugins/scripts/sles10_tomcat5.nasl
   trunk/openvas-plugins/scripts/sles10_tomcat50.nasl
   trunk/openvas-plugins/scripts/sles10_tomcat51.nasl
   trunk/openvas-plugins/scripts/sles10_tomcat52.nasl
   trunk/openvas-plugins/scripts/sles10_tomcat53.nasl
   trunk/openvas-plugins/scripts/sles10_udev.nasl
   trunk/openvas-plugins/scripts/sles10_udev0.nasl
   trunk/openvas-plugins/scripts/sles10_unzip.nasl
   trunk/openvas-plugins/scripts/sles10_update-test-sec.nasl
   trunk/openvas-plugins/scripts/sles10_vsftpd.nasl
   trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl
   trunk/openvas-plugins/scripts/sles10_websphere-as_ce0.nasl
   trunk/openvas-plugins/scripts/sles10_wget.nasl
   trunk/openvas-plugins/scripts/sles10_xerces-j2.nasl
   trunk/openvas-plugins/scripts/sles10_xntp.nasl
   trunk/openvas-plugins/scripts/sles10_xntp0.nasl
   trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl
   trunk/openvas-plugins/scripts/sles10_xpdf.nasl
   trunk/openvas-plugins/scripts/sles10_xpdf0.nasl
   trunk/openvas-plugins/scripts/sles10_xpdf1.nasl
   trunk/openvas-plugins/scripts/sles10_xscreensaver.nasl
   trunk/openvas-plugins/scripts/sles10_xterm.nasl
   trunk/openvas-plugins/scripts/sles10_yast2-backup.nasl
   trunk/openvas-plugins/scripts/ubuntu_841_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_842_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_843_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_844_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_845_1.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/gather-package-list.nasl
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/ChangeLog	2009-10-13 16:25:40 UTC (rev 5519)
@@ -1,3 +1,287 @@
+2009-10-13  Thomas Reinke <reinke at securityspace.com>
+
+	* scripts/deb_1902_1.nasl,
+	scripts/deb_1903_1.nasl,
+	scripts/deb_1904_1.nasl,
+	scripts/freebsd_virtualbox.nasl,
+	scripts/ubuntu_841_1.nasl,
+	scripts/ubuntu_842_1.nasl,
+	scripts/ubuntu_843_1.nasl,
+	scripts/ubuntu_844_1.nasl,
+	scripts/ubuntu_845_1.nasl,
+	scripts/mdksa_2009_217_1.nasl,
+	scripts/mdksa_2009_217_2.nasl,
+	scripts/mdksa_2009_256.nasl,
+	scripts/mdksa_2009_257.nasl,
+	scripts/mdksa_2009_258.nasl,
+	scripts/mdksa_2009_259.nasl,
+	scripts/mdksa_2009_260.nasl,
+	scripts/mdksa_2009_261.nasl,
+	scripts/mdksa_2009_262.nasl,
+	scripts/RHSA_2009_1484.nasl,
+	scripts/RHSA_2009_1485.nasl,
+	scripts/RHSA_2009_1490.nasl,
+	scripts/fcore_2009_10233.nasl,
+	scripts/fcore_2009_10237.nasl,
+	scripts/fcore_2009_10344.nasl,
+	scripts/fcore_2009_9911.nasl,
+	scripts/ovcesa2009_1471.nasl,
+	scripts/ovcesa2009_1484.nasl,
+	scripts/ovcesa2009_1485.nasl,
+	scripts/ovcesa2009_1490.nasl,
+	scripts/sles10_MozillaFirefox.nasl,
+	scripts/sles10_MozillaFirefox0.nasl,
+	scripts/sles10_MozillaFirefox1.nasl,
+	scripts/sles10_MozillaFirefox2.nasl,
+	scripts/sles10_MozillaFirefox3.nasl,
+	scripts/sles10_MozillaFirefox4.nasl,
+	scripts/sles10_MozillaFirefox5.nasl,
+	scripts/sles10_MozillaFirefox6.nasl,
+	scripts/sles10_NetworkManager-.nasl,
+	scripts/sles10_NetworkManager-0.nasl,
+	scripts/sles10_NetworkManager.nasl,
+	scripts/sles10_OpenEXR.nasl,
+	scripts/sles10_apache2-mod_php.nasl,
+	scripts/sles10_apache2-mod_php0.nasl,
+	scripts/sles10_apache2-mod_php1.nasl,
+	scripts/sles10_apache2-mod_php2.nasl,
+	scripts/sles10_apache2-mod_php3.nasl,
+	scripts/sles10_apache2-mod_pyt.nasl,
+	scripts/sles10_apache2.nasl,
+	scripts/sles10_apache20.nasl,
+	scripts/sles10_audiofile.nasl,
+	scripts/sles10_bind.nasl,
+	scripts/sles10_bind0.nasl,
+	scripts/sles10_bind1.nasl,
+	scripts/sles10_boost.nasl,
+	scripts/sles10_bytefx-data-mys.nasl,
+	scripts/sles10_bytefx-data-mys0.nasl,
+	scripts/sles10_bzip2.nasl,
+	scripts/sles10_cairo.nasl,
+	scripts/sles10_cifs-mount.nasl,
+	scripts/sles10_cifs-mount0.nasl,
+	scripts/sles10_cifs-mount1.nasl,
+	scripts/sles10_clamav.nasl,
+	scripts/sles10_clamav0.nasl,
+	scripts/sles10_clamav1.nasl,
+	scripts/sles10_clamav2.nasl,
+	scripts/sles10_clamav3.nasl,
+	scripts/sles10_clamav4.nasl,
+	scripts/sles10_clamav5.nasl,
+	scripts/sles10_clamav6.nasl,
+	scripts/sles10_compat-curl2.nasl,
+	scripts/sles10_compat-openssl0.nasl,
+	scripts/sles10_compat-openssl00.nasl,
+	scripts/sles10_compat-openssl01.nasl,
+	scripts/sles10_cups.nasl,
+	scripts/sles10_cups0.nasl,
+	scripts/sles10_cups1.nasl,
+	scripts/sles10_cups2.nasl,
+	scripts/sles10_cups3.nasl,
+	scripts/sles10_cups4.nasl,
+	scripts/sles10_curl.nasl,
+	scripts/sles10_curl0.nasl,
+	scripts/sles10_cyrus-imapd.nasl,
+	scripts/sles10_cyrus-sasl.nasl,
+	scripts/sles10_dbus-1.nasl,
+	scripts/sles10_dbus-10.nasl,
+	scripts/sles10_dhcp.nasl,
+	scripts/sles10_dhcp0.nasl,
+	scripts/sles10_emacs.nasl,
+	scripts/sles10_emacs0.nasl,
+	scripts/sles10_enscript.nasl,
+	scripts/sles10_epiphany.nasl,
+	scripts/sles10_ethereal.nasl,
+	scripts/sles10_ethereal0.nasl,
+	scripts/sles10_ethereal1.nasl,
+	scripts/sles10_ethereal2.nasl,
+	scripts/sles10_ethereal3.nasl,
+	scripts/sles10_evolution-data-.nasl,
+	scripts/sles10_festival.nasl,
+	scripts/sles10_fetchmail.nasl,
+	scripts/sles10_fetchmail0.nasl,
+	scripts/sles10_file.nasl,
+	scripts/sles10_findutils-locat.nasl,
+	scripts/sles10_flac.nasl,
+	scripts/sles10_freeradius.nasl,
+	scripts/sles10_freetype2.nasl,
+	scripts/sles10_freetype20.nasl,
+	scripts/sles10_freetype21.nasl,
+	scripts/sles10_gd.nasl,
+	scripts/sles10_gecko-sdk.nasl,
+	scripts/sles10_gecko-sdk0.nasl,
+	scripts/sles10_geronimo.nasl,
+	scripts/sles10_ghostscript-fon.nasl,
+	scripts/sles10_ghostscript-fon0.nasl,
+	scripts/sles10_gnutls.nasl,
+	scripts/sles10_gnutls0.nasl,
+	scripts/sles10_gnutls1.nasl,
+	scripts/sles10_gnutls2.nasl,
+	scripts/sles10_gstreamer010-pl.nasl,
+	scripts/sles10_gvim.nasl,
+	scripts/sles10_gvim0.nasl,
+	scripts/sles10_hal.nasl,
+	scripts/sles10_hplip.nasl,
+	scripts/sles10_hplip17.nasl,
+	scripts/sles10_ia32el.nasl,
+	scripts/sles10_icu.nasl,
+	scripts/sles10_icu0.nasl,
+	scripts/sles10_id3lib.nasl,
+	scripts/sles10_ipsec-tools.nasl,
+	scripts/sles10_ipsec-tools0.nasl,
+	scripts/sles10_jasper.nasl,
+	scripts/sles10_java-1_4_2-ibm.nasl,
+	scripts/sles10_java-1_4_2-ibm0.nasl,
+	scripts/sles10_java-1_4_2-ibm1.nasl,
+	scripts/sles10_java-1_4_2-ibm2.nasl,
+	scripts/sles10_java-1_4_2-ibm3.nasl,
+	scripts/sles10_java-1_4_2-sun.nasl,
+	scripts/sles10_java-1_4_2-sun0.nasl,
+	scripts/sles10_java-1_4_2-sun1.nasl,
+	scripts/sles10_java-1_5_0-ibm.nasl,
+	scripts/sles10_java-1_5_0-ibm0.nasl,
+	scripts/sles10_java-1_5_0-ibm1.nasl,
+	scripts/sles10_java-1_5_0-ibm2.nasl,
+	scripts/sles10_java-1_5_0-ibm3.nasl,
+	scripts/sles10_java-1_5_0-ibm4.nasl,
+	scripts/sles10_kdegraphics3-pd.nasl,
+	scripts/sles10_kdegraphics3.nasl,
+	scripts/sles10_kdelibs3.nasl,
+	scripts/sles10_kdepim3.nasl,
+	scripts/sles10_kernel.nasl,
+	scripts/sles10_kernel0.nasl,
+	scripts/sles10_kernel1.nasl,
+	scripts/sles10_kernel2.nasl,
+	scripts/sles10_kernel3.nasl,
+	scripts/sles10_kernel4.nasl,
+	scripts/sles10_kernel5.nasl,
+	scripts/sles10_kernel6.nasl,
+	scripts/sles10_kernel7.nasl,
+	scripts/sles10_kernel8.nasl,
+	scripts/sles10_krb5.nasl,
+	scripts/sles10_libapr-util1.nasl,
+	scripts/sles10_libcdio.nasl,
+	scripts/sles10_libexif.nasl,
+	scripts/sles10_libexif5.nasl,
+	scripts/sles10_liblcms.nasl,
+	scripts/sles10_liblcms0.nasl,
+	scripts/sles10_libmikmod.nasl,
+	scripts/sles10_libnetpbm.nasl,
+	scripts/sles10_libpng.nasl,
+	scripts/sles10_libpng0.nasl,
+	scripts/sles10_libpng1.nasl,
+	scripts/sles10_libpng2.nasl,
+	scripts/sles10_libpng3.nasl,
+	scripts/sles10_librpcsecgss.nasl,
+	scripts/sles10_libsndfile.nasl,
+	scripts/sles10_libsndfile0.nasl,
+	scripts/sles10_libsoup.nasl,
+	scripts/sles10_libtiff.nasl,
+	scripts/sles10_libtiff0.nasl,
+	scripts/sles10_libtiff1.nasl,
+	scripts/sles10_libvirt.nasl,
+	scripts/sles10_libvorbis.nasl,
+	scripts/sles10_libvorbis0.nasl,
+	scripts/sles10_libxml2.nasl,
+	scripts/sles10_libxml20.nasl,
+	scripts/sles10_libxml21.nasl,
+	scripts/sles10_libxml22.nasl,
+	scripts/sles10_libxml23.nasl,
+	scripts/sles10_libxslt.nasl,
+	scripts/sles10_libxslt0.nasl,
+	scripts/sles10_mailman.nasl,
+	scripts/sles10_mozilla-xulrunn.nasl,
+	scripts/sles10_mtr.nasl,
+	scripts/sles10_multipath-tools.nasl,
+	scripts/sles10_mutt.nasl,
+	scripts/sles10_mutt0.nasl,
+	scripts/sles10_mysql.nasl,
+	scripts/sles10_mysql0.nasl,
+	scripts/sles10_mysql1.nasl,
+	scripts/sles10_nagios-plugins.nasl,
+	scripts/sles10_nagios.nasl,
+	scripts/sles10_nagios0.nasl,
+	scripts/sles10_net-snmp.nasl,
+	scripts/sles10_net-snmp0.nasl,
+	scripts/sles10_net-snmp1.nasl,
+	scripts/sles10_netatalk.nasl,
+	scripts/sles10_nfs-utils.nasl,
+	scripts/sles10_open-iscsi.nasl,
+	scripts/sles10_openldap2-clien.nasl,
+	scripts/sles10_openldap2.nasl,
+	scripts/sles10_openldap20.nasl,
+	scripts/sles10_opensc.nasl,
+	scripts/sles10_opensc0.nasl,
+	scripts/sles10_opensc1.nasl,
+	scripts/sles10_openslp.nasl,
+	scripts/sles10_openssh.nasl,
+	scripts/sles10_openssh0.nasl,
+	scripts/sles10_openssl.nasl,
+	scripts/sles10_openssl0.nasl,
+	scripts/sles10_openssl1.nasl,
+	scripts/sles10_openssl2.nasl,
+	scripts/sles10_openswan.nasl,
+	scripts/sles10_openswan0.nasl,
+	scripts/sles10_openswan1.nasl,
+	scripts/sles10_pam_krb5.nasl,
+	scripts/sles10_pam_mount.nasl,
+	scripts/sles10_pam_mount0.nasl,
+	scripts/sles10_pcre.nasl,
+	scripts/sles10_perl-Net-DNS.nasl,
+	scripts/sles10_perl-Tk.nasl,
+	scripts/sles10_perl.nasl,
+	scripts/sles10_perl0.nasl,
+	scripts/sles10_poppler.nasl,
+	scripts/sles10_poppler0.nasl,
+	scripts/sles10_postfix.nasl,
+	scripts/sles10_postfix0.nasl,
+	scripts/sles10_postgresql-pl.nasl,
+	scripts/sles10_postgresql.nasl,
+	scripts/sles10_postgresql0.nasl,
+	scripts/sles10_postgresql1.nasl,
+	scripts/sles10_python.nasl,
+	scripts/sles10_python0.nasl,
+	scripts/sles10_python1.nasl,
+	scripts/sles10_quagga.nasl,
+	scripts/sles10_rsh.nasl,
+	scripts/sles10_rsync.nasl,
+	scripts/sles10_squid.nasl,
+	scripts/sles10_squid0.nasl,
+	scripts/sles10_star.nasl,
+	scripts/sles10_strongswan.nasl,
+	scripts/sles10_strongswan0.nasl,
+	scripts/sles10_strongswan1.nasl,
+	scripts/sles10_strongswan2.nasl,
+	scripts/sles10_strongswan3.nasl,
+	scripts/sles10_struts.nasl,
+	scripts/sles10_t1lib.nasl,
+	scripts/sles10_tcpdump.nasl,
+	scripts/sles10_tk.nasl,
+	scripts/sles10_tomcat5.nasl,
+	scripts/sles10_tomcat50.nasl,
+	scripts/sles10_tomcat51.nasl,
+	scripts/sles10_tomcat52.nasl,
+	scripts/sles10_tomcat53.nasl,
+	scripts/sles10_udev.nasl,
+	scripts/sles10_udev0.nasl,
+	scripts/sles10_unzip.nasl,
+	scripts/sles10_update-test-sec.nasl,
+	scripts/sles10_vsftpd.nasl,
+	scripts/sles10_websphere-as_ce.nasl,
+	scripts/sles10_websphere-as_ce0.nasl,
+	scripts/sles10_wget.nasl,
+	scripts/sles10_xerces-j2.nasl,
+	scripts/sles10_xntp.nasl,
+	scripts/sles10_xntp0.nasl,
+	scripts/sles10_xorg-x11-Xnest.nasl,
+	scripts/sles10_xpdf.nasl,
+	scripts/sles10_xpdf0.nasl,
+	scripts/sles10_xpdf1.nasl,
+	scripts/sles10_xscreensaver.nasl,
+	scripts/sles10_xterm.nasl,
+	scripts/sles10_yast2-backup.nasl:
+	New scripts
+
 2009-10-13  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/gb_solaris_112960_68.nasl,

Added: trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1484.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,169 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1484 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65729);
+ script_cve_id("CVE-2009-0922", "CVE-2009-3230", "CVE-2007-6600");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1484");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1484.
+
+PostgreSQL is an advanced object-relational database management system
+(DBMS).
+
+It was discovered that the upstream patch for CVE-2007-6600 included in the
+Red Hat Security Advisory RHSA-2008:0038 did not include protection against
+misuse of the RESET ROLE and RESET SESSION AUTHORIZATION commands. An
+authenticated user could use this flaw to install malicious code that would
+later execute with superuser privileges. (CVE-2009-3230)
+
+A flaw was found in the way PostgreSQL handled encoding conversion. A
+remote, authenticated user could trigger an encoding conversion failure,
+possibly leading to a temporary denial of service. Note: To exploit this
+issue, a locale and client encoding for which specific messages fail to
+translate must be selected (the availability of these is determined by an
+administrator-defined locale setting). (CVE-2009-0922)
+
+Note: For Red Hat Enterprise Linux 4, this update upgrades PostgreSQL to
+version 7.4.26. For Red Hat Enterprise Linux 5, this update upgrades
+PostgreSQL to version 8.1.18. Refer to the PostgreSQL Release Notes for a
+list of changes:
+
+http://www.postgresql.org/docs/7.4/static/release.html
+http://www.postgresql.org/docs/8.1/static/release.html
+
+All PostgreSQL users should upgrade to these updated packages, which
+resolve these issues. If the postgresql service is running, it will be
+automatically restarted after installing this update.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1484.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1484");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-debuginfo", rpm:"postgresql-debuginfo~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-jdbc", rpm:"postgresql-jdbc~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-python", rpm:"postgresql-python~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-tcl", rpm:"postgresql-tcl~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-test", rpm:"postgresql-test~7.4.26~1.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-debuginfo", rpm:"postgresql-debuginfo~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-python", rpm:"postgresql-python~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-tcl", rpm:"postgresql-tcl~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-test", rpm:"postgresql-test~8.1.18~2.el5_4.1", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1485.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1485.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1485.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,122 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1485 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65730);
+ script_cve_id("CVE-2009-3230", "CVE-2007-6600");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1485");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1485.
+
+PostgreSQL is an advanced object-relational database management system
+(DBMS).
+
+It was discovered that the upstream patch for CVE-2007-6600 included in the
+Red Hat Security Advisory RHSA-2008:0039 did not include protection against
+misuse of the RESET ROLE and RESET SESSION AUTHORIZATION commands. An
+authenticated user could use this flaw to install malicious code that would
+later execute with superuser privileges. (CVE-2009-3230)
+
+All PostgreSQL users should upgrade to these updated packages, which
+contain a backported patch to correct this issue. If you are running a
+PostgreSQL server, the postgresql service must be restarted for this update
+to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1485.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1485");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rh-postgresql", rpm:"rh-postgresql~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-contrib", rpm:"rh-postgresql-contrib~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-debuginfo", rpm:"rh-postgresql-debuginfo~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-devel", rpm:"rh-postgresql-devel~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-docs", rpm:"rh-postgresql-docs~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-jdbc", rpm:"rh-postgresql-jdbc~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-libs", rpm:"rh-postgresql-libs~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-pl", rpm:"rh-postgresql-pl~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-python", rpm:"rh-postgresql-python~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-server", rpm:"rh-postgresql-server~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-tcl", rpm:"rh-postgresql-tcl~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-test", rpm:"rh-postgresql-test~7.3.21~2", rls:"RHENT_3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1490.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1490.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1490.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,94 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1490 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65731);
+ script_cve_id("CVE-2009-2964");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1490");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1490.
+
+SquirrelMail is a standards-based webmail package written in PHP.
+
+Form submissions in SquirrelMail did not implement protection against
+Cross-Site Request Forgery (CSRF) attacks. If a remote attacker tricked a
+user into visiting a malicious web page, the attacker could hijack that
+user's authentication, inject malicious content into that user's
+preferences, or possibly send mail without that user's permission.
