[Openvas-commits] r5628 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Oct 19 21:50:26 CEST 2009


Author: reinke
Date: 2009-10-19 21:50:22 +0200 (Mon, 19 Oct 2009)
New Revision: 5628

Added:
   trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1505.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl
   trunk/openvas-plugins/scripts/RHSA_2009_1513.nasl
   trunk/openvas-plugins/scripts/deb_1895_2.nasl
   trunk/openvas-plugins/scripts/deb_1905_1.nasl
   trunk/openvas-plugins/scripts/deb_1907_1.nasl
   trunk/openvas-plugins/scripts/deb_1908_1.nasl
   trunk/openvas-plugins/scripts/deb_1909_1.nasl
   trunk/openvas-plugins/scripts/deb_1910_1.nasl
   trunk/openvas-plugins/scripts/deb_1911_1.nasl
   trunk/openvas-plugins/scripts/deb_1912_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10252.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10262.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10285.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10385.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10390.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10432.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10439.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10445.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10466.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10484.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10510.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10520.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10525.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10530.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10539.nasl
   trunk/openvas-plugins/scripts/freebsd_php55.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl
   trunk/openvas-plugins/scripts/freebsd_py23-django1.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_263.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_264.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_265.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_266.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_267.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_268.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_269.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_270.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_271.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_272.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_273.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_274.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_275.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_276.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_277.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_278.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_279.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl
   trunk/openvas-plugins/scripts/sles11_apache2-mod_php1.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl
   trunk/openvas-plugins/scripts/ubuntu_848_1.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/ChangeLog	2009-10-19 19:50:22 UTC (rev 5628)
@@ -1,3 +1,66 @@
+2009-10-19  Thomas Reinke <reinke at securityspace.com>
+
+	scripts/deb_1895_2.nasl,
+	scripts/deb_1905_1.nasl,
+	scripts/deb_1907_1.nasl,
+	scripts/deb_1908_1.nasl,
+	scripts/deb_1909_1.nasl,
+	scripts/deb_1910_1.nasl,
+	scripts/deb_1911_1.nasl,
+	scripts/deb_1912_1.nasl,
+	scripts/freebsd_php55.nasl,
+	scripts/freebsd_phpMyAdmin20.nasl,
+	scripts/freebsd_py23-django1.nasl,
+	scripts/suse_sr_2009_016.nasl,
+	scripts/ubuntu_848_1.nasl,
+	scripts/mdksa_2009_263.nasl,
+	scripts/mdksa_2009_264.nasl,
+	scripts/mdksa_2009_265.nasl,
+	scripts/mdksa_2009_266.nasl,
+	scripts/mdksa_2009_267.nasl,
+	scripts/mdksa_2009_268.nasl,
+	scripts/mdksa_2009_269.nasl,
+	scripts/mdksa_2009_270.nasl,
+	scripts/mdksa_2009_271.nasl,
+	scripts/mdksa_2009_272.nasl,
+	scripts/mdksa_2009_273.nasl,
+	scripts/mdksa_2009_274.nasl,
+	scripts/mdksa_2009_275.nasl,
+	scripts/mdksa_2009_276.nasl,
+	scripts/mdksa_2009_277.nasl,
+	scripts/mdksa_2009_278.nasl,
+	scripts/mdksa_2009_279.nasl,
+	scripts/RHSA_2009_1499.nasl,
+	scripts/RHSA_2009_1500.nasl,
+	scripts/RHSA_2009_1501.nasl,
+	scripts/RHSA_2009_1502.nasl,
+	scripts/RHSA_2009_1503.nasl,
+	scripts/RHSA_2009_1504.nasl,
+	scripts/RHSA_2009_1505.nasl,
+	scripts/RHSA_2009_1512.nasl,
+	scripts/RHSA_2009_1513.nasl,
+	scripts/fcore_2009_10252.nasl,
+	scripts/fcore_2009_10262.nasl,
+	scripts/fcore_2009_10285.nasl,
+	scripts/fcore_2009_10385.nasl,
+	scripts/fcore_2009_10390.nasl,
+	scripts/fcore_2009_10432.nasl,
+	scripts/fcore_2009_10439.nasl,
+	scripts/fcore_2009_10445.nasl,
+	scripts/fcore_2009_10466.nasl,
+	scripts/fcore_2009_10484.nasl,
+	scripts/fcore_2009_10510.nasl,
+	scripts/fcore_2009_10520.nasl,
+	scripts/fcore_2009_10525.nasl,
+	scripts/fcore_2009_10530.nasl,
+	scripts/fcore_2009_10539.nasl,
+	scripts/ovcesa2009_1500.nasl,
+	scripts/ovcesa2009_1501.nasl,
+	scripts/ovcesa2009_1503.nasl,
+	scripts/ovcesa2009_1512.nasl,
+	scripts/sles11_apache2-mod_php1.nasl:
+	New scripts.