+(CVE-2009-2964)
+
+Users of SquirrelMail should upgrade to this updated package, which
+contains a backported patch to correct these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1490.html
+http://www.redhat.com/security/updates/classification/#moderate
+http://www.squirrelmail.org/security/issue/2009-08-12
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1490");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"squirrelmail", rpm:"squirrelmail~1.4.8~16.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"squirrelmail", rpm:"squirrelmail~1.4.8~5.el4_8.8", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"squirrelmail", rpm:"squirrelmail~1.4.8~5.el5_4.10", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1902_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1902_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/deb_1902_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1902-1 (elinks)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65745);
+ script_cve_id("CVE-2008-7224");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1902-1 (elinks)");
+
+ desc = "
+The remote host is missing an update to elinks
+announced via advisory DSA 1902-1.
+
+Jakub Wilk discovered an off-by-one buffer overflow in the charset
+handling of elinks, a feature-rich text-mode WWW browser, which might
+lead to the execution of arbitrary code if the user is tricked into
+opening a malformed HTML page.
+
+For the old stable distribution (etch), this problem has been fixed in
+version 0.11.1-1.2etch2.
+
+The stable distribution (lenny) and the unstable distribution (sid)
+already contain a patch for this problem.
+
+We recommend that you upgrade your elinks package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201902-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1902-1 (elinks)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"elinks-lite", ver:"0.11.1-1.2etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"elinks", ver:"0.11.1-1.2etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1903_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1903_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/deb_1903_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,139 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1903-1 (graphicsmagick)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65746);
+ script_cve_id("CVE-2007-1667", "CVE-2007-1797", "CVE-2007-4985", "CVE-2007-4986", "CVE-2007-4988", "CVE-2008-1096", "CVE-2008-3134", "CVE-2008-6070", "CVE-2008-6071", "CVE-2008-6072", "CVE-2008-6621", "CVE-2009-1882");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1903-1 (graphicsmagick)");
+
+ desc = "
+The remote host is missing an update to graphicsmagick
+announced via advisory DSA 1903-1.
+
+Several vulnerabilities have been discovered in graphicsmagick, a
+collection of image processing tool, which can lead to the execution
+of arbitrary code, exposure of sensitive information or cause DoS.
+For details on the issuess addressed, please visit the referenced
+security advisories.
+
+For the oldstable distribution (etch), these problems have been fixed in
+version 1.1.7-13+etch1.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1.1.11-3.2+lenny1.
+
+For the upcoming stable distribution (squeeze) and the unstable
+distribution ion (sid), these problems have been fixed in version
+1.3.5-5.1.
+
+We recommend that you upgrade your graphicsmagick packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201903-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1903-1 (graphicsmagick)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"graphicsmagick-libmagick-dev-compat", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick-imagemagick-compat", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick1-dev", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick1", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphics-magick-perl", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick-dbg", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick++1", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick++1-dev", ver:"1.1.7-13+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick-imagemagick-compat", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick-libmagick-dev-compat", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick++1", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick1-dev", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphics-magick-perl", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick1", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgraphicsmagick++1-dev", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"graphicsmagick-dbg", ver:"1.1.11-3.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1904_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1904_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/deb_1904_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1904-1 (wget)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65747);
+ script_cve_id("CVE-2009-3490");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1904-1 (wget)");
+
+ desc = "
+The remote host is missing an update to wget
+announced via advisory DSA 1904-1.
+
+Daniel Stenberg discovered that wget, a network utility to retrieve files from
+the Web using http(s) and ftp, is vulnerable to the Null Prefix Attacks Against
+SSL/TLS Certificates published at the Blackhat conference some time ago.  This
+allows an attacker to perform undetected man-in-the-middle attacks via a crafted
+ITU-T X.509 certificate with an injected null byte in the Common Name field.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.10.2-2+etch1.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.11.4-2+lenny1.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the  unstable distribution (sid), this problem has been fixed in
+version 1.12-1.
+
+We recommend that you upgrade your wget packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201904-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1904-1 (wget)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"wget", ver:"1.10.2-2+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wget", ver:"1.11.4-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10233.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10233.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/fcore_2009_10233.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10233 (deltarpm)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65744);
+ script_cve_id("CAN-2005-1849");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10233 (deltarpm)");
+
+ desc = "
+The remote host is missing an update to deltarpm
+announced via advisory FEDORA-2009-10233.
+
+Update Information:
+
+deltarpm prior to the current build ships with a bundled copy of zlib.  This
+version of zlib has a known vulnerability with CVE identifier: CAN-2005-1849
+This build of deltarpm patches the program to use the system zlib (which was
+fixed when the vulnerability was first discovered) instead of the bundled copy.
+
+ChangeLog:
+
+* Wed Sep 30 2009 Toshio Kuratomi  - 3.4-11.1
+- Build against the system zlib, not the bundled library.  This remedies the
+fact that the included zlib is affected by CAN-2005-1849.
+- Fix cfile_detect_rsync() to detect rsync even if we don't have a zlib capable
+of making rsync-friendly compressed files.
+
+References:
+
+[ 1 ] Bug #526432 - deltarpm contains an own, modified copy of zlib
+https://bugzilla.redhat.com/show_bug.cgi?id=526432
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update deltarpm' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10233
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10233 (deltarpm)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"deltarpm", rpm:"deltarpm~3.4~11.fc10.1", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"deltarpm-debuginfo", rpm:"deltarpm-debuginfo~3.4~11.fc10.1", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10237.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10237.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/fcore_2009_10237.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,101 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10237 (deltarpm)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65742);
+ script_cve_id("CAN-2005-1849");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10237 (deltarpm)");
+
+ desc = "
+The remote host is missing an update to deltarpm
+announced via advisory FEDORA-2009-10237.
+
+Update Information:
+
+deltarpm prior to the current build ships with a bundled copy of zlib.  This
+version of zlib has a known vulnerability with CVE identifier: CAN-2005-1849
+This build of deltarpm patches the program to use the system zlib (which was
+fixed when the vulnerability was first discovered) instead of the bundled copy.
+
+ChangeLog:
+
+* Wed Sep 30 2009 Toshio Kuratomi  - 3.4-17
+- Work around cvs tag problem
+* Wed Sep 30 2009 Toshio Kuratomi  - 3.4-16
+- Build against the system zlib, not the bundled library.  This remedies the
+fact that the included zlib is affected by CAN-2005-1849.
+- Fix cfile_detect_rsync() to detect rsync even if we don't have a zlib capable
+of making rsync-friendly compressed files.
+
+References:
+
+[ 1 ] Bug #526432 - deltarpm contains an own, modified copy of zlib
+https://bugzilla.redhat.com/show_bug.cgi?id=526432
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update deltarpm' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10237
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10237 (deltarpm)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"deltarpm", rpm:"deltarpm~3.4~17.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"deltarpm-debuginfo", rpm:"deltarpm-debuginfo~3.4~17.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10344.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10344.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/fcore_2009_10344.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,96 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10344 (aria2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65743);
+ script_cve_id("CVE-2009-3575");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10344 (aria2)");
+
+ desc = "
+The remote host is missing an update to aria2
+announced via advisory FEDORA-2009-10344.
+
+Update Information:
+
+Fixes CVE-2009-3575, A buffer overflow vulnerability described in more detail at
+https://bugzilla.redhat.com/show_bug.cgi?id=527827
+
+ChangeLog:
+
+* Thu Oct  8 2009 Rahul Sundaram  - 1.3.1-2
+- Fix spec. Dumb mistake
+* Thu Oct  8 2009 Rahul Sundaram  - 1.3.1-1
+- Update to the same version as Fedora 11 that fixes rhbz#52782
+
+References:
+
+[ 1 ] Bug #527827 - CVE-2009-3575 aria2: buffer overflow vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=527827
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update aria2' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10344
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10344 (aria2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"aria2", rpm:"aria2~1.3.1~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"aria2-debuginfo", rpm:"aria2-debuginfo~1.3.1~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_9911.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_9911.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/fcore_2009_9911.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-9911 (thunderbird)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65741);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-9911 (thunderbird)");
+
+ desc = "
+The remote host is missing an update to thunderbird
+announced via advisory FEDORA-2009-9911.
+
+ChangeLog:
+
+* Thu Sep 17 2009 Jan Horak  - 3.0-2.7
+- Update to 3.0 beta4
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update thunderbird' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-9911
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-9911 (thunderbird)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~3.0~2.7.b4.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"thunderbird-debuginfo", rpm:"thunderbird-debuginfo~3.0~2.7.b4.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_virtualbox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_virtualbox.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/freebsd_virtualbox.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID ebeed063-b328-11de-b6a5-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID ebeed063-b328-11de-b6a5-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65753);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: virtualbox");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: virtualbox
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://sunsolve.sun.com/search/document.do?assetkey=1-66-268188-1
+http://secunia.com/advisories/36929
+http://www.vuxml.org/freebsd/ebeed063-b328-11de-b6a5-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: virtualbox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"virtualbox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.0.51.r22902_2")<0) {
+    security_note(0, data:"Package virtualbox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Modified: trunk/openvas-plugins/scripts/gather-package-list.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gather-package-list.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/gather-package-list.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -609,7 +609,7 @@
     security_note(port:port, data:string("We are able to login and detect that you are running SuSE Linux Enterprise Server 11"));
     exit(0);
 }
-if("SUSE LINUX Enterprise Server 10 "><rls) {
+if("SUSE Linux Enterprise Server 10 "><rls) {
     set_kb_item(name: "ssh/login/release", value: "SLES10.0");
     buf = ssh_cmd(socket:sock, cmd:"/bin/rpm -qa --qf '%{NAME}~%{VERSION}~%{RELEASE};'");
     set_kb_item(name: "ssh/login/rpms", value: ";" + buf);

Added: trunk/openvas-plugins/scripts/mdksa_2009_217_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_217_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_217_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:217-1 (mozilla-thunderbird)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65736);
+ script_cve_id("CVE-2009-2408", "CVE-2009-2625");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:217-1 (mozilla-thunderbird)");
+
+ desc = "
+The remote host is missing an update to mozilla-thunderbird
+announced via advisory MDVSA-2009:217-1.
+
+A number of security vulnerabilities have been discovered in Mozilla
+Thunderbird:
+
+Security issues in thunderbird could lead to a man-in-the-middle
+attack via a spoofed X.509 certificate (CVE-2009-2408).
+
+A vulnerability was found in xmltok_impl.c (expat) that with
+specially crafted XML could be exploited and lead to a denial of
+service attack. Related to CVE-2009-2625.
+
+This update provides the latest version of Thunderbird which are not
+vulnerable to these issues.
+
+Update:
+
+The mozilla-thunderbird-moztraybiff packages had the wrong release
+which prevented it to be upgraded (#53129). The new packages addresses
+this problem.
+
+Affected: 2009.1
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:217-1
+http://www.mozilla.org/security/announce/2009/mfsa2009-42.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:217-1 (mozilla-thunderbird)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-thunderbird-moztraybiff", rpm:"mozilla-thunderbird-moztraybiff~1.2.4~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_217_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_217_2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_217_2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:217-2 (mozilla-thunderbird)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65737);
+ script_cve_id("CVE-2009-2408", "CVE-2009-2625");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:217-2 (mozilla-thunderbird)");
+
+ desc = "
+The remote host is missing an update to mozilla-thunderbird
+announced via advisory MDVSA-2009:217-2.
+
+A number of security vulnerabilities have been discovered in Mozilla
+Thunderbird:
+
+Security issues in thunderbird could lead to a man-in-the-middle
+attack via a spoofed X.509 certificate (CVE-2009-2408).
+
+A vulnerability was found in xmltok_impl.c (expat) that with
+specially crafted XML could be exploited and lead to a denial of
+service attack. Related to CVE-2009-2625.
+
+This update provides the latest version of Thunderbird which are not
+vulnerable to these issues.
+
+Update:
+
+The previous mozilla-thunderbird-moztraybiff packages had the wrong
+release which prevented it to be upgraded (#53129). The new packages
+addresses this problem.
+
+Affected: 2009.1
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:217-2
+http://www.mozilla.org/security/announce/2009/mfsa2009-42.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:217-2 (mozilla-thunderbird)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-thunderbird-moztraybiff", rpm:"mozilla-thunderbird-moztraybiff~1.2.4~4.2mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_256.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_256.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_256.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,136 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:256 (dbus)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65733);
+ script_cve_id("CVE-2008-3834", "CVE-2009-1189");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:256 (dbus)");
+
+ desc = "
+The remote host is missing an update to dbus
+announced via advisory MDVSA-2009:256.
+
+A vulnerability was discovered and corrected in dbus:
+
+The _dbus_validate_signature_with_reason function
+(dbus-marshal-validate.c) in D-Bus (aka DBus) uses incorrect logic
+to validate a basic type, which allows remote attackers to spoof a
+signature via a crafted key.  NOTE: this is due to an incorrect fix
+for CVE-2008-3834 (CVE-2009-1189).
+
+This update provides a fix for this vulnerability.
+
+Affected: 2008.1, 2009.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:256
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:256 (dbus)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dbus", rpm:"dbus~1.1.20~5.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-x11", rpm:"dbus-x11~1.1.20~5.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libdbus-1_3", rpm:"libdbus-1_3~1.1.20~5.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libdbus-1-devel", rpm:"libdbus-1-devel~1.1.20~5.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64dbus-1_3", rpm:"lib64dbus-1_3~1.1.20~5.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64dbus-1-devel", rpm:"lib64dbus-1-devel~1.1.20~5.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus", rpm:"dbus~1.2.3~2.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-x11", rpm:"dbus-x11~1.2.3~2.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libdbus-1_3", rpm:"libdbus-1_3~1.2.3~2.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libdbus-1-devel", rpm:"libdbus-1-devel~1.2.3~2.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64dbus-1_3", rpm:"lib64dbus-1_3~1.2.3~2.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64dbus-1-devel", rpm:"lib64dbus-1-devel~1.2.3~2.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus", rpm:"dbus~1.2.3~2.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-x11", rpm:"dbus-x11~1.2.3~2.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libdbus-1_3", rpm:"libdbus-1_3~1.2.3~2.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libdbus-1-devel", rpm:"libdbus-1-devel~1.2.3~2.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64dbus-1_3", rpm:"lib64dbus-1_3~1.2.3~2.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64dbus-1-devel", rpm:"lib64dbus-1-devel~1.2.3~2.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_257.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_257.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_257.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,97 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:257 (qemu)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65732);
+ script_cve_id("CVE-2008-0928");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:257 (qemu)");
+
+ desc = "
+The remote host is missing an update to qemu
+announced via advisory MDVSA-2009:257.
+
+Qemu 0.9.1 and earlier does not perform range checks for block
+device read or write requests, which allows guest host users with
+root privileges to access arbitrary memory and escape the virtual
+machine. (CVE-2008-0928)
+
+The updated packages have been patched to prevent this.
+
+Affected: 2009.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:257
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:257 (qemu)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dkms-kqemu", rpm:"dkms-kqemu~1.4.0~0.pre1.0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"qemu", rpm:"qemu~0.9.1~0.r5137.1.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"qemu-img", rpm:"qemu-img~0.9.1~0.r5137.1.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dkms-kqemu", rpm:"dkms-kqemu~1.4.0~0.pre1.0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"qemu", rpm:"qemu~0.9.1~0.r5137.1.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"qemu-img", rpm:"qemu-img~0.9.1~0.r5137.1.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_258.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_258.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_258.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,217 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:258 (openssl)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65734);
+ script_cve_id("CVE-2009-2409");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:258 (openssl)");
+
+ desc = "
+The remote host is missing an update to openssl
+announced via advisory MDVSA-2009:258.
+
+A regression was found with the self signed certificate signatures
+checking after applying the fix for CVE-2009-2409. An upstream patch
+has been applied to address this issue.
+
+Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
+          Enterprise Server 5.0, Multi Network Firewall 2.0
+
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:258
+http://marc.info/?l=openssl-cvs&m=124508133203041&w=2
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:258 (openssl)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libopenssl0.9.8", rpm:"libopenssl0.9.8~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-devel", rpm:"libopenssl0.9.8-devel~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-static-devel", rpm:"libopenssl0.9.8-static-devel~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8", rpm:"lib64openssl0.9.8~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-devel", rpm:"lib64openssl0.9.8-devel~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-static-devel", rpm:"lib64openssl0.9.8-static-devel~0.9.8g~4.6mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8", rpm:"libopenssl0.9.8~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-devel", rpm:"libopenssl0.9.8-devel~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-static-devel", rpm:"libopenssl0.9.8-static-devel~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8", rpm:"lib64openssl0.9.8~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-devel", rpm:"lib64openssl0.9.8-devel~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-static-devel", rpm:"lib64openssl0.9.8-static-devel~0.9.8h~3.5mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8", rpm:"libopenssl0.9.8~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-devel", rpm:"libopenssl0.9.8-devel~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-static-devel", rpm:"libopenssl0.9.8-static-devel~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8", rpm:"lib64openssl0.9.8~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-devel", rpm:"lib64openssl0.9.8-devel~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-static-devel", rpm:"lib64openssl0.9.8-static-devel~0.9.8k~1.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7", rpm:"libopenssl0.9.7~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7-devel", rpm:"libopenssl0.9.7-devel~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7-static-devel", rpm:"libopenssl0.9.7-static-devel~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.7", rpm:"lib64openssl0.9.7~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.7-devel", rpm:"lib64openssl0.9.7-devel~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.7-static-devel", rpm:"lib64openssl0.9.7-static-devel~0.9.7c~3.12.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7", rpm:"libopenssl0.9.7~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7-devel", rpm:"libopenssl0.9.7-devel~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7-static-devel", rpm:"libopenssl0.9.7-static-devel~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.7", rpm:"lib64openssl0.9.7~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.7-devel", rpm:"lib64openssl0.9.7-devel~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.7-static-devel", rpm:"lib64openssl0.9.7-static-devel~0.9.7g~2.11.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8", rpm:"libopenssl0.9.8~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-devel", rpm:"libopenssl0.9.8-devel~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.8-static-devel", rpm:"libopenssl0.9.8-static-devel~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8", rpm:"lib64openssl0.9.8~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-devel", rpm:"lib64openssl0.9.8-devel~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openssl0.9.8-static-devel", rpm:"lib64openssl0.9.8-static-devel~0.9.8h~3.5mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7", rpm:"libopenssl0.9.7~0.9.7c~3.12.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7-devel", rpm:"libopenssl0.9.7-devel~0.9.7c~3.12.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenssl0.9.7-static-devel", rpm:"libopenssl0.9.7-static-devel~0.9.7c~3.12.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.7c~3.12.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_259.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_259.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_259.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,112 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:259 (snort)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65735);
+ script_cve_id("CVE-2008-1804");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:259 (snort)");
+
+ desc = "
+The remote host is missing an update to snort
+announced via advisory MDVSA-2009:259.
+
+preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not
+properly identify packet fragments that have dissimilar TTL values,
+which allows remote attackers to bypass detection rules by using a
+different TTL for each fragment. (CVE-2008-1804)
+
+The updated packages have been patched to prevent this.
+
+Affected: 2008.1
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:259
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:259 (snort)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"snort", rpm:"snort~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-bloat", rpm:"snort-bloat~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-inline", rpm:"snort-inline~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-inline+flexresp", rpm:"snort-inline+flexresp~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-mysql", rpm:"snort-mysql~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-mysql+flexresp", rpm:"snort-mysql+flexresp~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-plain+flexresp", rpm:"snort-plain+flexresp~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-postgresql", rpm:"snort-postgresql~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-postgresql+flexresp", rpm:"snort-postgresql+flexresp~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-prelude", rpm:"snort-prelude~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"snort-prelude+flexresp", rpm:"snort-prelude+flexresp~2.8.0.1~0.3mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_260.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_260.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_260.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,229 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:260 (imagemagick)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65739);
+ script_cve_id("CVE-2009-1882");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:260 (imagemagick)");
+
+ desc = "
+The remote host is missing an update to imagemagick
+announced via advisory MDVSA-2009:260.
+
+A vulnerability has been found and corrected in ImageMagick,
+which could lead to integer overflow in the XMakeImage function in
+magick/xwindow.c, allowing remote attackers to cause a denial of
+service (crash) and possibly execute arbitrary code via a crafted
+TIFF file, which triggers a buffer overflow (CVE-2009-1882).
+
+This update fixes this vulnerability.
+
+Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
+          Enterprise Server 5.0
+
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:260
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:260 (imagemagick)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"imagemagick", rpm:"imagemagick~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-desktop", rpm:"imagemagick-desktop~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-doc", rpm:"imagemagick-doc~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick1", rpm:"libmagick1~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick-devel", rpm:"libmagick-devel~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Image-Magick", rpm:"perl-Image-Magick~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick1", rpm:"lib64magick1~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick-devel", rpm:"lib64magick-devel~6.3.8.9~1.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick", rpm:"imagemagick~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-desktop", rpm:"imagemagick-desktop~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-doc", rpm:"imagemagick-doc~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick1", rpm:"libmagick1~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick-devel", rpm:"libmagick-devel~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Image-Magick", rpm:"perl-Image-Magick~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick1", rpm:"lib64magick1~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick-devel", rpm:"lib64magick-devel~6.4.2.10~5.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick", rpm:"imagemagick~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-desktop", rpm:"imagemagick-desktop~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-doc", rpm:"imagemagick-doc~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick2", rpm:"libmagick2~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick-devel", rpm:"libmagick-devel~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Image-Magick", rpm:"perl-Image-Magick~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick2", rpm:"lib64magick2~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick-devel", rpm:"lib64magick-devel~6.5.0.2~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ImageMagick", rpm:"ImageMagick~5.5.7.15~6.13.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ImageMagick-doc", rpm:"ImageMagick-doc~5.5.7.15~6.13.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libMagick5.5.7", rpm:"libMagick5.5.7~5.5.7.15~6.13.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libMagick5.5.7-devel", rpm:"libMagick5.5.7-devel~5.5.7.15~6.13.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Magick", rpm:"perl-Magick~5.5.7.15~6.13.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ImageMagick", rpm:"ImageMagick~5.5.7.15~6.3.100mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ImageMagick-doc", rpm:"ImageMagick-doc~5.5.7.15~6.3.100mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64Magick5.5.7", rpm:"lib64Magick5.5.7~5.5.7.15~6.3.100mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64Magick5.5.7-devel", rpm:"lib64Magick5.5.7-devel~5.5.7.15~6.3.100mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Magick", rpm:"perl-Magick~5.5.7.15~6.3.100mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ImageMagick", rpm:"ImageMagick~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ImageMagick-doc", rpm:"ImageMagick-doc~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libMagick8.4.2", rpm:"libMagick8.4.2~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libMagick8.4.2-devel", rpm:"libMagick8.4.2-devel~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Image-Magick", rpm:"perl-Image-Magick~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64Magick8.4.2", rpm:"lib64Magick8.4.2~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64Magick8.4.2-devel", rpm:"lib64Magick8.4.2-devel~6.2.4.3~1.9.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick", rpm:"imagemagick~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-desktop", rpm:"imagemagick-desktop~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"imagemagick-doc", rpm:"imagemagick-doc~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick1", rpm:"libmagick1~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmagick-devel", rpm:"libmagick-devel~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Image-Magick", rpm:"perl-Image-Magick~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick1", rpm:"lib64magick1~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64magick-devel", rpm:"lib64magick-devel~6.4.2.10~5.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_261.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_261.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_261.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,161 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:261 (graphicsmagick)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65738);
+ script_cve_id("CVE-2009-1882");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:261 (graphicsmagick)");
+
+ desc = "
+The remote host is missing an update to graphicsmagick
+announced via advisory MDVSA-2009:261.
+
+A vulnerability has been found and corrected in GraphicsMagick,
+which could lead to integer overflow in the XMakeImage function in
+magick/xwindow.c, allowing remote attackers to cause a denial of
+service (crash) and possibly execute arbitrary code via a crafted
+TIFF file, which triggers a buffer overflow (CVE-2009-1882).
+
+This update fixes this vulnerability.
+
+Affected: 2009.0, 2009.1, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:261
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:261 (graphicsmagick)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"graphicsmagick", rpm:"graphicsmagick~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"graphicsmagick-doc", rpm:"graphicsmagick-doc~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagick2", rpm:"libgraphicsmagick2~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagick-devel", rpm:"libgraphicsmagick-devel~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagickwand1", rpm:"libgraphicsmagickwand1~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Graphics-Magick", rpm:"perl-Graphics-Magick~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagick2", rpm:"lib64graphicsmagick2~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagick-devel", rpm:"lib64graphicsmagick-devel~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagickwand1", rpm:"lib64graphicsmagickwand1~1.2.5~2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"graphicsmagick", rpm:"graphicsmagick~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"graphicsmagick-doc", rpm:"graphicsmagick-doc~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagick3", rpm:"libgraphicsmagick3~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagick-devel", rpm:"libgraphicsmagick-devel~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagickwand2", rpm:"libgraphicsmagickwand2~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Graphics-Magick", rpm:"perl-Graphics-Magick~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagick3", rpm:"lib64graphicsmagick3~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagick-devel", rpm:"lib64graphicsmagick-devel~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagickwand2", rpm:"lib64graphicsmagickwand2~1.3.5~3.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"graphicsmagick", rpm:"graphicsmagick~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"graphicsmagick-doc", rpm:"graphicsmagick-doc~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagick2", rpm:"libgraphicsmagick2~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagick-devel", rpm:"libgraphicsmagick-devel~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgraphicsmagickwand1", rpm:"libgraphicsmagickwand1~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Graphics-Magick", rpm:"perl-Graphics-Magick~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagick2", rpm:"lib64graphicsmagick2~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagick-devel", rpm:"lib64graphicsmagick-devel~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64graphicsmagickwand1", rpm:"lib64graphicsmagickwand1~1.2.5~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_262.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_262.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/mdksa_2009_262.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,165 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:262 (netpbm)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65740);
+ script_cve_id("CVE-2008-4799");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:262 (netpbm)");
+
+ desc = "
+The remote host is missing an update to netpbm
+announced via advisory MDVSA-2009:262.
+
+A vulnerability has been found and corrected in netpbm:
+
+pamperspective in Netpbm before 10.35.48 does not properly calculate
+a window height, which allows context-dependent attackers to cause a
+denial of service (crash) via a crafted image file that triggers an
+out-of-bounds read (CVE-2008-4799).
+
+This update fixes this vulnerability.
+
+Affected: 2008.1, 2009.0, Corporate 4.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:262
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:262 (netpbm)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libnetpbm10", rpm:"libnetpbm10~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm-devel", rpm:"libnetpbm-devel~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm-static-devel", rpm:"libnetpbm-static-devel~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"netpbm", rpm:"netpbm~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm10", rpm:"lib64netpbm10~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm-devel", rpm:"lib64netpbm-devel~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm-static-devel", rpm:"lib64netpbm-static-devel~10.34~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm10", rpm:"libnetpbm10~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm-devel", rpm:"libnetpbm-devel~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm-static-devel", rpm:"libnetpbm-static-devel~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"netpbm", rpm:"netpbm~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm10", rpm:"lib64netpbm10~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm-devel", rpm:"lib64netpbm-devel~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm-static-devel", rpm:"lib64netpbm-static-devel~10.35.46~1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm10", rpm:"libnetpbm10~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm10-devel", rpm:"libnetpbm10-devel~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm10-static-devel", rpm:"libnetpbm10-static-devel~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"netpbm", rpm:"netpbm~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm10", rpm:"lib64netpbm10~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm10-devel", rpm:"lib64netpbm10-devel~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm10-static-devel", rpm:"lib64netpbm10-static-devel~10.29~1.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm10", rpm:"libnetpbm10~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm-devel", rpm:"libnetpbm-devel~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetpbm-static-devel", rpm:"libnetpbm-static-devel~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"netpbm", rpm:"netpbm~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm10", rpm:"lib64netpbm10~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm-devel", rpm:"lib64netpbm-devel~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netpbm-static-devel", rpm:"lib64netpbm-static-devel~10.35.46~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1471.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,74 @@
+#CESA-2009:1471 65754 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1471 (elinks)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65754);
+ script_cve_id("CVE-2007-2027", "CVE-2008-7224");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1471 (elinks)");
+
+ desc = "
+The remote host is missing updates to elinks announced in
+advisory CESA-2009:1471.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1471
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1471
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1471 (elinks)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"elinks", rpm:"elinks~0.9.2~4.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1484.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,107 @@
+#CESA-2009:1484 65757 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1484 (postgresql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65757);
+ script_cve_id("CVE-2009-0922", "CVE-2009-3230", "CVE-2007-6600");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1484 (postgresql)");
+
+ desc = "
+The remote host is missing updates to postgresql announced in
+advisory CESA-2009:1484.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1484
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1484
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1484 (postgresql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-debuginfo", rpm:"postgresql-debuginfo~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-jdbc", rpm:"postgresql-jdbc~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-python", rpm:"postgresql-python~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-tcl", rpm:"postgresql-tcl~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-test", rpm:"postgresql-test~7.4.26~1.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1485.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1485.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1485.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,105 @@
+#CESA-2009:1485 65755 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1485 (postgresql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65755);
+ script_cve_id("CVE-2009-3230", "CVE-2007-6600");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1485 (postgresql)");
+
+ desc = "
+The remote host is missing updates to postgresql announced in
+advisory CESA-2009:1485.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1485
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1485
+https://rhn.redhat.com/errata/RHSA-2009-1485.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1485 (postgresql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rh-postgresql", rpm:"rh-postgresql~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-contrib", rpm:"rh-postgresql-contrib~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-devel", rpm:"rh-postgresql-devel~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-docs", rpm:"rh-postgresql-docs~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-jdbc", rpm:"rh-postgresql-jdbc~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-libs", rpm:"rh-postgresql-libs~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-pl", rpm:"rh-postgresql-pl~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-python", rpm:"rh-postgresql-python~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-server", rpm:"rh-postgresql-server~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-tcl", rpm:"rh-postgresql-tcl~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rh-postgresql-test", rpm:"rh-postgresql-test~7.3.21~2", rls:"CentOS3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1490.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1490.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1490.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,78 @@
+#CESA-2009:1490 65756 4
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1490 (squirrelmail)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65756);
+ script_cve_id("CVE-2009-2964");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1490 (squirrelmail)");
+
+ desc = "
+The remote host is missing updates to squirrelmail announced in
+advisory CESA-2009:1490.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1490
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1490
+https://rhn.redhat.com/errata/RHSA-2009-1490.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1490 (squirrelmail)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"squirrelmail", rpm:"squirrelmail~1.4.8~16.el3.centos.1", rls:"CentOS3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"squirrelmail", rpm:"squirrelmail~1.4.8~5.el4_8.8", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-5890
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65780);
+ script_cve_id("CVE-2008-5513", "CVE-2008-5512", "CVE-2008-5511", "CVE-2008-5510", "CVE-2008-5508", "CVE-2008-5507", "CVE-2008-5506", "CVE-2008-5504", "CVE-2008-5503", "CVE-2008-5500");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-5826
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65781);
+ script_cve_id("CVE-2008-0017", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5015", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5019", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024", "CVE-2008-5052");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.18~0.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.18~0.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-5450
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65788);
+ script_cve_id("CVE-2008-2785", "CVE-2008-2933");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.16~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.16~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-MozillaFirefox-6433
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Mozilla Firefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65792);
+ script_cve_id("CVE-2009-2654", "CVE-2009-2662", "CVE-2009-2663", "CVE-2009-2664");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Mozilla Firefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-branding-SLED
+    MozillaFirefox-translations
+    firefox3-atk
+    firefox3-cairo
+    firefox3-glib2
+    firefox3-gtk2
+    firefox3-pango
+    mozilla-xulrunner190
+    mozilla-xulrunner190-gnomevfs
+    mozilla-xulrunner190-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Mozilla Firefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.0.13~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-branding-SLED", rpm:"MozillaFirefox-branding-SLED~3.0.3~7.4.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.0.13~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox3-atk", rpm:"firefox3-atk~1.12.3~0.4.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox3-cairo", rpm:"firefox3-cairo~1.2.4~0.4.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox3-glib2", rpm:"firefox3-glib2~2.12.4~0.4.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox3-gtk2", rpm:"firefox3-gtk2~2.10.6~0.4.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"firefox3-pango", rpm:"firefox3-pango~1.14.5~0.4.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.13~1.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.13~1.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.13~1.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-6187
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65840);
+ script_cve_id("CVE-2009-0352", "CVE-2009-0353", "CVE-2009-0772", "CVE-2009-0774", "CVE-2009-0776", "CVE-2009-0040", "CVE-2009-1169");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.21post~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.21post~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox4.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-5644
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65849);
+ script_cve_id("CVE-2008-4069", "CVE-2008-4067", "CVE-2008-4068", "CVE-2008-4065", "CVE-2008-4066", "CVE-2008-4061", "CVE-2008-4062", "CVE-2008-4063", "CVE-2008-4064", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-3837", "CVE-2008-3836", "CVE-2008-3835", "CVE-2008-0016");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-5405
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65885);
+ script_cve_id("CVE-2008-2798", "CVE-2008-2799", "CVE-2008-2800", "CVE-2008-2801", "CVE-2008-2802", "CVE-2008-2803", "CVE-2008-2805", "CVE-2008-2806", "CVE-2008-2807", "CVE-2008-2808", "CVE-2008-2809", "CVE-2008-2810", "CVE-2008-2811");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.15~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.15~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_MozillaFirefox6.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-MozillaFirefox-5786
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MozillaFirefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65927);
+ script_cve_id("CVE-2008-0017", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5015", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5019", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024", "CVE-2008-5052");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MozillaFirefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MozillaFirefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~2.0.0.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~2.0.0.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_NetworkManager-.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-NetworkManager-kde-6026
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for knetworkmanager
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65774);
+ script_cve_id("CVE-2009-0365");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for knetworkmanager");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    NetworkManager-kde
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for knetworkmanager");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"NetworkManager-kde", rpm:"NetworkManager-kde~0.1r588481~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_NetworkManager-0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-NetworkManager-gnome-6028
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for NetworkManager-gnome
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65847);
+ script_cve_id("CVE-2009-0365", "CVE-2009-0578");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for NetworkManager-gnome");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    NetworkManager-gnome
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for NetworkManager-gnome");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"NetworkManager-gnome", rpm:"NetworkManager-gnome~0.6.6~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_NetworkManager.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-NetworkManager-6027
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for NetworkManager
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65828);
+ script_cve_id("CVE-2009-0365", "CVE-2009-0578");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for NetworkManager");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    NetworkManager
+    NetworkManager-devel
+    NetworkManager-glib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for NetworkManager");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"NetworkManager", rpm:"NetworkManager~0.6.6~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"NetworkManager-devel", rpm:"NetworkManager-devel~0.6.6~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"NetworkManager-glib", rpm:"NetworkManager-glib~0.6.6~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_OpenEXR.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_OpenEXR.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_OpenEXR.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-OpenEXR-6392
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenEXR
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65946);
+ script_cve_id("CVE-2009-1720", "CVE-2009-1721");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenEXR");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    OpenEXR
+    OpenEXR-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenEXR");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"OpenEXR", rpm:"OpenEXR~1.2.2~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"OpenEXR-devel", rpm:"OpenEXR-devel~1.2.2~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_php.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,271 @@
+#
+#VID slesp2-apache2-mod_php5-6069
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65786);
+ script_cve_id("CVE-2008-5498", "CVE-2009-0754");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-devel
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-iconv
+    php5-imap
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mhash
+    php5-mysql
+    php5-ncurses
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-posix
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-sockets
+    php5-sqlite
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xsl
+    php5-zlib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.5~9.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,271 @@
+#
+#VID slesp2-apache2-mod_php5-5909
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65803);
+ script_cve_id("CVE-2008-5658", "CVE-2008-5557");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-devel
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-iconv
+    php5-imap
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mhash
+    php5-mysql
+    php5-ncurses
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-posix
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-sockets
+    php5-sqlite
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xsl
+    php5-zlib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.5~9.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_php1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,271 @@
+#
+#VID slesp2-apache2-mod_php5-5580
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65913);
+ script_cve_id("CVE-2008-3658", "CVE-2008-3659", "CVE-2008-3660");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-devel
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-iconv
+    php5-imap
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mhash
+    php5-mysql
+    php5-ncurses
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-posix
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-sockets
+    php5-sqlite
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xsl
+    php5-zlib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.5~9.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_php2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,271 @@
+#
+#VID slesp2-apache2-mod_php5-5345
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65922);
+ script_cve_id("CVE-2008-0599");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-devel
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-iconv
+    php5-imap
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mhash
+    php5-mysql
+    php5-ncurses
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-posix
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-sockets
+    php5-sqlite
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xsl
+    php5-zlib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.5~9.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_php3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,271 @@
+#
+#VID slesp2-apache2-mod_php5-6311
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65928);
+ script_cve_id("CVE-2009-1271", "CVE-2009-1272");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-devel
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-iconv
+    php5-imap
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mhash
+    php5-mysql
+    php5-ncurses
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-posix
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-sockets
+    php5-sqlite
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xsl
+    php5-zlib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.5~9.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_pyt.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_pyt.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_pyt.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-apache2-mod_python-4449
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for apache2-mod_python
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65998);
+ script_cve_id("CVE-2004-2680");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for apache2-mod_python");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_python
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for apache2-mod_python");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_python", rpm:"apache2-mod_python~3.1.3~60.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-apache2-6035
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Apache 2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65888);
+ script_cve_id("CVE-2008-2364");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Apache 2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2
+    apache2-devel
+    apache2-doc
+    apache2-example-pages
+    apache2-prefork
+    apache2-worker
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Apache 2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.3~16.21", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.3~16.21", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.3~16.21", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.3~16.21", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.3~16.21", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.3~16.21", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache20.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_apache20.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-apache2-5629
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Apache 2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65893);
+ script_cve_id("CVE-2008-2939", "CVE-2007-6420");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Apache 2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2
+    apache2-devel
+    apache2-doc
+    apache2-example-pages
+    apache2-prefork
+    apache2-worker
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Apache 2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.3~16.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.3~16.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.3~16.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.3~16.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.3~16.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.3~16.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_audiofile.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_audiofile.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_audiofile.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-audiofile-5948
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for audiofile
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65859);
+ script_cve_id("CVE-2008-5824");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for audiofile");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    audiofile
+    audiofile-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for audiofile");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"audiofile", rpm:"audiofile~0.2.6~17.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"audiofile-devel", rpm:"audiofile-devel~0.2.6~17.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_bind.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_bind.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_bind.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-bind-5905
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for bind
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65805);
+ script_cve_id("CVE-2009-0025");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for bind");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    bind
+    bind-chrootenv
+    bind-devel
+    bind-doc
+    bind-libs
+    bind-utils
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for bind");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bind", rpm:"bind~9.3.4~1.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-chrootenv", rpm:"bind-chrootenv~9.3.4~1.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.3.4~1.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.3.4~1.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-libs", rpm:"bind-libs~9.3.4~1.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.3.4~1.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_bind0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_bind0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_bind0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-bind-5409
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for bind
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65809);
+ script_cve_id("CVE-2008-1447");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for bind");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    bind
+    bind-chrootenv
+    bind-devel
+    bind-doc
+    bind-libs
+    bind-utils
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for bind");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bind", rpm:"bind~9.3.4~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-chrootenv", rpm:"bind-chrootenv~9.3.4~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.3.4~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.3.4~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-libs", rpm:"bind-libs~9.3.4~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.3.4~1.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_bind1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_bind1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_bind1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-bind-6382
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for bind
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65929);
+ script_cve_id("CVE-2009-0696");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for bind");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    bind
+    bind-chrootenv
+    bind-devel
+    bind-doc
+    bind-libs
+    bind-utils
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for bind");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bind", rpm:"bind~9.3.4~1.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-chrootenv", rpm:"bind-chrootenv~9.3.4~1.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.3.4~1.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.3.4~1.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-libs", rpm:"bind-libs~9.3.4~1.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.3.4~1.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_boost.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_boost.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_boost.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp1-boost-4978
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for boost
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65973);
+ script_cve_id("CVE-2008-0171", "CVE-2008-0172");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for boost");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    boost
+    boost-devel
+    boost-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for boost");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"boost", rpm:"boost~1.33.1~17.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"boost-devel", rpm:"boost-devel~1.33.1~17.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"boost-doc", rpm:"boost-doc~1.33.1~17.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_bytefx-data-mys.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_bytefx-data-mys.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_bytefx-data-mys.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,117 @@
+#
+#VID slesp2-bytefx-data-mysql-6353
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Mono
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65784);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Mono");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mono-core
+    mono-data
+    mono-data-firebird
+    mono-data-oracle
+    mono-data-postgresql
+    mono-data-sqlite
+    mono-data-sybase
+    mono-locale-extras
+    mono-nunit
+    mono-web
+    mono-winforms
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Mono");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mono-core", rpm:"mono-core~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data", rpm:"mono-data~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-firebird", rpm:"mono-data-firebird~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-oracle", rpm:"mono-data-oracle~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-postgresql", rpm:"mono-data-postgresql~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sqlite", rpm:"mono-data-sqlite~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sybase", rpm:"mono-data-sybase~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-locale-extras", rpm:"mono-locale-extras~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-nunit", rpm:"mono-nunit~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-web", rpm:"mono-web~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-winforms", rpm:"mono-winforms~1.2.2~12.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_bytefx-data-mys0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_bytefx-data-mys0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_bytefx-data-mys0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-bytefx-data-mysql-5560
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Mono
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65935);
+ script_cve_id("CVE-2008-3422");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Mono");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mono-core
+    mono-data
+    mono-data-firebird
+    mono-data-oracle
+    mono-data-postgresql
+    mono-data-sqlite
+    mono-data-sybase
+    mono-locale-extras
+    mono-nunit
+    mono-web
+    mono-winforms
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Mono");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mono-core", rpm:"mono-core~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data", rpm:"mono-data~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-firebird", rpm:"mono-data-firebird~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-oracle", rpm:"mono-data-oracle~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-postgresql", rpm:"mono-data-postgresql~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sqlite", rpm:"mono-data-sqlite~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sybase", rpm:"mono-data-sybase~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-locale-extras", rpm:"mono-locale-extras~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-nunit", rpm:"mono-nunit~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-web", rpm:"mono-web~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-winforms", rpm:"mono-winforms~1.2.2~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_bzip2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_bzip2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_bzip2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-bzip2-5295