+
 2009-10-19  Michael Meyer <michael.meyer at intevation.de>
 
 	* scripts/byte_func.inc:
@@ -9,7 +72,7 @@
 	Testing a socket with 'isnull()' sometimes doesn't work as
 	expected.
 
-2009-10-13  Thomas Reinke <reinke at securityspace.com>
+2009-10-19  Thomas Reinke <reinke at securityspace.com>
 	* scripts/backport.inc:
 	Bugfix. Actually, more like limiting damage.
 

Added: trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1499.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,114 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1499 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66010);
+ script_cve_id("CVE-2009-2979", "CVE-2009-2980", "CVE-2009-2981", "CVE-2009-2983", "CVE-2009-2985", "CVE-2009-2986", "CVE-2009-2988", "CVE-2009-2990", "CVE-2009-2991", "CVE-2009-2993", "CVE-2009-2994", "CVE-2009-2996", "CVE-2009-2997", "CVE-2009-2998", "CVE-2009-3431", "CVE-2009-3458", "CVE-2009-3459", "CVE-2009-3462");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1499");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1499.
+
+Adobe Reader allows users to view and print documents in Portable Document
+Format (PDF).
+
+Multiple flaws were discovered in Adobe Reader. A specially-crafted PDF
+file could cause Adobe Reader to crash or, potentially, execute arbitrary
+code as the user running Adobe Reader when opened. (CVE-2009-2980,
+CVE-2009-2983, CVE-2009-2985, CVE-2009-2986, CVE-2009-2990, CVE-2009-2991,
+CVE-2009-2993, CVE-2009-2994, CVE-2009-2996, CVE-2009-2997, CVE-2009-2998,
+CVE-2009-3458, CVE-2009-3459, CVE-2009-3462)
+
+Multiple flaws were discovered in Adobe Reader. A specially-crafted PDF
+file could cause Adobe Reader to crash when opened. (CVE-2009-2979,
+CVE-2009-2988, CVE-2009-3431)
+
+An input validation flaw was found in Adobe Reader. Opening a
+specially-crafted PDF file could lead to a Trust Manager restrictions
+bypass. (CVE-2009-2981)
+
+All Adobe Reader users should install these updated packages. They contain
+Adobe Reader version 8.1.7, which is not vulnerable to these issues. All
+running instances of Adobe Reader must be restarted for the update to take
+effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1499.html
+http://www.redhat.com/security/updates/classification/#critical
+http://www.adobe.com/support/security/bulletins/apsb09-15.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1499");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~1", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread-plugin", rpm:"acroread-plugin~8.1.7~1", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread-plugin", rpm:"acroread-plugin~8.1.7~1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread-plugin", rpm:"acroread-plugin~8.1.7~1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1500.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1500 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66012);
+ script_cve_id("CVE-2009-0791", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1500");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1500.
+
+Xpdf is an X Window System based viewer for Portable Document Format (PDF)
+files.
+
+Multiple integer overflow flaws were found in Xpdf. An attacker could
+create a malicious PDF file that would cause Xpdf to crash or, potentially,
+execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-3604,
+CVE-2009-3606, CVE-2009-3609)
+
+Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604
+issue.
+
+Users are advised to upgrade to this updated package, which contains a
+backported patch to correct these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1500.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1500");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~2.02~17.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-debuginfo", rpm:"xpdf-debuginfo~2.02~17.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1501.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1501 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66013);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1501");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1501.