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65944);
+ script_cve_id("CVE-2008-1372");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    bzip2
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"bzip2", rpm:"bzip2~1.0.3~17.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cairo.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cairo.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cairo.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,85 @@
+#
+#VID slesp1-cairo-5006
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for cairo
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66006);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for cairo");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cairo
+    cairo-devel
+    cairo-doc
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for cairo");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cairo", rpm:"cairo~1.0.2~27.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cairo-devel", rpm:"cairo-devel~1.0.2~27.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cairo-doc", rpm:"cairo-doc~1.0.2~27.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cifs-mount.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-cifs-mount-5819
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Samba
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65815);
+ script_cve_id("CVE-2008-4314");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Samba");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cifs-mount
+    libmsrpc
+    libmsrpc-devel
+    libsmbclient
+    libsmbclient-devel
+    samba
+    samba-client
+    samba-krb-printing
+    samba-python
+    samba-vscan
+    samba-winbind
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Samba");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc", rpm:"libmsrpc~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc-devel", rpm:"libmsrpc-devel~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-python", rpm:"samba-python~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan", rpm:"samba-vscan~0.3.6b~42.79", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.32~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cifs-mount0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cifs-mount0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cifs-mount0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,127 @@
+#
+#VID slesp2-cifs-mount-5292
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Samba
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65923);
+ script_cve_id("CVE-2008-1105");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Samba");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cifs-mount
+    libmsrpc
+    libmsrpc-devel
+    libsmbclient
+    libsmbclient-devel
+    samba
+    samba-client
+    samba-doc
+    samba-krb-printing
+    samba-pdb
+    samba-python
+    samba-vscan
+    samba-winbind
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Samba");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc", rpm:"libmsrpc~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc-devel", rpm:"libmsrpc-devel~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.0.28~0.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-pdb", rpm:"samba-pdb~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-python", rpm:"samba-python~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan", rpm:"samba-vscan~0.3.6b~42.72", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.28~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cifs-mount1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cifs-mount1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cifs-mount1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-cifs-mount-6343
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Samba
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65945);
+ script_cve_id("CVE-2009-1886", "CVE-2009-1888");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Samba");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cifs-mount
+    libmsrpc
+    libmsrpc-devel
+    libsmbclient
+    libsmbclient-devel
+    samba
+    samba-client
+    samba-krb-printing
+    samba-python
+    samba-vscan
+    samba-winbind
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Samba");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc", rpm:"libmsrpc~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc-devel", rpm:"libmsrpc-devel~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-python", rpm:"samba-python~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan", rpm:"samba-vscan~0.3.6b~42.85.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.32~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-clamav-5579
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for clamav
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65798);
+ script_cve_id("CVE-2008-3912", "CVE-2008-1389", "CVE-2008-3913", "CVE-2008-3914");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for clamav");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for clamav");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.94~0.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-clamav-5359
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for clamav
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65841);
+ script_cve_id("CVE-2008-2713");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for clamav");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for clamav");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.93.1~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-clamav-6144
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ClamAV
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65852);
+ script_cve_id("CVE-2009-1241");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ClamAV");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ClamAV");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.95~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-clamav-5416
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for clamav
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65853);
+ script_cve_id("CVE-2008-2713");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for clamav");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for clamav");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.93.3~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp2-clamav-6188
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ClamAV
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65889);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ClamAV");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ClamAV");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.95.1~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav4.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav4.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp2-clamav-6308
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ClamAV
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65891);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ClamAV");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ClamAV");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.95.2~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-clamav-5842
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ClamAV
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65902);
+ script_cve_id("CVE-2008-5314");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ClamAV");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ClamAV");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.94.2~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_clamav6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_clamav6.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_clamav6.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-clamav-5769
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for clamav
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65949);
+ script_cve_id("CVE-2008-5050");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for clamav");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    clamav
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for clamav");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.94.1~2.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_compat-curl2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_compat-curl2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_compat-curl2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-compat-curl2-6408
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for compat-curl2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65892);
+ script_cve_id("CVE-2009-2417", "CVE-2009-0037");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for compat-curl2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    compat-curl2
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for compat-curl2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"compat-curl2", rpm:"compat-curl2~7.11.0~20.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_compat-openssl0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_compat-openssl0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_compat-openssl0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-compat-openssl097g-6170
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for compat-openssl097g
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65897);
+ script_cve_id("CVE-2009-0590", "CVE-2009-0789");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for compat-openssl097g");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    compat-openssl097g
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for compat-openssl097g");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"compat-openssl097g", rpm:"compat-openssl097g~0.9.7g~13.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_compat-openssl00.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_compat-openssl00.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_compat-openssl00.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-compat-openssl097g-5957
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for compat-openssl097g
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65926);
+ script_cve_id("CVE-2008-5077");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for compat-openssl097g");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    compat-openssl097g
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for compat-openssl097g");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"compat-openssl097g", rpm:"compat-openssl097g~0.9.7g~13.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_compat-openssl01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_compat-openssl01.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_compat-openssl01.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-compat-openssl097g-5055
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for compat-openssl097g
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65974);
+ script_cve_id("CVE-2007-5135");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for compat-openssl097g");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    compat-openssl097g
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for compat-openssl097g");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"compat-openssl097g", rpm:"compat-openssl097g~0.9.7g~13.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cups.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cups.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-cups-5845
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Cups
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65765);
+ script_cve_id("CVE-2008-3641", "CVE-2008-5286");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Cups");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cups
+    cups-client
+    cups-devel
+    cups-libs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Cups");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.23~40.49", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-client", rpm:"cups-client~1.1.23~40.49", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.1.23~40.49", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.1.23~40.49", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cups0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cups0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-cups-6174
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for CUPS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65769);
+ script_cve_id("CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for CUPS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cups
+    cups-client
+    cups-devel
+    cups-libs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for CUPS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.23~40.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-client", rpm:"cups-client~1.1.23~40.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.1.23~40.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.1.23~40.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cups1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cups1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-cups-5296
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for CUPS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65811);
+ script_cve_id("CVE-2008-1693");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for CUPS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cups
+    cups-client
+    cups-devel
+    cups-libs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for CUPS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.23~40.44", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-client", rpm:"cups-client~1.1.23~40.44", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.1.23~40.44", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.1.23~40.44", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cups2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cups2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-cups-6279
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for CUPS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65880);
+ script_cve_id("CVE-2009-0791", "CVE-2009-0949");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for CUPS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cups
+    cups-client
+    cups-devel
+    cups-libs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for CUPS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.23~40.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-client", rpm:"cups-client~1.1.23~40.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.1.23~40.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.1.23~40.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cups3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cups3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-cups-5653
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for CUPS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65939);
+ script_cve_id("CVE-2008-3639", "CVE-2008-3640", "CVE-2008-3641");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for CUPS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cups
+    cups-client
+    cups-devel
+    cups-libs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for CUPS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.23~40.46", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-client", rpm:"cups-client~1.1.23~40.46", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.1.23~40.46", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.1.23~40.46", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cups4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cups4.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cups4.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp1-cups-5115
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for CUPS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65986);
+ script_cve_id("CVE-2008-1373", "CVE-2008-0053");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for CUPS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cups
+    cups-client
+    cups-devel
+    cups-libs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for CUPS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.23~40.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-client", rpm:"cups-client~1.1.23~40.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.1.23~40.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.1.23~40.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_curl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_curl.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_curl.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-curl-6015
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for curl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65861);
+ script_cve_id("CVE-2009-0037");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for curl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    curl
+    curl-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for curl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"curl", rpm:"curl~7.15.1~19.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"curl-devel", rpm:"curl-devel~7.15.1~19.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_curl0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_curl0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_curl0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-curl-6402
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for curl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65903);
+ script_cve_id("CVE-2009-2417");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for curl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    curl
+    curl-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for curl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"curl", rpm:"curl~7.15.1~19.14.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"curl-devel", rpm:"curl-devel~7.15.1~19.14.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cyrus-imapd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cyrus-imapd.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cyrus-imapd.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,89 @@
+#
+#VID slesp2-cyrus-imapd-6476
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Cyrus IMAPD
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65938);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Cyrus IMAPD");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cyrus-imapd
+    cyrus-imapd-devel
+    perl-Cyrus-IMAP
+    perl-Cyrus-SIEVE-managesieve
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Cyrus IMAPD");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cyrus-imapd", rpm:"cyrus-imapd~2.2.12~27.13.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-imapd-devel", rpm:"cyrus-imapd-devel~2.2.12~27.13.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Cyrus-IMAP", rpm:"perl-Cyrus-IMAP~2.2.12~27.13.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-Cyrus-SIEVE-managesieve", rpm:"perl-Cyrus-SIEVE-managesieve~2.2.12~27.13.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cyrus-sasl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cyrus-sasl.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_cyrus-sasl.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,107 @@
+#
+#VID slesp2-cyrus-sasl-6250
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for cyrus-sasl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65826);
+ script_cve_id("CVE-2009-0688");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for cyrus-sasl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cyrus-sasl
+    cyrus-sasl-crammd5
+    cyrus-sasl-devel
+    cyrus-sasl-digestmd5
+    cyrus-sasl-gssapi
+    cyrus-sasl-otp
+    cyrus-sasl-plain
+    cyrus-sasl-sqlauxprop
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for cyrus-sasl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cyrus-sasl", rpm:"cyrus-sasl~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-crammd5", rpm:"cyrus-sasl-crammd5~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-devel", rpm:"cyrus-sasl-devel~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-digestmd5", rpm:"cyrus-sasl-digestmd5~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-gssapi", rpm:"cyrus-sasl-gssapi~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-otp", rpm:"cyrus-sasl-otp~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-plain", rpm:"cyrus-sasl-plain~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cyrus-sasl-sqlauxprop", rpm:"cyrus-sasl-sqlauxprop~2.1.21~18.10.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_dbus-1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dbus-1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_dbus-1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,115 @@
+#
+#VID slesp2-dbus-1-5969
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for dbus
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65759);
+ script_cve_id("CVE-2008-4311");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for dbus");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    dbus-1
+    dbus-1-devel
+    dbus-1-glib
+    dbus-1-gtk
+    dbus-1-java
+    dbus-1-mono
+    dbus-1-python
+    dbus-1-qt3
+    dbus-1-qt3-devel
+    dbus-1-x11
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for dbus");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dbus-1", rpm:"dbus-1~0.60~33.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-devel", rpm:"dbus-1-devel~0.60~33.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-glib", rpm:"dbus-1-glib~0.60~33.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-gtk", rpm:"dbus-1-gtk~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-java", rpm:"dbus-1-java~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-mono", rpm:"dbus-1-mono~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-python", rpm:"dbus-1-python~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-qt3", rpm:"dbus-1-qt3~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-qt3-devel", rpm:"dbus-1-qt3-devel~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-x11", rpm:"dbus-1-x11~0.60~33.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_dbus-10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dbus-10.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_dbus-10.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-dbus-1-5701
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for dbus
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65851);
+ script_cve_id("CVE-2008-3834");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for dbus");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    dbus-1
+    dbus-1-devel
+    dbus-1-glib
+    dbus-1-gtk
+    dbus-1-java
+    dbus-1-mono
+    dbus-1-python
+    dbus-1-qt
+    dbus-1-qt3
+    dbus-1-qt3-devel
+    dbus-1-x11
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for dbus");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dbus-1", rpm:"dbus-1~0.60~33.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-devel", rpm:"dbus-1-devel~0.60~33.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-glib", rpm:"dbus-1-glib~0.60~33.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-gtk", rpm:"dbus-1-gtk~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-java", rpm:"dbus-1-java~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-mono", rpm:"dbus-1-mono~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-python", rpm:"dbus-1-python~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-qt", rpm:"dbus-1-qt~4.3.4~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-qt3", rpm:"dbus-1-qt3~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-qt3-devel", rpm:"dbus-1-qt3-devel~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dbus-1-x11", rpm:"dbus-1-x11~0.60~33.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_dhcp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dhcp.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_dhcp.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-dhcp-6335
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for dhclient
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65772);
+ script_cve_id("CVE-2009-0692");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for dhclient");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    dhcp
+    dhcp-client
+    dhcp-devel
+    dhcp-relay
+    dhcp-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for dhclient");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dhcp", rpm:"dhcp~3.0.3~23.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-client", rpm:"dhcp-client~3.0.3~23.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-devel", rpm:"dhcp-devel~3.0.3~23.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-relay", rpm:"dhcp-relay~3.0.3~23.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-server", rpm:"dhcp-server~3.0.3~23.55", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_dhcp0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_dhcp0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_dhcp0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-dhcp-5975
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for DHCP
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65863);
+ script_cve_id("CVE-2007-0062");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for DHCP");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    dhcp
+    dhcp-client
+    dhcp-devel
+    dhcp-relay
+    dhcp-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for DHCP");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dhcp", rpm:"dhcp~3.0.3~23.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-client", rpm:"dhcp-client~3.0.3~23.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-devel", rpm:"dhcp-devel~3.0.3~23.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-relay", rpm:"dhcp-relay~3.0.3~23.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dhcp-server", rpm:"dhcp-server~3.0.3~23.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_emacs.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_emacs.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_emacs.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-emacs-5297
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Emacs
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65845);
+ script_cve_id("CVE-2008-2142");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Emacs");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    emacs
+    emacs-el
+    emacs-info
+    emacs-nox
+    emacs-x11
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Emacs");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"emacs", rpm:"emacs~21.3~224.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-el", rpm:"emacs-el~21.3~224.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-info", rpm:"emacs-info~21.3~224.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-nox", rpm:"emacs-nox~21.3~224.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-x11", rpm:"emacs-x11~21.3~224.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_emacs0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_emacs0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_emacs0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,93 @@
+#
+#VID slesp1-emacs-4733
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Emacs
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65977);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Emacs");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    emacs
+    emacs-el
+    emacs-info
+    emacs-nox
+    emacs-x11
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Emacs");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"emacs", rpm:"emacs~21.3~224.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-el", rpm:"emacs-el~21.3~224.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-info", rpm:"emacs-info~21.3~224.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-nox", rpm:"emacs-nox~21.3~224.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"emacs-x11", rpm:"emacs-x11~21.3~224.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_enscript.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_enscript.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_enscript.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-enscript-5715
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for enscript
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65869);
+ script_cve_id("CVE-2008-3863");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for enscript");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    enscript
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for enscript");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"enscript", rpm:"enscript~1.6.4~19.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_epiphany.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_epiphany.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_epiphany.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-epiphany-5889
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Epiphany
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65808);
+ script_cve_id("CVE-2008-5512", "CVE-2008-5511", "CVE-2008-5510", "CVE-2008-5508", "CVE-2008-5507", "CVE-2008-5506", "CVE-2008-5503", "CVE-2008-5500");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Epiphany");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mozilla-xulrunner
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Epiphany");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-xulrunner", rpm:"mozilla-xulrunner~1.8.0.14eol~0.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ethereal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ethereal.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-ethereal-6269
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ethereal
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65762);
+ script_cve_id("CVE-2009-1269", "CVE-2009-1268", "CVE-2009-1267", "CVE-2009-1210", "CVE-2009-1266");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ethereal");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ethereal
+    ethereal-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ethereal");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ethereal", rpm:"ethereal~0.10.14~16.35", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ethereal-devel", rpm:"ethereal-devel~0.10.14~16.35", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ethereal0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ethereal0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-ethereal-5520
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ethereal
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65787);
+ script_cve_id("CVE-2008-3137", "CVE-2008-3138", "CVE-2008-3139", "CVE-2008-3140", "CVE-2008-3141", "CVE-2008-3145", "CVE-2008-3146");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ethereal");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ethereal
+    ethereal-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ethereal");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ethereal", rpm:"ethereal~0.10.14~16.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ethereal-devel", rpm:"ethereal-devel~0.10.14~16.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ethereal1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ethereal1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-ethereal-6443
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ethereal
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65795);
+ script_cve_id("CVE-2009-2562");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ethereal");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ethereal
+    ethereal-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ethereal");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ethereal", rpm:"ethereal~0.10.14~16.37", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ethereal-devel", rpm:"ethereal-devel~0.10.14~16.37", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ethereal2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ethereal2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-ethereal-5866
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ethereal
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65918);
+ script_cve_id("CVE-2008-3933", "CVE-2008-4685");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ethereal");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ethereal
+    ethereal-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ethereal");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ethereal", rpm:"ethereal~0.10.14~16.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ethereal-devel", rpm:"ethereal-devel~0.10.14~16.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ethereal3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ethereal3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ethereal3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,81 @@
+#
+#VID slesp1-ethereal-5058
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ethereal
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65991);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ethereal");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ethereal
+    ethereal-devel
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ethereal");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ethereal", rpm:"ethereal~0.10.14~16.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ethereal-devel", rpm:"ethereal-devel~0.10.14~16.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_evolution-data-.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_evolution-data-.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_evolution-data-.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-evolution-data-server-6166
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for evolution-data-server
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65872);
+ script_cve_id("CVE-2009-0582");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for evolution-data-server");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    evolution-data-server
+    evolution-data-server-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for evolution-data-server");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"evolution-data-server", rpm:"evolution-data-server~1.6.0~43.87", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"evolution-data-server-devel", rpm:"evolution-data-server-devel~1.6.0~43.87", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_festival.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_festival.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_festival.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-festival-4378
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for festival
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65975);
+ script_cve_id("CVE-2007-4074");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for festival");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    festival
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for festival");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"festival", rpm:"festival~1.95~25.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_fetchmail.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_fetchmail.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_fetchmail.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-fetchmail-6409
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for fetchmail
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65936);
+ script_cve_id("CVE-2009-2666");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for fetchmail");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    fetchmail
+    fetchmailconf
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for fetchmail");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"fetchmail", rpm:"fetchmail~6.3.2~15.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"fetchmailconf", rpm:"fetchmailconf~6.3.2~15.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_fetchmail0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_fetchmail0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_fetchmail0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-fetchmail-4462
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for fetchmail
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65992);
+ script_cve_id("CVE-2007-4565");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for fetchmail");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    fetchmail
+    fetchmailconf
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for fetchmail");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"fetchmail", rpm:"fetchmail~6.3.2~15.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"fetchmailconf", rpm:"fetchmailconf~6.3.2~15.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_file.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_file.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_file.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-file-3755
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for file
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65969);
+ script_cve_id("CVE-2007-2799");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for file");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    file
+    file-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for file");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"file", rpm:"file~4.16~15.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"file-devel", rpm:"file-devel~4.16~15.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_findutils-locat.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_findutils-locat.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_findutils-locat.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp1-findutils-locate-3966
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for findutils-locate
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65984);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for findutils-locate");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    findutils-locate
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for findutils-locate");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"findutils-locate", rpm:"findutils-locate~4.2.27~14.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_flac.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_flac.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_flac.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-flac-4569
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for flac
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66008);
+ script_cve_id("CVE-2007-4619");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for flac");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    flac
+    flac-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for flac");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"flac", rpm:"flac~1.1.2~15.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"flac-devel", rpm:"flac-devel~1.1.2~15.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_freeradius.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_freeradius.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_freeradius.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-freeradius-6499
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for freeradius
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65821);
+ script_cve_id("CVE-2009-3111");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for freeradius");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    freeradius
+    freeradius-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for freeradius");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"freeradius", rpm:"freeradius~1.1.0~19.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freeradius-devel", rpm:"freeradius-devel~1.1.0~19.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_freetype2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_freetype2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_freetype2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-freetype2-6181
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for freetype2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65770);
+ script_cve_id("CVE-2009-0946");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for freetype2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    freetype2
+    freetype2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for freetype2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"freetype2", rpm:"freetype2~2.1.10~18.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freetype2-devel", rpm:"freetype2-devel~2.1.10~18.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_freetype20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_freetype20.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_freetype20.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,81 @@
+#
+#VID slesp2-freetype2-5361
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for freetype2,
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65875);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for freetype2,");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    freetype2
+    freetype2-devel
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for freetype2,");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"freetype2", rpm:"freetype2~2.1.10~18.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freetype2-devel", rpm:"freetype2-devel~2.1.10~18.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_freetype21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_freetype21.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_freetype21.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-freetype2-3746
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for freetype2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66004);
+ script_cve_id("CVE-2007-2754");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for freetype2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    freetype2
+    freetype2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for freetype2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"freetype2", rpm:"freetype2~2.1.10~18.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freetype2-devel", rpm:"freetype2-devel~2.1.10~18.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gd.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gd.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-gd-3895
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for gd
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65994);
+ script_cve_id("CVE-2007-3472", "CVE-2007-3475", "CVE-2007-3476", "CVE-2007-3477", "CVE-2007-3478");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for gd");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gd
+    gd-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for gd");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gd", rpm:"gd~2.0.32~23.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-devel", rpm:"gd-devel~2.0.32~23.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gecko-sdk.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-gecko-sdk-5654
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Mozilla
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65789);
+ script_cve_id("CVE-2008-4069", "CVE-2008-4067", "CVE-2008-4068", "CVE-2008-4065", "CVE-2008-4066", "CVE-2008-4061", "CVE-2008-4062", "CVE-2008-4063", "CVE-2008-4064", "CVE-2008-4058", "CVE-2008-4059", "CVE-2008-4060", "CVE-2008-3837", "CVE-2008-3836", "CVE-2008-3835", "CVE-2008-0016");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Mozilla");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mozilla-xulrunner
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Mozilla");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-xulrunner", rpm:"mozilla-xulrunner~1.8.0.14eol~0.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gecko-sdk0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-gecko-sdk-5813
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for gecko-sdk and mozilla-xulrunner
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65879);
+ script_cve_id("CVE-2008-0017", "CVE-2008-5012", "CVE-2008-5013", "CVE-2008-5014", "CVE-2008-5016", "CVE-2008-5017", "CVE-2008-5018", "CVE-2008-5021", "CVE-2008-5022", "CVE-2008-5023", "CVE-2008-5024", "CVE-2008-5052");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for gecko-sdk and mozilla-xulrunner");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mozilla-xulrunner
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for gecko-sdk and mozilla-xulrunner");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-xulrunner", rpm:"mozilla-xulrunner~1.8.0.14eol~0.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_geronimo.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_geronimo.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_geronimo.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,85 @@
+#
+#VID slesp1-geronimo-4967
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Geronimo
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65985);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Geronimo");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    geronimo
+    geronimo-jetty-servlet-container
+    geronimo-tomcat-servlet-container
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Geronimo");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"geronimo", rpm:"geronimo~1.0~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"geronimo-jetty-servlet-container", rpm:"geronimo-jetty-servlet-container~1.0~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"geronimo-tomcat-servlet-container", rpm:"geronimo-tomcat-servlet-container~1.0~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ghostscript-fon.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ghostscript-fon.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ghostscript-fon.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,107 @@
+#
+#VID slesp2-ghostscript-fonts-other-6245
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for GhostScript
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65867);
+ script_cve_id("CVE-2009-0196", "CVE-2009-0792", "CVE-2008-6679", "CVE-2007-6725");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for GhostScript");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ghostscript-fonts-other
+    ghostscript-fonts-rus
+    ghostscript-fonts-std
+    ghostscript-library
+    ghostscript-omni
+    ghostscript-x11
+    libgimpprint
+    libgimpprint-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for GhostScript");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ghostscript-fonts-other", rpm:"ghostscript-fonts-other~8.15.4~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-fonts-rus", rpm:"ghostscript-fonts-rus~8.15.4~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-fonts-std", rpm:"ghostscript-fonts-std~8.15.4~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-library", rpm:"ghostscript-library~8.15.4~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-omni", rpm:"ghostscript-omni~8.15.4~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-x11", rpm:"ghostscript-x11~8.15.4~16.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgimpprint", rpm:"libgimpprint~4.2.7~62.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgimpprint-devel", rpm:"libgimpprint-devel~4.2.7~62.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ghostscript-fon0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ghostscript-fon0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ghostscript-fon0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,107 @@
+#
+#VID slesp2-ghostscript-fonts-other-6066
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Ghostscript
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65899);
+ script_cve_id("CVE-2009-0583", "CVE-2009-0584");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Ghostscript");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ghostscript-fonts-other
+    ghostscript-fonts-rus
+    ghostscript-fonts-std
+    ghostscript-library
+    ghostscript-omni
+    ghostscript-x11
+    libgimpprint
+    libgimpprint-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Ghostscript");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ghostscript-fonts-other", rpm:"ghostscript-fonts-other~8.15.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-fonts-rus", rpm:"ghostscript-fonts-rus~8.15.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-fonts-std", rpm:"ghostscript-fonts-std~8.15.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-library", rpm:"ghostscript-library~8.15.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-omni", rpm:"ghostscript-omni~8.15.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ghostscript-x11", rpm:"ghostscript-x11~8.15.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgimpprint", rpm:"libgimpprint~4.2.7~62.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgimpprint-devel", rpm:"libgimpprint-devel~4.2.7~62.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gnutls.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gnutls.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gnutls.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-gnutls-6470
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for GnuTLS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65838);
+ script_cve_id("CVE-2009-2417");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for GnuTLS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gnutls
+    gnutls-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for GnuTLS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gnutls", rpm:"gnutls~1.2.10~13.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnutls-devel", rpm:"gnutls-devel~1.2.10~13.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gnutls0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gnutls0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gnutls0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-gnutls-5851
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for GnuTLS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65842);
+ script_cve_id("CVE-2008-4989");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for GnuTLS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gnutls
+    gnutls-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for GnuTLS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gnutls", rpm:"gnutls~1.2.10~13.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnutls-devel", rpm:"gnutls-devel~1.2.10~13.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gnutls1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gnutls1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gnutls1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-gnutls-5543
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for GnuTLS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65843);
+ script_cve_id("CVE-2008-1948", "CVE-2008-1949", "CVE-2008-1950");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for GnuTLS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gnutls
+    gnutls-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for GnuTLS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gnutls", rpm:"gnutls~1.2.10~13.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnutls-devel", rpm:"gnutls-devel~1.2.10~13.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gnutls2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gnutls2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gnutls2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-gnutls-6073
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for GnuTLS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65886);
+ script_cve_id("CVE-2008-4989");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for GnuTLS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gnutls
+    gnutls-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for GnuTLS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gnutls", rpm:"gnutls~1.2.10~13.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnutls-devel", rpm:"gnutls-devel~1.2.10~13.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gstreamer010-pl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gstreamer010-pl.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gstreamer010-pl.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-gstreamer010-plugins-good-6293
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for gstreamer
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65950);
+ script_cve_id("CVE-2009-1932");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for gstreamer");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gstreamer010-plugins-good
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for gstreamer");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gstreamer010-plugins-good", rpm:"gstreamer010-plugins-good~0.10.2~16.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gvim.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gvim.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gvim.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-gvim-6025
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for vim
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65807);
+ script_cve_id("CVE-2008-2712", "CVE-2008-4101");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for vim");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gvim
+    vim
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for vim");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gvim", rpm:"gvim~6.4.6~19.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"vim", rpm:"vim~6.4.6~19.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_gvim0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_gvim0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_gvim0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,81 @@
+#
+#VID slesp1-gvim-4821
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for gvim and vim
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65989);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for gvim and vim");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    gvim
+    vim
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for gvim and vim");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gvim", rpm:"gvim~6.4.6~19.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"vim", rpm:"vim~6.4.6~19.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_hal.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_hal.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_hal.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-hal-6036
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for hal
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65832);
+ script_cve_id("CVE-2008-4311");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for hal");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    hal
+    hal-devel
+    hal-gnome
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for hal");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"hal", rpm:"hal~0.5.6~33.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"hal-devel", rpm:"hal-devel~0.5.6~33.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"hal-gnome", rpm:"hal-gnome~0.5.6~33.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_hplip.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_hplip.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_hplip.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-hplip-5556
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for hplip
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65794);
+ script_cve_id("CVE-2008-2940", "CVE-2008-2941");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for hplip");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    hplip
+    hplip-hpijs
+    hplip17
+    hplip17-hpijs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for hplip");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"hplip", rpm:"hplip~0.9.7~19.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"hplip-hpijs", rpm:"hplip-hpijs~0.9.7~19.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"hplip17", rpm:"hplip17~1.7.2~0.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"hplip17-hpijs", rpm:"hplip17-hpijs~1.7.2~0.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_hplip17.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_hplip17.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_hplip17.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-hplip17-4507
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for hplip17 and hplip17-hpijs
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65962);
+ script_cve_id("CVE-2007-5208");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for hplip17 and hplip17-hpijs");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    hplip17
+    hplip17-hpijs
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for hplip17 and hplip17-hpijs");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"hplip17", rpm:"hplip17~1.7.2~0.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"hplip17-hpijs", rpm:"hplip17-hpijs~1.7.2~0.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ia32el.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ia32el.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ia32el.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-ia32el-6466
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ia32el
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65882);
+ script_cve_id("CVE-2009-2707");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ia32el");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ia32el
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ia32el");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ia32el", rpm:"ia32el~7042_7022~0.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_icu.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_icu.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_icu.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-icu-6422
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for icu
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65800);
+ script_cve_id("CVE-2009-0153");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for icu");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libicu
+    libicu-devel
+    libicu-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for icu");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libicu", rpm:"libicu~3.4~16.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libicu-devel", rpm:"libicu-devel~3.4~16.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libicu-doc", rpm:"libicu-doc~3.4~16.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_icu0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_icu0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_icu0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp1-icu-5014
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for icu
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65955);
+ script_cve_id("CVE-2007-4770", "CVE-2007-4771");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for icu");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libicu
+    libicu-devel
+    libicu-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for icu");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libicu", rpm:"libicu~3.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libicu-devel", rpm:"libicu-devel~3.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libicu-doc", rpm:"libicu-doc~3.4~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_id3lib.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_id3lib.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_id3lib.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp1-id3lib-4317
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for id3lib
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66002);
+ script_cve_id("CVE-2007-4460");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for id3lib");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    id3lib
+    id3lib-devel
+    id3lib-examples
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for id3lib");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"id3lib", rpm:"id3lib~3.8.3~104.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"id3lib-devel", rpm:"id3lib-devel~3.8.3~104.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"id3lib-examples", rpm:"id3lib-examples~3.8.3~104.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ipsec-tools.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ipsec-tools.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ipsec-tools.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-ipsec-tools-6301
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ipsec-tools
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65856);
+ script_cve_id("CVE-2009-1574", "CVE-2009-1632");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ipsec-tools");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ipsec-tools
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ipsec-tools");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ipsec-tools", rpm:"ipsec-tools~0.6.5~10.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_ipsec-tools0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-ipsec-tools-5638
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for ipsec-tools
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65953);
+ script_cve_id("CVE-2008-3651", "CVE-2008-3652");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for ipsec-tools");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    ipsec-tools
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for ipsec-tools");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ipsec-tools", rpm:"ipsec-tools~0.6.5~10.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_jasper.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_jasper.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_jasper.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-jasper-5782
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for jasper
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65824);
+ script_cve_id("CVE-2008-3520", "CVE-2008-3521", "CVE-2008-3522");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for jasper");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    jasper
+    libjasper
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for jasper");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"jasper", rpm:"jasper~1.701.0~16.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libjasper", rpm:"libjasper~1.701.0~16.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-java-1_4_2-ibm-6508
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.4.2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65764);
+ script_cve_id("CVE-2009-2625", "CVE-2008-5349");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.4.2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-ibm
+    java-1_4_2-ibm-devel
+    java-1_4_2-ibm-jdbc
+    java-1_4_2-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.4.2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-ibm", rpm:"java-1_4_2-ibm~1.4.2_sr13.1~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-devel", rpm:"java-1_4_2-ibm-devel~1.4.2_sr13.1~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-jdbc", rpm:"java-1_4_2-ibm-jdbc~1.4.2_sr13.1~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-plugin", rpm:"java-1_4_2-ibm-plugin~1.4.2_sr13.1~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-java-1_4_2-ibm-6136
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.4.2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65839);
+ script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5342");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.4.2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-ibm
+    java-1_4_2-ibm-devel
+    java-1_4_2-ibm-jdbc
+    java-1_4_2-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.4.2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-ibm", rpm:"java-1_4_2-ibm~1.4.2_sr13~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-devel", rpm:"java-1_4_2-ibm-devel~1.4.2_sr13~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-jdbc", rpm:"java-1_4_2-ibm-jdbc~1.4.2_sr13~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-plugin", rpm:"java-1_4_2-ibm-plugin~1.4.2_sr13~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-java-1_4_2-ibm-5465
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.4.2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65844);
+ script_cve_id("CVE-2008-1196", "CVE-2008-1187", "CVE-2007-5240");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.4.2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-ibm
+    java-1_4_2-ibm-devel
+    java-1_4_2-ibm-jdbc
+    java-1_4_2-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.4.2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-ibm", rpm:"java-1_4_2-ibm~1.4.2_sr11~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-devel", rpm:"java-1_4_2-ibm-devel~1.4.2_sr11~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-jdbc", rpm:"java-1_4_2-ibm-jdbc~1.4.2_sr11~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-plugin", rpm:"java-1_4_2-ibm-plugin~1.4.2_sr11~0.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-java-1_4_2-ibm-5846
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65904);
+ script_cve_id("CVE-2008-3104", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-ibm
+    java-1_4_2-ibm-devel
+    java-1_4_2-ibm-jdbc
+    java-1_4_2-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-ibm", rpm:"java-1_4_2-ibm~1.4.2_sr12~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-devel", rpm:"java-1_4_2-ibm-devel~1.4.2_sr12~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-jdbc", rpm:"java-1_4_2-ibm-jdbc~1.4.2_sr12~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-plugin", rpm:"java-1_4_2-ibm-plugin~1.4.2_sr12~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-ibm3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp1-java-1_4_2-ibm-5182
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.4.2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65988);
+ script_cve_id("CVE-2008-1196", "CVE-2008-1195", "CVE-2008-1192", "CVE-2008-1190", "CVE-2008-1189", "CVE-2008-1187", "CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381", "CVE-2007-3698");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.4.2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-ibm
+    java-1_4_2-ibm-devel
+    java-1_4_2-ibm-jdbc
+    java-1_4_2-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.4.2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-ibm", rpm:"java-1_4_2-ibm~1.4.2_sr10~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-devel", rpm:"java-1_4_2-ibm-devel~1.4.2_sr10~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-jdbc", rpm:"java-1_4_2-ibm-jdbc~1.4.2_sr10~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-ibm-plugin", rpm:"java-1_4_2-ibm-plugin~1.4.2_sr10~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-java-1_4_2-sun-5852
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Sun Java 1.4.2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65822);
+ script_cve_id("CVE-2008-5360", "CVE-2008-5359", "CVE-2008-5358", "CVE-2008-5357", "CVE-2008-5356", "CVE-2008-5344", "CVE-2008-5343", "CVE-2008-5342", "CVE-2008-5341", "CVE-2008-5340", "CVE-2008-5339", "CVE-2008-2086", "CVE-2008-5355", "CVE-2008-5354", "CVE-2008-5353", "CVE-2008-5352", "CVE-2008-5351", "CVE-2008-5350", "CVE-2008-5349", "CVE-2008-5348", "CVE-2008-5347", "CVE-2008-5345", "CVE-2008-5346");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Sun Java 1.4.2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-sun
+    java-1_4_2-sun-alsa
+    java-1_4_2-sun-devel
+    java-1_4_2-sun-jdbc
+    java-1_4_2-sun-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Sun Java 1.4.2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-sun", rpm:"java-1_4_2-sun~1.4.2.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-alsa", rpm:"java-1_4_2-sun-alsa~1.4.2.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-devel", rpm:"java-1_4_2-sun-devel~1.4.2.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-jdbc", rpm:"java-1_4_2-sun-jdbc~1.4.2.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-plugin", rpm:"java-1_4_2-sun-plugin~1.4.2.19~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-java-1_4_2-sun-5431
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Java 1.4.2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65916);
+ script_cve_id("CVE-2008-3114", "CVE-2008-3113", "CVE-2008-3112", "CVE-2008-3111", "CVE-2008-3108", "CVE-2008-3107", "CVE-2008-3104");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Java 1.4.2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-sun
+    java-1_4_2-sun-alsa
+    java-1_4_2-sun-devel
+    java-1_4_2-sun-jdbc
+    java-1_4_2-sun-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Java 1.4.2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-sun", rpm:"java-1_4_2-sun~1.4.2.18~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-alsa", rpm:"java-1_4_2-sun-alsa~1.4.2.18~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-devel", rpm:"java-1_4_2-sun-devel~1.4.2.18~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-jdbc", rpm:"java-1_4_2-sun-jdbc~1.4.2.18~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-plugin", rpm:"java-1_4_2-sun-plugin~1.4.2.18~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_4_2-sun1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp1-java-1_4_2-sun-5131
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Sun Java
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66005);
+ script_cve_id("CVE-2008-1158", "CVE-2008-1186", "CVE-2008-1185", "CVE-2008-1187", "CVE-2008-1189", "CVE-2008-1188", "CVE-2008-1190", "CVE-2008-1191", "CVE-2008-1192", "CVE-2008-1195", "CVE-2008-1196");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Sun Java");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_4_2-sun
+    java-1_4_2-sun-alsa
+    java-1_4_2-sun-devel
+    java-1_4_2-sun-jdbc
+    java-1_4_2-sun-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Sun Java");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_4_2-sun", rpm:"java-1_4_2-sun~1.4.2.17~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-alsa", rpm:"java-1_4_2-sun-alsa~1.4.2.17~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-devel", rpm:"java-1_4_2-sun-devel~1.4.2.17~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-jdbc", rpm:"java-1_4_2-sun-jdbc~1.4.2.17~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_4_2-sun-plugin", rpm:"java-1_4_2-sun-plugin~1.4.2.17~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-java-1_5_0-ibm-5662
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65801);
+ script_cve_id("CVE-2008-3103");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_5_0-ibm
+    java-1_5_0-ibm-alsa
+    java-1_5_0-ibm-devel
+    java-1_5_0-ibm-fonts
+    java-1_5_0-ibm-jdbc
+    java-1_5_0-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_5_0-ibm", rpm:"java-1_5_0-ibm~1.5.0_sr8a~1.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-alsa", rpm:"java-1_5_0-ibm-alsa~1.5.0_sr8a~1.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-devel", rpm:"java-1_5_0-ibm-devel~1.5.0_sr8a~1.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-fonts", rpm:"java-1_5_0-ibm-fonts~1.5.0_sr8a~1.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-jdbc", rpm:"java-1_5_0-ibm-jdbc~1.5.0_sr8a~1.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-plugin", rpm:"java-1_5_0-ibm-plugin~1.5.0_sr8a~1.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,97 @@
+#
+#VID slesp2-java-1_5_0-ibm-6380
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65825);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_5_0-ibm
+    java-1_5_0-ibm-alsa
+    java-1_5_0-ibm-devel
+    java-1_5_0-ibm-fonts
+    java-1_5_0-ibm-jdbc
+    java-1_5_0-ibm-plugin
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_5_0-ibm", rpm:"java-1_5_0-ibm~1.5.0_sr10~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-alsa", rpm:"java-1_5_0-ibm-alsa~1.5.0_sr10~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-devel", rpm:"java-1_5_0-ibm-devel~1.5.0_sr10~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-fonts", rpm:"java-1_5_0-ibm-fonts~1.5.0_sr10~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-jdbc", rpm:"java-1_5_0-ibm-jdbc~1.5.0_sr10~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-plugin", rpm:"java-1_5_0-ibm-plugin~1.5.0_sr10~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-java-1_5_0-ibm-6253
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65873);
+ script_cve_id("CVE-2009-1100", "CVE-2009-1103", "CVE-2009-1104", "CVE-2009-1093", "CVE-2009-1094", "CVE-2009-1107", "CVE-2009-1095", "CVE-2009-1096", "CVE-2009-1098", "CVE-2009-1099");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_5_0-ibm
+    java-1_5_0-ibm-alsa
+    java-1_5_0-ibm-devel
+    java-1_5_0-ibm-fonts
+    java-1_5_0-ibm-jdbc
+    java-1_5_0-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_5_0-ibm", rpm:"java-1_5_0-ibm~1.5.0_sr9~2.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-alsa", rpm:"java-1_5_0-ibm-alsa~1.5.0_sr9~2.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-devel", rpm:"java-1_5_0-ibm-devel~1.5.0_sr9~2.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-fonts", rpm:"java-1_5_0-ibm-fonts~1.5.0_sr9~2.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-jdbc", rpm:"java-1_5_0-ibm-jdbc~1.5.0_sr9~2.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-plugin", rpm:"java-1_5_0-ibm-plugin~1.5.0_sr9~2.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-java-1_5_0-ibm-5960
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.5.0
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65907);
+ script_cve_id("CVE-2008-5350", "CVE-2008-5346", "CVE-2008-5343", "CVE-2008-5344", "CVE-2008-5359", "CVE-2008-5341", "CVE-2008-5339", "CVE-2008-5340", "CVE-2008-5348", "CVE-2008-2086", "CVE-2008-5345", "CVE-2008-5351", "CVE-2008-5360", "CVE-2008-5353", "CVE-2008-5356", "CVE-2008-5354", "CVE-2008-5357", "CVE-2008-5352", "CVE-2008-5342");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.5.0");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_5_0-ibm
+    java-1_5_0-ibm-alsa
+    java-1_5_0-ibm-devel
+    java-1_5_0-ibm-fonts
+    java-1_5_0-ibm-jdbc
+    java-1_5_0-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.5.0");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_5_0-ibm", rpm:"java-1_5_0-ibm~1.5.0_sr9~2.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-alsa", rpm:"java-1_5_0-ibm-alsa~1.5.0_sr9~2.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-devel", rpm:"java-1_5_0-ibm-devel~1.5.0_sr9~2.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-fonts", rpm:"java-1_5_0-ibm-fonts~1.5.0_sr9~2.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-jdbc", rpm:"java-1_5_0-ibm-jdbc~1.5.0_sr9~2.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-plugin", rpm:"java-1_5_0-ibm-plugin~1.5.0_sr9~2.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-java-1_5_0-ibm-5591
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65941);
+ script_cve_id("CVE-2008-3104", "CVE-2008-3106", "CVE-2008-3108", "CVE-2008-3111", "CVE-2008-3112", "CVE-2008-3113", "CVE-2008-3114");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_5_0-ibm
+    java-1_5_0-ibm-alsa
+    java-1_5_0-ibm-devel
+    java-1_5_0-ibm-fonts
+    java-1_5_0-ibm-jdbc
+    java-1_5_0-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_5_0-ibm", rpm:"java-1_5_0-ibm~1.5.0_sr8~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-alsa", rpm:"java-1_5_0-ibm-alsa~1.5.0_sr8~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-devel", rpm:"java-1_5_0-ibm-devel~1.5.0_sr8~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-fonts", rpm:"java-1_5_0-ibm-fonts~1.5.0_sr8~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-jdbc", rpm:"java-1_5_0-ibm-jdbc~1.5.0_sr8~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-plugin", rpm:"java-1_5_0-ibm-plugin~1.5.0_sr8~1.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_java-1_5_0-ibm4.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp1-java-1_5_0-ibm-5183
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for IBM Java 1.5.0
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66000);
+ script_cve_id("CVE-2008-1196", "CVE-2008-1195", "CVE-2008-1194", "CVE-2008-1193", "CVE-2008-1192", "CVE-2008-1190", "CVE-2008-1189", "CVE-2008-1188", "CVE-2008-1187", "CVE-2008-0657", "CVE-2007-5232", "CVE-2007-5274", "CVE-2007-5273", "CVE-2007-5236", "CVE-2007-5238", "CVE-2007-5239", "CVE-2007-5240", "CVE-2007-4381");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for IBM Java 1.5.0");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    java-1_5_0-ibm
+    java-1_5_0-ibm-alsa
+    java-1_5_0-ibm-devel
+    java-1_5_0-ibm-fonts
+    java-1_5_0-ibm-jdbc
+    java-1_5_0-ibm-plugin
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for IBM Java 1.5.0");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1_5_0-ibm", rpm:"java-1_5_0-ibm~1.5.0_sr7~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-alsa", rpm:"java-1_5_0-ibm-alsa~1.5.0_sr7~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-devel", rpm:"java-1_5_0-ibm-devel~1.5.0_sr7~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-fonts", rpm:"java-1_5_0-ibm-fonts~1.5.0_sr7~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-jdbc", rpm:"java-1_5_0-ibm-jdbc~1.5.0_sr7~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_5_0-ibm-plugin", rpm:"java-1_5_0-ibm-plugin~1.5.0_sr7~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kdegraphics3-pd.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-kdegraphics3-pdf-4682