+
+Xpdf is an X Window System based viewer for Portable Document Format (PDF)
+files.
+
+Multiple integer overflow flaws were found in Xpdf. An attacker could
+create a malicious PDF file that would cause Xpdf to crash or, potentially,
+execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188,
+CVE-2009-3604, CVE-2009-3606, CVE-2009-3608, CVE-2009-3609)
+
+Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604
+issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.
+
+Users are advised to upgrade to this updated package, which contains a
+backported patch to correct these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1501.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1501");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.00~22.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-debuginfo", rpm:"xpdf-debuginfo~3.00~22.el4_8.1", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1502.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,96 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1502 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66014);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1502");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1502.
+
+The kdegraphics packages contain applications for the K Desktop
+Environment, including KPDF, a viewer for Portable Document Format (PDF)
+files.
+
+Multiple integer overflow flaws were found in KPDF. An attacker could
+create a malicious PDF file that would cause KPDF to crash or, potentially,
+execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188,
+CVE-2009-3604, CVE-2009-3606, CVE-2009-3608, CVE-2009-3609)
+
+Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604
+issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.
+
+Users are advised to upgrade to these updated packages, which contain a
+backported patch to resolve these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1502.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1502");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics", rpm:"kdegraphics~3.5.4~15.el5_4.2", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-debuginfo", rpm:"kdegraphics-debuginfo~3.5.4~15.el5_4.2", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-devel", rpm:"kdegraphics-devel~3.5.4~15.el5_4.2", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1503.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1503 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66015);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1503");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1503.
+
+GPdf is a viewer for Portable Document Format (PDF) files.
+
+Multiple integer overflow flaws were found in GPdf. An attacker could
+create a malicious PDF file that would cause GPdf to crash or, potentially,
+execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188,
+CVE-2009-3604, CVE-2009-3608, CVE-2009-3609)
+
+Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604
+issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.
+
+Users are advised to upgrade to this updated package, which contains a
+backported patch to correct these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1503.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1503");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gpdf", rpm:"gpdf~2.8.2~7.7.2.el4_8.5", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gpdf-debuginfo", rpm:"gpdf-debuginfo~2.8.2~7.7.2.el4_8.5", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1504.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,102 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1504 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66016);
+ script_cve_id("CVE-2009-3603", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1504");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1504.
+
+Poppler is a Portable Document Format (PDF) rendering library, used by
+applications such as Evince.
+
+Multiple integer overflow flaws were found in poppler. An attacker could
+create a malicious PDF file that would cause applications that use poppler
+(such as Evince) to crash or, potentially, execute arbitrary code when
+opened. (CVE-2009-3603, CVE-2009-3608, CVE-2009-3609)
+
+Red Hat would like to thank Chris Rohlf for reporting the CVE-2009-3608
+issue.
+
+This update also corrects a regression introduced in the previous poppler
+security update, RHSA-2009:0480, that prevented poppler from rendering
+certain PDF documents correctly. (BZ#528147)
+
+Users are advised to upgrade to these updated packages, which contain
+backported patches to resolve these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1504.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1504");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.5.4~4.4.el5_4.11", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-debuginfo", rpm:"poppler-debuginfo~0.5.4~4.4.el5_4.11", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-utils", rpm:"poppler-utils~0.5.4~4.4.el5_4.11", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler-devel", rpm:"poppler-devel~0.5.4~4.4.el5_4.11", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1505.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1505.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1505.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,145 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1505 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66011);
+ script_cve_id("CVE-2008-5349", "CVE-2009-2625");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1505");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1505.
+
+The IBM 1.4.2 SR13-FP1 Java release includes the IBM Java 2 Runtime
+Environment and the IBM Java 2 Software Development Kit.