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for kdegraphics3-pdf
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65999);
+ script_cve_id("CVE-2007-4352", "CVE-2007-5392", "CVE-2007-5393");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for kdegraphics3-pdf");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kdegraphics3-pdf
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for kdegraphics3-pdf");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics3-pdf", rpm:"kdegraphics3-pdf~3.5.1~23.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kdegraphics3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-kdegraphics3-6283
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for kdegraphics3
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65835);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for kdegraphics3");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kdegraphics3
+    kdegraphics3-devel
+    kdegraphics3-extra
+    kdegraphics3-fax
+    kdegraphics3-pdf
+    kdegraphics3-postscript
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for kdegraphics3");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics3", rpm:"kdegraphics3~3.5.1~23.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics3-devel", rpm:"kdegraphics3-devel~3.5.1~23.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics3-extra", rpm:"kdegraphics3-extra~3.5.1~23.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics3-fax", rpm:"kdegraphics3-fax~3.5.1~23.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics3-pdf", rpm:"kdegraphics3-pdf~3.5.1~23.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics3-postscript", rpm:"kdegraphics3-postscript~3.5.1~23.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kdelibs3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdelibs3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kdelibs3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,89 @@
+#
+#VID slesp1-kdelibs3-4862
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for kdelibs3
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65990);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for kdelibs3");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kdelibs3
+    kdelibs3-arts
+    kdelibs3-devel
+    kdelibs3-doc
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for kdelibs3");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdelibs3", rpm:"kdelibs3~3.5.1~49.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdelibs3-arts", rpm:"kdelibs3-arts~3.5.1~49.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdelibs3-devel", rpm:"kdelibs3-devel~3.5.1~49.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdelibs3-doc", rpm:"kdelibs3-doc~3.5.1~49.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kdepim3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kdepim3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kdepim3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,97 @@
+#
+#VID slesp2-kdepim3-6160
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for KDE PIM packages
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65860);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for KDE PIM packages");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kdepim3
+    kdepim3-devel
+    kdepim3-kpilot
+    kdepim3-networkstatus
+    kdepim3-sync
+    kdepim3-time-management
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for KDE PIM packages");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdepim3", rpm:"kdepim3~3.5.1~41.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdepim3-devel", rpm:"kdepim3-devel~3.5.1~41.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdepim3-kpilot", rpm:"kdepim3-kpilot~3.5.1~41.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdepim3-networkstatus", rpm:"kdepim3-networkstatus~3.5.1~41.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdepim3-sync", rpm:"kdepim3-sync~3.5.1~41.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdepim3-time-management", rpm:"kdepim3-time-management~3.5.1~41.42", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,117 @@
+#
+#VID slesp2-kernel-5725
+# OpenVAS Vulnerability Test
+# $
+# Description: Recommended update for Linux Kernel (x86)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65782);
+ script_version ("$Revision$");
+ script_name("SLES10: Recommended update for Linux Kernel (x86)");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Recommended update for Linux Kernel (x86)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.33", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-5235
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65804);
+ script_cve_id("CVE-2008-2136");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-6109
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65812);
+ script_cve_id("CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0028", "CVE-2008-1294", "CVE-2009-0065", "CVE-2009-1046");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.37_f594963d", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-6439
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65814);
+ script_cve_id("CVE-2009-2692", "CVE-2009-1758", "CVE-2009-1389", "CVE-2009-1630");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.42.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-5473
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65876);
+ script_cve_id("CVE-2008-1615", "CVE-2008-1669", "CVE-2008-2372", "CVE-2008-1673", "CVE-2008-2812", "CVE-2008-2931");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel4.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel4.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-5924
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65887);
+ script_cve_id("CVE-2008-5079", "CVE-2008-5029", "CVE-2008-4933", "CVE-2008-5025", "CVE-2008-5182");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-6453
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65909);
+ script_cve_id("CVE-2009-2698");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.42.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel6.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel6.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-5668
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65914);
+ script_cve_id("CVE-2008-4210", "CVE-2008-3528", "CVE-2008-1514", "CVE-2007-6716", "CVE-2008-3525");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel7.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel7.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel7.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-5565
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Linux Kernel (x86)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65920);
+ script_cve_id("CVE-2008-0598", "CVE-2008-1673", "CVE-2008-3272", "CVE-2008-3275");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Linux Kernel (x86)");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Linux Kernel (x86)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.29", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_kernel8.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_kernel8.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_kernel8.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-kernel-6237
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for the Linux kernel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65924);
+ script_cve_id("CVE-2009-0834", "CVE-2009-1072", "CVE-2009-0835", "CVE-2009-1439", "CVE-2009-1337", "CVE-2009-0859", "CVE-2009-1265");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for the Linux kernel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    kernel-bigsmp
+    kernel-debug
+    kernel-default
+    kernel-kdump
+    kernel-smp
+    kernel-source
+    kernel-syms
+    kernel-vmi
+    kernel-vmipae
+    kernel-xen
+    kernel-xenpae
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for the Linux kernel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-bigsmp", rpm:"kernel-bigsmp~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-kdump", rpm:"kernel-kdump~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-vmipae", rpm:"kernel-vmipae~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenpae", rpm:"kernel-xenpae~2.6.16.60~0.39.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_krb5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_krb5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_krb5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-krb5-6140
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Kerberos
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65791);
+ script_cve_id("CVE-2009-0845", "CVE-2009-0844", "CVE-2009-0847", "CVE-2009-0846");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Kerberos");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    krb5
+    krb5-apps-clients
+    krb5-apps-servers
+    krb5-client
+    krb5-devel
+    krb5-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Kerberos");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"krb5", rpm:"krb5~1.4.3~19.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-apps-clients", rpm:"krb5-apps-clients~1.4.3~19.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-apps-servers", rpm:"krb5-apps-servers~1.4.3~19.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-client", rpm:"krb5-client~1.4.3~19.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-devel", rpm:"krb5-devel~1.4.3~19.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"krb5-server", rpm:"krb5-server~1.4.3~19.41", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libapr-util1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libapr-util1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libapr-util1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libapr-util1-6289
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libapr-util1
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65915);
+ script_cve_id("CVE-2009-1955", "CVE-2009-1956", "CVE-2009-0023");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libapr-util1");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libapr-util1
+    libapr-util1-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libapr-util1");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.2.2~13.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.2.2~13.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libcdio.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libcdio.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libcdio.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-libcdio-5060
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libcdio
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65978);
+ script_cve_id("CVE-2007-6613");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libcdio");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libcdio
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libcdio");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libcdio", rpm:"libcdio~0.76~16.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libexif.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libexif.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libexif.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-libexif-4884
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libexif
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65956);
+ script_cve_id("CVE-2007-6351", "CVE-2007-6352");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libexif");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libexif
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libexif");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libexif", rpm:"libexif~0.6.13~20.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libexif5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libexif5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libexif5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-libexif5-4883
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libexif5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65963);
+ script_cve_id("CVE-2007-6352");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libexif5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libexif5
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libexif5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libexif5", rpm:"libexif5~0.5.12~17.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_liblcms.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_liblcms.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_liblcms.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-liblcms-6048
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for liblcms
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65906);
+ script_cve_id("CVE-2009-0723", "CVE-2009-0581", "CVE-2009-0733");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for liblcms");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    liblcms
+    liblcms-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for liblcms");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"liblcms", rpm:"liblcms~1.15~12.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"liblcms-devel", rpm:"liblcms-devel~1.15~12.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_liblcms0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_liblcms0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_liblcms0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-liblcms-4626
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for liblcms,liblcms-devel
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65967);
+ script_cve_id("CVE-2007-2741");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for liblcms,liblcms-devel");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    liblcms
+    liblcms-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for liblcms,liblcms-devel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"liblcms", rpm:"liblcms~1.15~12.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"liblcms-devel", rpm:"liblcms-devel~1.15~12.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libmikmod.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libmikmod.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libmikmod.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-libmikmod-6034
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libmikmod
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65874);
+ script_cve_id("CVE-2009-0179", "CVE-2007-6720");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libmikmod");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libmikmod
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libmikmod");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libmikmod", rpm:"libmikmod~3.1.11~14.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libnetpbm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libnetpbm.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libnetpbm.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-libnetpbm-4688
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for netpbm
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66001);
+ script_cve_id("CVE-2007-2721");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for netpbm");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libnetpbm
+    netpbm
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for netpbm");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libnetpbm", rpm:"libnetpbm~1.0.0~657.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"netpbm", rpm:"netpbm~10.26.22~14.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libpng.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libpng.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libpng.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libpng-6003
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libpng
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65830);
+ script_cve_id("CVE-2009-0040");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libpng");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libpng
+    libpng-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libpng");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpng", rpm:"libpng~1.2.8~19.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpng-devel", rpm:"libpng-devel~1.2.8~19.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libpng0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libpng0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libpng0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libpng-6024
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libpng
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65871);
+ script_cve_id("CVE-2009-0040");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libpng");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libpng
+    libpng-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libpng");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpng", rpm:"libpng~1.2.8~19.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpng-devel", rpm:"libpng-devel~1.2.8~19.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libpng1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libpng1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libpng1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libpng-6326
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libpng
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65878);
+ script_cve_id("CVE-2009-2042");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libpng");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libpng
+    libpng-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libpng");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpng", rpm:"libpng~1.2.8~19.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpng-devel", rpm:"libpng-devel~1.2.8~19.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libpng2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libpng2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libpng2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libpng-5945
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libpng
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65940);
+ script_cve_id("CVE-2008-5907");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libpng");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libpng
+    libpng-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libpng");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpng", rpm:"libpng~1.2.8~19.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpng-devel", rpm:"libpng-devel~1.2.8~19.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libpng3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libpng3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libpng3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-libpng-5181
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libpng
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65972);
+ script_cve_id("CVE-2008-1382");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libpng");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libpng
+    libpng-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libpng");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpng", rpm:"libpng~1.2.8~19.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpng-devel", rpm:"libpng-devel~1.2.8~19.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_librpcsecgss.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-librpcsecgss-4601
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for librpcsecgss
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65954);
+ script_cve_id("CVE-2007-3999");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for librpcsecgss");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    librpcsecgss
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for librpcsecgss");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"librpcsecgss", rpm:"librpcsecgss~0.7~13.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libsndfile.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libsndfile.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libsndfile.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libsndfile-6040
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libsndfile
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65908);
+ script_cve_id("CVE-2009-0186");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libsndfile");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libsndfile
+    libsndfile-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libsndfile");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libsndfile", rpm:"libsndfile~1.0.12~13.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsndfile-devel", rpm:"libsndfile-devel~1.0.12~13.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libsndfile0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libsndfile0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libsndfile0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-libsndfile-4431
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libsndfile
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65979);
+ script_cve_id("CVE-2007-4974");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libsndfile");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libsndfile
+    libsndfile-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libsndfile");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libsndfile", rpm:"libsndfile~1.0.12~13.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsndfile-devel", rpm:"libsndfile-devel~1.0.12~13.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libsoup.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libsoup.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libsoup.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libsoup-6223
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libsoup
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65829);
+ script_cve_id("CVE-2009-0585");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libsoup");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libsoup
+    libsoup-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libsoup");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libsoup", rpm:"libsoup~2.2.90~18.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsoup-devel", rpm:"libsoup-devel~2.2.90~18.24", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libtiff.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libtiff.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libtiff.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-libtiff-6337
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libtiff
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65796);
+ script_cve_id("CVE-2009-2285");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libtiff");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libtiff
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libtiff");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libtiff", rpm:"libtiff~3.8.2~5.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libtiff0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libtiff0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libtiff0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-libtiff-5538
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libtiff
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65870);
+ script_cve_id("CVE-2008-2327");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libtiff");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libtiff
+    libtiff-devel
+    tiff
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libtiff");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libtiff", rpm:"libtiff~3.8.2~5.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtiff-devel", rpm:"libtiff-devel~3.8.2~5.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tiff", rpm:"tiff~3.8.2~5.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libtiff1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libtiff1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libtiff1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-libtiff-6407
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libtiff
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65917);
+ script_cve_id("CVE-2009-2347");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libtiff");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libtiff
+    libtiff-devel
+    tiff
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libtiff");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libtiff", rpm:"libtiff~3.8.2~5.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtiff-devel", rpm:"libtiff-devel~3.8.2~5.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tiff", rpm:"tiff~3.8.2~5.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libvirt.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libvirt.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libvirt.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-libvirt-5869
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libvirt
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65912);
+ script_cve_id("CVE-2008-5086");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libvirt");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libvirt
+    libvirt-devel
+    libvirt-python
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libvirt");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libvirt", rpm:"libvirt~0.3.3~18.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvirt-devel", rpm:"libvirt-devel~0.3.3~18.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvirt-python", rpm:"libvirt-python~0.3.3~18.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libvorbis.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libvorbis.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libvorbis.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libvorbis-5259
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libvorbis
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65846);
+ script_cve_id("CVE-2008-1419", "CVE-2008-1420", "CVE-2008-1423");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libvorbis");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libvorbis
+    libvorbis-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libvorbis");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libvorbis", rpm:"libvorbis~1.1.2~13.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvorbis-devel", rpm:"libvorbis-devel~1.1.2~13.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libvorbis0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libvorbis0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libvorbis0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-libvorbis-4584
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libvorbis
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65996);
+ script_cve_id("CVE-2007-4029", "CVE-2007-4065", "CVE-2007-4066");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libvorbis");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libvorbis
+    libvorbis-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libvorbis");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libvorbis", rpm:"libvorbis~1.1.2~13.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libvorbis-devel", rpm:"libvorbis-devel~1.1.2~13.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxml2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxml2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxml2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-libxml2-5583
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxml2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65778);
+ script_cve_id("CVE-2008-3281", "CVE-2008-3529");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxml2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxml2
+    libxml2-devel
+    libxml2-python
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxml2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxml2", rpm:"libxml2~2.6.23~15.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxml2-devel", rpm:"libxml2-devel~2.6.23~15.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxml2-python", rpm:"libxml2-python~2.6.23~15.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxml20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxml20.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxml20.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libxml2-6403
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxml2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65816);
+ script_cve_id("CVE-2009-2416");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxml2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxml2
+    libxml2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxml2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxml2", rpm:"libxml2~2.6.23~15.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxml2-devel", rpm:"libxml2-devel~2.6.23~15.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxml21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxml21.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxml21.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libxml2-5802
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxml2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65818);
+ script_cve_id("CVE-2008-4225");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxml2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxml2
+    libxml2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxml2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxml2", rpm:"libxml2~2.6.23~15.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxml2-devel", rpm:"libxml2-devel~2.6.23~15.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxml22.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxml22.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxml22.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,81 @@
+#
+#VID slesp2-libxml2-5982
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxml2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65834);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxml2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxml2
+    libxml2-devel
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxml2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxml2", rpm:"libxml2~2.6.23~15.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxml2-devel", rpm:"libxml2-devel~2.6.23~15.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxml23.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxml23.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxml23.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libxml2-5755
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxml2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65943);
+ script_cve_id("CVE-2008-4226");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxml2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxml2
+    libxml2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxml2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxml2", rpm:"libxml2~2.6.23~15.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxml2-devel", rpm:"libxml2-devel~2.6.23~15.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxslt.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxslt.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxslt.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libxslt-5457
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxslt
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65777);
+ script_cve_id("CVE-2008-2935");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxslt");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxslt
+    libxslt-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxslt");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxslt", rpm:"libxslt~1.1.15~15.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxslt-devel", rpm:"libxslt-devel~1.1.15~15.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libxslt0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libxslt0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_libxslt0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-libxslt-5343
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libxslt
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65901);
+ script_cve_id("CVE-2008-1767");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libxslt");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libxslt
+    libxslt-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libxslt");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxslt", rpm:"libxslt~1.1.15~15.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxslt-devel", rpm:"libxslt-devel~1.1.15~15.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mailman.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mailman.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mailman.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-mailman-5519
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for mailman
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65881);
+ script_cve_id("CVE-2008-0564");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for mailman");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mailman
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for mailman");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mailman", rpm:"mailman~2.1.7~15.5.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mozilla-xulrunn.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-mozilla-xulrunner-5164
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for epiphany
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65980);
+ script_cve_id("CVE-2008-1241", "CVE-2008-1195", "CVE-2008-1240", "CVE-2007-4879", "CVE-2008-1238", "CVE-2008-1236", "CVE-2008-1237", "CVE-2008-1233", "CVE-2008-1234", "CVE-2008-1235");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for epiphany");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mozilla-xulrunner
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for epiphany");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-xulrunner", rpm:"mozilla-xulrunner~1.8.0.14eol~0.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mtr.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mtr.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mtr.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-mtr-5291
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for mtr
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65797);
+ script_cve_id("CVE-2008-2357");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for mtr");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mtr
+    mtr-gtk
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for mtr");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mtr", rpm:"mtr~0.69~18.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mtr-gtk", rpm:"mtr-gtk~0.69~18.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_multipath-tools.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-multipath-tools-6083
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for multipath-tools
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65930);
+ script_cve_id("CVE-2009-0115");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for multipath-tools");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    multipath-tools
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for multipath-tools");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"multipath-tools", rpm:"multipath-tools~0.4.7~34.43", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mutt.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mutt.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mutt.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-mutt-6484
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for mutt
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65900);
+ script_cve_id("CVE-2009-2408");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for mutt");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mutt
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for mutt");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mutt", rpm:"mutt~1.5.9i~27.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mutt0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mutt0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mutt0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-mutt-3752
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for mutt
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65964);
+ script_cve_id("CVE-2007-1558");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for mutt");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mutt
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for mutt");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mutt", rpm:"mutt~1.5.9i~27.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mysql.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mysql.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mysql.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-mysql-6446
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MySQL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65827);
+ script_cve_id("CVE-2009-2446", "CVE-2008-4456");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MySQL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mysql
+    mysql-Max
+    mysql-client
+    mysql-devel
+    mysql-shared
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MySQL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mysql", rpm:"mysql~5.0.26~12.24.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-Max", rpm:"mysql-Max~5.0.26~12.24.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-client", rpm:"mysql-client~5.0.26~12.24.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-devel", rpm:"mysql-devel~5.0.26~12.24.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-shared", rpm:"mysql-shared~5.0.26~12.24.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mysql0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mysql0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mysql0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-mysql-5618
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MySQL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65884);
+ script_cve_id("CVE-2008-3963", "CVE-2008-4097", "CVE-2008-4098");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MySQL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mysql
+    mysql-Max
+    mysql-client
+    mysql-devel
+    mysql-shared
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MySQL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mysql", rpm:"mysql~5.0.26~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-Max", rpm:"mysql-Max~5.0.26~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-client", rpm:"mysql-client~5.0.26~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-devel", rpm:"mysql-devel~5.0.26~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-shared", rpm:"mysql-shared~5.0.26~12.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mysql1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mysql1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_mysql1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-mysql-5338
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for MySQL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65937);
+ script_cve_id("CVE-2008-2079", "CVE-2006-7232");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for MySQL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mysql
+    mysql-Max
+    mysql-client
+    mysql-devel
+    mysql-shared
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for MySQL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mysql", rpm:"mysql~5.0.26~12.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-Max", rpm:"mysql-Max~5.0.26~12.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-client", rpm:"mysql-client~5.0.26~12.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-devel", rpm:"mysql-devel~5.0.26~12.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mysql-shared", rpm:"mysql-shared~5.0.26~12.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_nagios-plugins.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_nagios-plugins.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_nagios-plugins.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-nagios-plugins-4624
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for nagios plugins
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65983);
+ script_cve_id("CVE-2007-5198", "CVE-2007-5623");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for nagios plugins");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    nagios-plugins
+    nagios-plugins-extras
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for nagios plugins");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"nagios-plugins", rpm:"nagios-plugins~1.4.5~16.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nagios-plugins-extras", rpm:"nagios-plugins-extras~1.4.5~16.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_nagios.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_nagios.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_nagios.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-nagios-6356
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for nagios
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65932);
+ script_cve_id("CVE-2009-2288");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for nagios");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    nagios
+    nagios-www
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for nagios");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"nagios", rpm:"nagios~2.6~13.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nagios-www", rpm:"nagios-www~2.6~13.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_nagios0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_nagios0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_nagios0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-nagios-5165
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for nagios
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65959);
+ script_cve_id("CVE-2007-5624", "CVE-2007-5803", "CVE-2008-1360");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for nagios");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    nagios
+    nagios-www
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for nagios");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"nagios", rpm:"nagios~2.6~13.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nagios-www", rpm:"nagios-www~2.6~13.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_net-snmp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_net-snmp.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_net-snmp.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-net-snmp-5807
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for net-snmp
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65771);
+ script_cve_id("CVE-2008-4309");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for net-snmp");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    net-snmp
+    net-snmp-devel
+    perl-SNMP
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for net-snmp");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"net-snmp", rpm:"net-snmp~5.3.0.1~25.28", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"net-snmp-devel", rpm:"net-snmp-devel~5.3.0.1~25.28", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-SNMP", rpm:"perl-SNMP~5.3.0.1~25.28", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_net-snmp0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_net-snmp0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_net-snmp0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-net-snmp-6248
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for net-snmp
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65866);
+ script_cve_id("CVE-2008-6123");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for net-snmp");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    net-snmp
+    net-snmp-devel
+    perl-SNMP
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for net-snmp");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"net-snmp", rpm:"net-snmp~5.3.0.1~25.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"net-snmp-devel", rpm:"net-snmp-devel~5.3.0.1~25.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-SNMP", rpm:"perl-SNMP~5.3.0.1~25.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_net-snmp1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-net-snmp-5422
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for net-snmp
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65905);
+ script_cve_id("CVE-2008-2292", "CVE-2008-0960");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for net-snmp");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    net-snmp
+    net-snmp-devel
+    perl-SNMP
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for net-snmp");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"net-snmp", rpm:"net-snmp~5.3.0.1~25.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"net-snmp-devel", rpm:"net-snmp-devel~5.3.0.1~25.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-SNMP", rpm:"perl-SNMP~5.3.0.1~25.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_netatalk.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_netatalk.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_netatalk.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-netatalk-5983
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for netatalk
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65864);
+ script_cve_id("CVE-2008-5718");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for netatalk");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    netatalk
+    netatalk-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for netatalk");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"netatalk", rpm:"netatalk~2.0.3~21.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"netatalk-devel", rpm:"netatalk-devel~2.0.3~21.8", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_nfs-utils.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_nfs-utils.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_nfs-utils.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-nfs-utils-5713
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for nfs-utils
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65790);
+ script_cve_id("CVE-2008-4552");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for nfs-utils");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    nfs-utils
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for nfs-utils");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"nfs-utils", rpm:"nfs-utils~1.0.7~36.31", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_open-iscsi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_open-iscsi.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_open-iscsi.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-open-iscsi-6455
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for open-iscsi
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65776);
+ script_cve_id("CVE-2009-1297");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for open-iscsi");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    open-iscsi
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for open-iscsi");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"open-iscsi", rpm:"open-iscsi~2.0.707~0.47", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openldap2-clien.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openldap2-clien.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openldap2-clien.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,81 @@
+#
+#VID slesp2-openldap2-client-5704
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for the OpenLDAP client
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65896);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for the OpenLDAP client");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openldap2-client
+    openldap2-devel
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for the OpenLDAP client");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openldap2-client", rpm:"openldap2-client~2.3.32~0.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-devel", rpm:"openldap2-devel~2.3.32~0.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openldap2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openldap2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openldap2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-openldap2-6485
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenLDAP2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65858);
+ script_cve_id("CVE-2009-2408");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenLDAP2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openldap2
+    openldap2-back-meta
+    openldap2-back-perl
+    openldap2-client
+    openldap2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenLDAP2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openldap2", rpm:"openldap2~2.3.32~0.34.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-back-meta", rpm:"openldap2-back-meta~2.3.32~0.34.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-back-perl", rpm:"openldap2-back-perl~2.3.32~0.34.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-client", rpm:"openldap2-client~2.3.32~0.33.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-devel", rpm:"openldap2-devel~2.3.32~0.33.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openldap20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openldap20.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openldap20.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,95 @@
+#
+#VID slesp2-openldap2-5511
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenLDAP 2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65951);
+ script_cve_id("CVE-2008-2952");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenLDAP 2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openldap2
+    openldap2-back-meta
+    openldap2-back-perl
+    openldap2-client
+    openldap2-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenLDAP 2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openldap2", rpm:"openldap2~2.3.32~0.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-back-meta", rpm:"openldap2-back-meta~2.3.32~0.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-back-perl", rpm:"openldap2-back-perl~2.3.32~0.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-client", rpm:"openldap2-client~2.3.32~0.28", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openldap2-devel", rpm:"openldap2-devel~2.3.32~0.28", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_opensc.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_opensc.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_opensc.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-opensc-6053
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSC
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65910);
+ script_cve_id("CVE-2009-0368");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSC");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    opensc
+    opensc-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSC");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"opensc", rpm:"opensc~0.9.6~17.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"opensc-devel", rpm:"opensc-devel~0.9.6~17.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_opensc0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_opensc0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_opensc0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-opensc-5493
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for opensc
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65919);
+ script_cve_id("CVE-2008-2235");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for opensc");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    opensc
+    opensc-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for opensc");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"opensc", rpm:"opensc~0.9.6~17.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"opensc-devel", rpm:"opensc-devel~0.9.6~17.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_opensc1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_opensc1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_opensc1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-opensc-5910
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for opensc
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65925);
+ script_cve_id("CVE-2008-2235");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for opensc");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    opensc
+    opensc-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for opensc");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"opensc", rpm:"opensc~0.9.6~17.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"opensc-devel", rpm:"opensc-devel~0.9.6~17.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openslp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openslp.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openslp.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,85 @@
+#
+#VID slesp2-openslp-5980
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSLP
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65785);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSLP");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openslp
+    openslp-devel
+    openslp-server
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSLP");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openslp", rpm:"openslp~1.2.0~22.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openslp-devel", rpm:"openslp-devel~1.2.0~22.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openslp-server", rpm:"openslp-server~1.2.0~22.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openssh.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssh.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openssh.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-openssh-5627
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSSH
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65819);
+ script_cve_id("CVE-2008-4109");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSSH");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openssh
+    openssh-askpass
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSSH");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openssh", rpm:"openssh~4.2p1~18.38.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssh-askpass", rpm:"openssh-askpass~4.2p1~18.38.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openssh0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssh0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openssh0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-openssh-5122
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSSH
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65987);
+ script_cve_id("CVE-2008-1483");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSSH");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openssh
+    openssh-askpass
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSSH");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openssh", rpm:"openssh~4.2p1~18.36", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssh-askpass", rpm:"openssh-askpass~4.2p1~18.36", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openssl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssl.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openssl.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-openssl-5949
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for openssl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65767);
+ script_cve_id("CVE-2008-5077");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for openssl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openssl
+    openssl-devel
+    openssl-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for openssl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8a~18.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-devel", rpm:"openssl-devel~0.9.8a~18.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-doc", rpm:"openssl-doc~0.9.8a~18.27", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openssl0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssl0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openssl0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-openssl-6267
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSSL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65793);
+ script_cve_id("CVE-2009-1377", "CVE-2009-1378", "CVE-2009-1379");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSSL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openssl
+    openssl-devel
+    openssl-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSSL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8a~18.32", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-devel", rpm:"openssl-devel~0.9.8a~18.32", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-doc", rpm:"openssl-doc~0.9.8a~18.32", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openssl1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssl1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openssl1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-openssl-6179
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSSL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65890);
+ script_cve_id("CVE-2009-0590", "CVE-2009-0789");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSSL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openssl
+    openssl-devel
+    openssl-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSSL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8a~18.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-devel", rpm:"openssl-devel~0.9.8a~18.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-doc", rpm:"openssl-doc~0.9.8a~18.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openssl2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openssl2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openssl2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-openssl-6296
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for OpenSSL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65894);
+ script_cve_id("CVE-2009-1386", "CVE-2009-1387");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for OpenSSL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openssl
+    openssl-devel
+    openssl-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for OpenSSL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openssl", rpm:"openssl~0.9.8a~18.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-devel", rpm:"openssl-devel~0.9.8a~18.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openssl-doc", rpm:"openssl-doc~0.9.8a~18.34", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openswan.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openswan.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openswan.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-openswan-6478
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for openswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65823);
+ script_cve_id("CVE-2009-2661");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for openswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openswan
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for openswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openswan", rpm:"openswan~2.4.4~18.15.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openswan0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openswan0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openswan0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-openswan-6328
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for openswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65865);
+ script_cve_id("CVE-2009-2185");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for openswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openswan
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for openswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openswan", rpm:"openswan~2.4.4~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_openswan1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_openswan1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_openswan1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-openswan-6117
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for openswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65934);
+ script_cve_id("CVE-2009-0790");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for openswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    openswan
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for openswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"openswan", rpm:"openswan~2.4.4~18.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_pam_krb5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_pam_krb5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_pam_krb5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-pam_krb5-5616
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for pam_krb5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65952);
+ script_cve_id("CVE-2008-3825");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for pam_krb5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    pam_krb5
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for pam_krb5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"pam_krb5", rpm:"pam_krb5~2.2.3~18.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_pam_mount.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_pam_mount.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_pam_mount.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-pam_mount-5911
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for pam_mount
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65760);
+ script_cve_id("CVE-2008-5138");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for pam_mount");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    pam_mount
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for pam_mount");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"pam_mount", rpm:"pam_mount~0.18~29.20", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_pam_mount0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_pam_mount0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_pam_mount0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-pam_mount-5602
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for pam_mount
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65779);
+ script_cve_id("CVE-2008-3970");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for pam_mount");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    pam_mount
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for pam_mount");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"pam_mount", rpm:"pam_mount~0.18~29.17", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_pcre.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_pcre.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_pcre.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-pcre-4748
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for pcre
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65966);
+ script_cve_id("CVE-2006-7230");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for pcre");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    pcre
+    pcre-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for pcre");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"pcre", rpm:"pcre~6.4~14.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pcre-devel", rpm:"pcre-devel~6.4~14.15", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_perl-Net-DNS.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_perl-Net-DNS.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_perl-Net-DNS.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-perl-Net-DNS-4046
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for perl-Net-DNS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65981);
+ script_cve_id("CVE-2007-3377", "CVE-2007-3409");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for perl-Net-DNS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    perl-Net-DNS
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for perl-Net-DNS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl-Net-DNS", rpm:"perl-Net-DNS~0.55~12.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_perl-Tk.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_perl-Tk.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_perl-Tk.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-perl-Tk-5034
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for perl-Tk
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66007);
+ script_cve_id("CVE-2006-4484");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for perl-Tk");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    perl-Tk
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for perl-Tk");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl-Tk", rpm:"perl-Tk~804.027~15.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_perl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_perl.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_perl.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-perl-5444
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Perl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65768);
+ script_cve_id("CVE-2008-1927");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Perl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    perl
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Perl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl", rpm:"perl~5.8.8~14.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_perl0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_perl0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_perl0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-perl-4665
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for perl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65968);
+ script_cve_id("CVE-2007-5116");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for perl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    perl
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for perl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl", rpm:"perl~5.8.8~14.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_poppler.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_poppler.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_poppler.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-poppler-6315
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for poppler
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65775);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-0755", "CVE-2009-0756");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for poppler");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    poppler
+    poppler-glib
+    poppler-qt
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for poppler");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.4.4~19.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-glib", rpm:"poppler-glib~0.4.4~19.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-qt", rpm:"poppler-qt~0.4.4~19.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_poppler0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_poppler0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_poppler0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp1-poppler-5186
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for poppler
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65997);
+ script_cve_id("CVE-2008-1693");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for poppler");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    poppler
+    poppler-glib
+    poppler-qt
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for poppler");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.4.4~19.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-glib", rpm:"poppler-glib~0.4.4~19.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-qt", rpm:"poppler-qt~0.4.4~19.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_postfix.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postfix.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_postfix.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-postfix-5500
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Postfix
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65911);
+ script_cve_id("CVE-2008-2936", "CVE-2008-2937");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Postfix");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    postfix
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Postfix");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postfix", rpm:"postfix~2.2.9~10.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_postfix0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postfix0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_postfix0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp1-postfix-4520
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Postfix
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65957);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Postfix");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    postfix
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Postfix");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postfix", rpm:"postfix~2.2.9~10.23", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_postgresql-pl.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postgresql-pl.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_postgresql-pl.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp2-postgresql-pl-6208
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for postgresql-pl
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65868);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for postgresql-pl");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    postgresql-pl
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for postgresql-pl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~8.1.17~0.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_postgresql.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postgresql.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_postgresql.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-postgresql-6114
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PostgreSQL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65783);
+ script_cve_id("CVE-2009-0922");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PostgreSQL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    postgresql
+    postgresql-contrib
+    postgresql-devel
+    postgresql-docs
+    postgresql-libs
+    postgresql-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PostgreSQL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.1.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.1.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.1.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.1.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.1.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.1.17~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_postgresql0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postgresql0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_postgresql0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,103 @@
+#
+#VID slesp2-postgresql-6500
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PostgreSQL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65806);
+ script_cve_id("CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PostgreSQL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    postgresql
+    postgresql-contrib
+    postgresql-devel
+    postgresql-docs
+    postgresql-libs
+    postgresql-pl
+    postgresql-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PostgreSQL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.1.18~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_postgresql1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_postgresql1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_postgresql1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,103 @@
+#
+#VID slesp1-postgresql-4962
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PostgreSQL
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65971);
+ script_cve_id("CVE-2007-6600", "CVE-2007-4772", "CVE-2007-6067", "CVE-2007-4769", "CVE-2007-6601");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PostgreSQL");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    postgresql
+    postgresql-contrib
+    postgresql-devel
+    postgresql-docs
+    postgresql-libs
+    postgresql-pl
+    postgresql-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PostgreSQL");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.1.11~0.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_python.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_python.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_python.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,115 @@
+#
+#VID slesp2-python-5490
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Python
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65883);
+ script_cve_id("CVE-2008-1679", "CVE-2008-1887", "CVE-2008-3143", "CVE-2008-3142", "CVE-2008-3144", "CVE-2008-2315", "CVE-2008-2316");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Python");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    python
+    python-curses
+    python-demo
+    python-devel
+    python-doc
+    python-doc-pdf
+    python-gdbm
+    python-idle
+    python-tk
+    python-xml
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Python");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"python", rpm:"python~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-curses", rpm:"python-curses~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-demo", rpm:"python-demo~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-devel", rpm:"python-devel~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-doc", rpm:"python-doc~2.4.2~18.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-doc-pdf", rpm:"python-doc-pdf~2.4.2~18.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-gdbm", rpm:"python-gdbm~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-idle", rpm:"python-idle~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-tk", rpm:"python-tk~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xml", rpm:"python-xml~2.4.2~18.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_python0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_python0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_python0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,107 @@
+#
+#VID slesp2-python-5837
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Python
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65933);
+ script_cve_id("CVE-2008-4864", "CVE-2008-5031");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Python");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    python
+    python-curses
+    python-demo
+    python-devel
+    python-gdbm
+    python-idle
+    python-tk
+    python-xml
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Python");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"python", rpm:"python~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-curses", rpm:"python-curses~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-demo", rpm:"python-demo~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-devel", rpm:"python-devel~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-gdbm", rpm:"python-gdbm~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-idle", rpm:"python-idle~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-tk", rpm:"python-tk~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xml", rpm:"python-xml~2.4.2~18.25", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_python1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_python1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_python1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,115 @@
+#
+#VID slesp1-python-4902
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Python
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65960);
+ script_cve_id("CVE-2007-4965");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Python");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    python
+    python-curses
+    python-demo
+    python-devel
+    python-doc
+    python-doc-pdf
+    python-gdbm
+    python-idle
+    python-tk
+    python-xml
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Python");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"python", rpm:"python~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-curses", rpm:"python-curses~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-demo", rpm:"python-demo~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-devel", rpm:"python-devel~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-doc", rpm:"python-doc~2.4.2~18.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-doc-pdf", rpm:"python-doc-pdf~2.4.2~18.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-gdbm", rpm:"python-gdbm~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-idle", rpm:"python-idle~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-tk", rpm:"python-tk~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xml", rpm:"python-xml~2.4.2~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_quagga.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_quagga.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_quagga.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-quagga-6240
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for quagga
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65862);
+ script_cve_id("CVE-2009-1572");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for quagga");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    quagga
+    quagga-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for quagga");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"quagga", rpm:"quagga~0.99.9~14.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"quagga-devel", rpm:"quagga-devel~0.99.9~14.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_rsh.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_rsh.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_rsh.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,81 @@
+#
+#VID slesp2-rsh-5589
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for rsh
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65820);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for rsh");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    rsh
+    rsh-server
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for rsh");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rsh", rpm:"rsh~0.17~573.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rsh-server", rpm:"rsh-server~0.17~573.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_rsync.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_rsync.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_rsync.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-rsync-4798
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for rsync
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65976);
+ script_cve_id("CVE-2007-6199", "CVE-2007-6200");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for rsync");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    rsync
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for rsync");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rsync", rpm:"rsync~2.6.8~36.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_squid.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_squid.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_squid.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-squid-5301
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Squid
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65931);
+ script_cve_id("CVE-2008-1612");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Squid");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    squid
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Squid");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"squid", rpm:"squid~2.5.STABLE12~18.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_squid0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_squid0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_squid0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-squid-4782
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for squid
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65970);
+ script_cve_id("CVE-2007-6239");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for squid");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    squid
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for squid");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"squid", rpm:"squid~2.5.STABLE12~18.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_star.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_star.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_star.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-star-4174
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for star
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65995);
+ script_cve_id("CVE-2007-4131");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for star");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    star
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for star");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"star", rpm:"star~1.5a70~12.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_strongswan.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_strongswan.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_strongswan.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-strongswan-6116
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for strongswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65758);
+ script_cve_id("CVE-2009-0790");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for strongswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    strongswan
+    strongswan-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for strongswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"strongswan", rpm:"strongswan~4.1.10~0.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"strongswan-doc", rpm:"strongswan-doc~4.1.10~0.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_strongswan0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_strongswan0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_strongswan0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-strongswan-6480
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for strongswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65799);
+ script_cve_id("CVE-2009-2661");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for strongswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    strongswan
+    strongswan-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for strongswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"strongswan", rpm:"strongswan~4.1.10~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"strongswan-doc", rpm:"strongswan-doc~4.1.10~0.14", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_strongswan1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_strongswan1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_strongswan1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-strongswan-6327
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for strongswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65802);
+ script_cve_id("CVE-2009-2185");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for strongswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    strongswan
+    strongswan-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for strongswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"strongswan", rpm:"strongswan~4.1.10~0.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"strongswan-doc", rpm:"strongswan-doc~4.1.10~0.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_strongswan2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_strongswan2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_strongswan2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-strongswan-6286
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for strongswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65833);
+ script_cve_id("CVE-2009-1957", "CVE-2009-1958");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for strongswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    strongswan
+    strongswan-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for strongswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"strongswan", rpm:"strongswan~4.1.10~0.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"strongswan-doc", rpm:"strongswan-doc~4.1.10~0.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_strongswan3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_strongswan3.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_strongswan3.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-strongswan-5693
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for strongswan
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65848);
+ script_cve_id("CVE-2008-4551");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for strongswan");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    strongswan
+    strongswan-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for strongswan");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"strongswan", rpm:"strongswan~4.1.10~0.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"strongswan-doc", rpm:"strongswan-doc~4.1.10~0.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_struts.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_struts.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_struts.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,89 @@
+#
+#VID slesp2-struts-6122
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Java Struts
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65898);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Java Struts");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    struts
+    struts-javadoc
+    struts-manual
+    struts-webapps-tomcat5
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Java Struts");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"struts", rpm:"struts~1.2.4~23.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"struts-javadoc", rpm:"struts-javadoc~1.2.4~23.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"struts-manual", rpm:"struts-manual~1.2.4~23.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"struts-webapps-tomcat5", rpm:"struts-webapps-tomcat5~1.2.4~23.9", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_t1lib.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_t1lib.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_t1lib.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-t1lib-4588
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for t1lib
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65961);
+ script_cve_id("CVE-2007-4033");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for t1lib");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    t1lib
+    t1lib-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for t1lib");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"t1lib", rpm:"t1lib~1.3.1~585.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"t1lib-devel", rpm:"t1lib-devel~1.3.1~585.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tcpdump.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tcpdump.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tcpdump.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-tcpdump-4037
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for tcpdump
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65965);
+ script_cve_id("CVE-2007-3798");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for tcpdump");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tcpdump
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for tcpdump");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tcpdump", rpm:"tcpdump~3.9.4~14.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tk.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tk.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tk.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp1-tk-4974
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Tk
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65982);
+ script_cve_id("CVE-2008-0553");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Tk");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tk
+    tk-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Tk");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tk", rpm:"tk~8.4.12~14.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tk-devel", rpm:"tk-devel~8.4.12~14.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tomcat5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tomcat5.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tomcat5.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-tomcat5-5955
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Tomcat 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65761);
+ script_cve_id("CVE-2006-3835");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Tomcat 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tomcat5
+    tomcat5-admin-webapps
+    tomcat5-webapps
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Tomcat 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat5", rpm:"tomcat5~5.0.30~27.35", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-admin-webapps", rpm:"tomcat5-admin-webapps~5.0.30~27.35", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-webapps", rpm:"tomcat5-webapps~5.0.30~27.35", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tomcat50.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tomcat50.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tomcat50.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-tomcat5-5689
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Tomcat 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65813);
+ script_cve_id("CVE-2008-3271");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Tomcat 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tomcat5
+    tomcat5-admin-webapps
+    tomcat5-webapps
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Tomcat 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat5", rpm:"tomcat5~5.0.30~27.32", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-admin-webapps", rpm:"tomcat5-admin-webapps~5.0.30~27.32", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-webapps", rpm:"tomcat5-webapps~5.0.30~27.32", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tomcat51.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tomcat51.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tomcat51.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-tomcat5-5539
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Tomcat 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65854);
+ script_cve_id("CVE-2008-2938");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Tomcat 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tomcat5
+    tomcat5-admin-webapps
+    tomcat5-webapps
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Tomcat 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat5", rpm:"tomcat5~5.0.30~27.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-admin-webapps", rpm:"tomcat5-admin-webapps~5.0.30~27.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-webapps", rpm:"tomcat5-webapps~5.0.30~27.30", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tomcat52.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tomcat52.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tomcat52.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp2-tomcat5-6352
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Tomcat 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65877);
+ script_cve_id("CVE-2008-5515", "CVE-2009-0033", "CVE-2009-0580", "CVE-2009-0781", "CVE-2009-0783");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Tomcat 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tomcat5
+    tomcat5-admin-webapps
+    tomcat5-webapps
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Tomcat 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat5", rpm:"tomcat5~5.0.30~27.40", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-admin-webapps", rpm:"tomcat5-admin-webapps~5.0.30~27.40", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-webapps", rpm:"tomcat5-webapps~5.0.30~27.40", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_tomcat53.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_tomcat53.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_tomcat53.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,87 @@
+#
+#VID slesp1-tomcat5-5070
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Tomcat 5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65993);
+ script_cve_id("CVE-2007-2449", "CVE-2007-1858");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Tomcat 5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    tomcat5
+    tomcat5-admin-webapps
+    tomcat5-webapps
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Tomcat 5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"tomcat5", rpm:"tomcat5~5.0.30~27.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-admin-webapps", rpm:"tomcat5-admin-webapps~5.0.30~27.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tomcat5-webapps", rpm:"tomcat5-webapps~5.0.30~27.26", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_udev.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_udev.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_udev.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-udev-6203
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for udev
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65817);
+ script_cve_id("CVE-2009-1185");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for udev");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    udev
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for udev");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"udev", rpm:"udev~085~30.54", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_udev0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_udev0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_udev0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-udev-6153
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for udev
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65831);
+ script_cve_id("CVE-2009-1185");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for udev");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    udev
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for udev");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"udev", rpm:"udev~085~30.52", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_unzip.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_unzip.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_unzip.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp1-unzip-4977
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for unzip
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66003);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for unzip");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    unzip
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for unzip");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"unzip", rpm:"unzip~5.52~16.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_update-test-sec.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_update-test-sec.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_update-test-sec.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp2-update-test-security-5026
+# OpenVAS Vulnerability Test
+# $
+# Description: undocumented patch for 4acd101addd2ea93972eb5d9389cadf3
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65855);
+ script_version ("$Revision$");
+ script_name("SLES10: undocumented patch for 4acd101addd2ea93972eb5d9389cadf3");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    update-test-security
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: undocumented patch for 4acd101addd2ea93972eb5d9389cadf3");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"update-test-security", rpm:"update-test-security~99.99~1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_vsftpd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_vsftpd.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_vsftpd.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-vsftpd-5388
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for vsftpd
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65857);
+ script_cve_id("CVE-2008-2375");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for vsftpd");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    vsftpd
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for vsftpd");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"vsftpd", rpm:"vsftpd~2.0.4~19.18", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_websphere-as_ce.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-websphere-as_ce-6312
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Websphere Community Edition
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65766);
+ script_cve_id("CVE-2008-5518", "CVE-2009-0038", "CVE-2009-0039", "CVE-2009-0781");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Websphere Community Edition");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    websphere-as_ce
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Websphere Community Edition");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"websphere-as_ce", rpm:"websphere-as_ce~2.1.1.2~0.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_websphere-as_ce0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_websphere-as_ce0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_websphere-as_ce0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-websphere-as_ce-5850
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Websphere Community Edition
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65836);
+ script_cve_id("CVE-2007-0184", "CVE-2007-0185", "CVE-2007-2377", "CVE-2007-2449", "CVE-2007-2450", "CVE-2007-3382", "CVE-2007-3385", "CVE-2007-3386", "CVE-2007-5333", "CVE-2007-5342", "CVE-2007-5461", "CVE-2007-5613", "CVE-2007-5615", "CVE-2007-6286", "CVE-2008-0002", "CVE-2008-1232", "CVE-2008-1947", "CVE-2008-2370", "CVE-2008-2938");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Websphere Community Edition");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    websphere-as_ce
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Websphere Community Edition");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"websphere-as_ce", rpm:"websphere-as_ce~2.1.0.1~3.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_wget.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_wget.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_wget.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,77 @@
+#
+#VID slesp2-wget-6426
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for wget
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65895);
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for wget");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    wget
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for wget");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"wget", rpm:"wget~1.10.2~15.11", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xerces-j2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xerces-j2.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xerces-j2.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,107 @@
+#
+#VID slesp2-xerces-j2-6449
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Xerces-j2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65850);
+ script_cve_id("CVE-2009-2625");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Xerces-j2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xerces-j2
+    xerces-j2-demo
+    xerces-j2-javadoc-apis
+    xerces-j2-javadoc-dom3
+    xerces-j2-javadoc-impl
+    xerces-j2-javadoc-other
+    xerces-j2-javadoc-xni
+    xerces-j2-scripts
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Xerces-j2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xerces-j2", rpm:"xerces-j2~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-demo", rpm:"xerces-j2-demo~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-apis", rpm:"xerces-j2-javadoc-apis~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-dom3", rpm:"xerces-j2-javadoc-dom3~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-impl", rpm:"xerces-j2-javadoc-impl~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-other", rpm:"xerces-j2-javadoc-other~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-javadoc-xni", rpm:"xerces-j2-javadoc-xni~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xerces-j2-scripts", rpm:"xerces-j2-scripts~2.7.1~16.7", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xntp.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xntp.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xntp.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-xntp-6232
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xntp
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65773);
+ script_cve_id("CVE-2009-1252", "CVE-2009-0159");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xntp");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xntp
+    xntp-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xntp");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xntp", rpm:"xntp~4.2.4p3~48.13.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xntp-doc", rpm:"xntp-doc~4.2.4p3~48.13.3", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xntp0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xntp0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xntp0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,83 @@
+#
+#VID slesp2-xntp-6072
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xntp
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65948);
+ script_cve_id("CVE-2009-0021");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xntp");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xntp
+    xntp-doc
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xntp");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xntp", rpm:"xntp~4.2.4p3~48.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xntp-doc", rpm:"xntp-doc~4.2.4p3~48.10", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xorg-x11-Xnest.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-xorg-x11-Xnest-5321
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for X.org
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65763);
+ script_cve_id("CVE-2008-2360", "CVE-2008-2361", "CVE-2008-2362", "CVE-2008-1379", "CVE-2008-1377");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for X.org");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xorg-x11-Xnest
+    xorg-x11-Xvfb
+    xorg-x11-Xvnc
+    xorg-x11-server
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for X.org");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xorg-x11-Xnest", rpm:"xorg-x11-Xnest~6.9.0~50.60", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xorg-x11-Xvfb", rpm:"xorg-x11-Xvfb~6.9.0~50.60", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xorg-x11-Xvnc", rpm:"xorg-x11-Xvnc~6.9.0~50.60", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xorg-x11-server", rpm:"xorg-x11-server~6.9.0~50.60", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xpdf.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xpdf.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xpdf.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-xpdf-6177
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xpdf
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65810);
+ script_cve_id("CVE-2009-0165", "CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xpdf");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xpdf-tools
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xpdf");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.01~21.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xpdf0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xpdf0.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xpdf0.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-xpdf-6378
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xpdf
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65942);
+ script_cve_id("CVE-2009-0791");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xpdf");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xpdf-tools
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xpdf");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.01~21.19", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xpdf1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xpdf1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xpdf1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp1-xpdf-4644
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xpdf
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65958);
+ script_cve_id("CVE-2007-4352", "CVE-2007-5392", "CVE-2007-5393");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xpdf");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xpdf-tools
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xpdf");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.01~21.13", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xscreensaver.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xscreensaver.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xscreensaver.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-xscreensaver-5334
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xscreensaver
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65837);
+ script_cve_id("CVE-2008-1683");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xscreensaver");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xscreensaver
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xscreensaver");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xscreensaver", rpm:"xscreensaver~4.23~20.12", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_xterm.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_xterm.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_xterm.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-xterm-5898
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for xterm
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65947);
+ script_cve_id("CVE-2008-2383");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for xterm");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    xterm
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for xterm");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xterm", rpm:"xterm~208~14.6", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_yast2-backup.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_yast2-backup.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/sles10_yast2-backup.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,79 @@
+#
+#VID slesp2-yast2-backup-5760
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for yast2-backup
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(65921);
+ script_cve_id("CVE-2008-4636");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for yast2-backup");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    yast2-backup
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for yast2-backup");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"yast2-backup", rpm:"yast2-backup~2.13.6~0.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_841_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_841_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ubuntu_841_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,143 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-841-1 (glib2.0)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65748);
+ script_cve_id("CVE-2009-3289");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-841-1 (glib2.0)");
+
+ desc = "
+The remote host is missing an update to glib2.0
+announced via advisory USN-841-1.
+
+Details follow:
+
+Arand Nash discovered that applications linked to GLib (e.g. Nautilus)
+did not correctly copy symlinks.  If a user copied symlinks with GLib,
+the symlink target files would become world-writable, allowing local
+attackers to gain access to potentially sensitive information.
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 8.04 LTS:
+  libglib2.0-0                    2.16.6-0ubuntu1.2
+
+Ubuntu 8.10:
+  libglib2.0-0                    2.18.2-0ubuntu2.2
+
+Ubuntu 9.04:
+  libglib2.0-0                    2.20.1-0ubuntu2.1
+
+After a standard system upgrade you need to restart your session to effect
+the necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-841-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-841-1 (glib2.0)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libglib2.0-doc", ver:"2.16.6-0ubuntu1.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-data", ver:"2.16.6-0ubuntu1.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-0-dbg", ver:"2.16.6-0ubuntu1.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-0", ver:"2.16.6-0ubuntu1.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-dev", ver:"2.16.6-0ubuntu1.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgio-fam", ver:"2.16.6-0ubuntu1.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-data", ver:"2.18.2-0ubuntu2.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-doc", ver:"2.18.2-0ubuntu2.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-0-dbg", ver:"2.18.2-0ubuntu2.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-0", ver:"2.18.2-0ubuntu2.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-dev", ver:"2.18.2-0ubuntu2.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgio-fam", ver:"2.18.2-0ubuntu2.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-data", ver:"2.20.1-0ubuntu2.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-doc", ver:"2.20.1-0ubuntu2.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-0-dbg", ver:"2.20.1-0ubuntu2.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-0", ver:"2.20.1-0ubuntu2.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libglib2.0-dev", ver:"2.20.1-0ubuntu2.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libgio-fam", ver:"2.20.1-0ubuntu2.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_842_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_842_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ubuntu_842_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,101 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-842-1 (wget)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65749);
+ script_cve_id("CVE-2009-3490");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-842-1 (wget)");
+
+ desc = "
+The remote host is missing an update to wget
+announced via advisory USN-842-1.
+
+Details follow:
+
+It was discovered that Wget did not correctly handle SSL certificates with
+zero bytes in the Common Name. A remote attacker could exploit this to
+perform a man in the middle attack to view sensitive information or alter
+encrypted communications.
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 8.04 LTS:
+  libglib2.0-0                    2.16.6-0ubuntu1.2
+
+Ubuntu 8.10:
+  libglib2.0-0                    2.18.2-0ubuntu2.2
+
+Ubuntu 9.04:
+  libglib2.0-0                    2.20.1-0ubuntu2.1
+
+After a standard system upgrade you need to restart your session to effect
+the necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-842-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-842-1 (wget)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"wget", ver:"1.10.2-1ubuntu1.1", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wget", ver:"1.10.2-3ubuntu1.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wget", ver:"1.11.4-1ubuntu1.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"wget", ver:"1.11.4-2ubuntu1.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_843_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_843_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ubuntu_843_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,99 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-843-1 (backuppc)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65750);
+ script_cve_id("CVE-2009-3369");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-843-1 (backuppc)");
+
+ desc = "
+The remote host is missing an update to backuppc
+announced via advisory USN-843-1.
+
+Details follow:
+
+It was discovered that BackupPC did not restrict normal users from setting
+the ClientNameAlias parameter. An authenticated user could exploit this to
+gain access to unauthorized hosts. This update fixed the issue by
+preventing normal users from modifying the ClientNameAlias configuration
+parameter.
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 8.04 LTS:
+  backuppc                        3.0.0-4ubuntu1.1
+
+Ubuntu 8.10:
+  backuppc                        3.1.0-3ubuntu2.1
+
+Ubuntu 9.04:
+  backuppc                        3.1.0-4ubuntu1.1
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-843-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-843-1 (backuppc)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"backuppc", ver:"3.0.0-4ubuntu1.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"backuppc", ver:"3.1.0-3ubuntu2.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"backuppc", ver:"3.1.0-4ubuntu1.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_844_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_844_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ubuntu_844_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,101 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-844-1 (mimetex)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65751);
+ script_cve_id("CVE-2009-1382", "CVE-2009-2459");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-844-1 (mimetex)");
+
+ desc = "
+The remote host is missing an update to mimetex
+announced via advisory USN-844-1.
+
+Details follow:
+
+Chris Evans discovered that mimeTeX incorrectly handled certain long tags.
+An attacker could exploit this with a crafted mimeTeX expression and cause
+a denial of service or possibly execute arbitrary code. (CVE-2009-1382)
+
+Chris Evans discovered that mimeTeX contained certain directives that may
+be unsuitable for handling untrusted user input. This update fixed the
+issue by disabling the \input and \counter tags. (CVE-2009-2459)
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 8.04 LTS:
+  mimetex                         1.50-1ubuntu0.8.04.1
+
+Ubuntu 8.10:
+  mimetex                         1.50-1ubuntu0.8.10.1
+
+Ubuntu 9.04:
+  mimetex                         1.50-1ubuntu0.9.04.1
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-844-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-844-1 (mimetex)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"mimetex", ver:"1.50-1ubuntu0.8.04.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mimetex", ver:"1.50-1ubuntu0.8.10.1", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mimetex", ver:"1.50-1ubuntu0.9.04.1", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_845_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_845_1.nasl	2009-10-13 16:16:42 UTC (rev 5518)
+++ trunk/openvas-plugins/scripts/ubuntu_845_1.nasl	2009-10-13 16:25:40 UTC (rev 5519)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-845-1 (pan)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(65752);
+ script_cve_id("CVE-2008-2363");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-845-1 (pan)");
+
+ desc = "
+The remote host is missing an update to pan
+announced via advisory USN-845-1.
+
+Details follow:
+
+Pavel Polischouk discovered that Pan incorrectly handled certain data
+structures. If a user were tricked into viewing malicious nntp data, a
+remote attacker could cause a denial of service or possibly execute
+arbitrary code with the privileges of the user invoking the program.
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 8.04 LTS:
+  pan                             0.132-2ubuntu2.1
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-845-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-845-1 (pan)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"pan", ver:"0.132-2ubuntu2.1", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list