+
+This update fixes two vulnerabilities in the IBM Java 2 Runtime Environment
+and the IBM Java 2 Software Development Kit. These vulnerabilities are
+summarized on the IBM Security alerts page listed in the References
+section. (CVE-2008-5349, CVE-2009-2625)
+
+All users of java-1.4.2-ibm are advised to upgrade to these updated
+packages, which contain the IBM 1.4.2 SR13-FP1 Java release. All running
+instances of IBM Java must be restarted for this update to take effect.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1505.html
+http://www.redhat.com/security/updates/classification/#moderate
+http://www.ibm.com/developerworks/java/jdk/alerts/
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1505");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"java-1.4.2-ibm", rpm:"java-1.4.2-ibm~1.4.2.13.1~1jpp.1.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-demo", rpm:"java-1.4.2-ibm-demo~1.4.2.13.1~1jpp.1.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-devel", rpm:"java-1.4.2-ibm-devel~1.4.2.13.1~1jpp.1.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-jdbc", rpm:"java-1.4.2-ibm-jdbc~1.4.2.13.1~1jpp.1.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-plugin", rpm:"java-1.4.2-ibm-plugin~1.4.2.13.1~1jpp.1.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-src", rpm:"java-1.4.2-ibm-src~1.4.2.13.1~1jpp.1.el3", rls:"RHENT_3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm", rpm:"java-1.4.2-ibm~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-demo", rpm:"java-1.4.2-ibm-demo~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-devel", rpm:"java-1.4.2-ibm-devel~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-javacomm", rpm:"java-1.4.2-ibm-javacomm~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-jdbc", rpm:"java-1.4.2-ibm-jdbc~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-plugin", rpm:"java-1.4.2-ibm-plugin~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-src", rpm:"java-1.4.2-ibm-src~1.4.2.13.1~1jpp.1.el4", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm", rpm:"java-1.4.2-ibm~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-demo", rpm:"java-1.4.2-ibm-demo~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-devel", rpm:"java-1.4.2-ibm-devel~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-javacomm", rpm:"java-1.4.2-ibm-javacomm~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-jdbc", rpm:"java-1.4.2-ibm-jdbc~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-plugin", rpm:"java-1.4.2-ibm-plugin~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1.4.2-ibm-src", rpm:"java-1.4.2-ibm-src~1.4.2.13.1~1jpp.1.el5", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1512.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,96 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1512 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66017);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1512");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1512.
+
+The kdegraphics packages contain applications for the K Desktop
+Environment, including KPDF, a viewer for Portable Document Format (PDF)
+files.
+
+Multiple integer overflow flaws were found in KPDF. An attacker could
+create a malicious PDF file that would cause KPDF to crash or, potentially,
+execute arbitrary code when opened. (CVE-2009-0791, CVE-2009-1188,
+CVE-2009-3604, CVE-2009-3608, CVE-2009-3609)
+
+Red Hat would like to thank Adam Zabrocki for reporting the CVE-2009-3604
+issue, and Chris Rohlf for reporting the CVE-2009-3608 issue.
+
+Users are advised to upgrade to these updated packages, which contain a
+backported patch to resolve these issues.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1512.html
+http://www.redhat.com/security/updates/classification/#important
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1512");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics", rpm:"kdegraphics~3.3.1~15.el4_8.2", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-debuginfo", rpm:"kdegraphics-debuginfo~3.3.1~15.el4_8.2", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-devel", rpm:"kdegraphics-devel~3.3.1~15.el4_8.2", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/RHSA_2009_1513.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1513.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1513.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,103 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1513 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66018);
+ script_cve_id("CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1513");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1513.
+
+The Common UNIX Printing System (CUPS) provides a portable printing layer
+for UNIX operating systems. The CUPS pdftops filter converts Portable
+Document Format (PDF) files to PostScript.
+
+Two integer overflow flaws were found in the CUPS pdftops filter. An
+attacker could create a malicious PDF file that would cause pdftops to
+crash or, potentially, execute arbitrary code as the lp user if the file
+was printed. (CVE-2009-3608, CVE-2009-3609)
+
+Red Hat would like to thank Chris Rohlf for reporting the CVE-2009-3608
+issue.
+
+Users of cups are advised to upgrade to these updated packages, which
+contain a backported patch to correct these issues. After installing the
+update, the cupsd daemon will be restarted automatically.
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1513.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1513");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.3.7~11.el5_4.3", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-debuginfo", rpm:"cups-debuginfo~1.3.7~11.el5_4.3", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-libs", rpm:"cups-libs~1.3.7~11.el5_4.3", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-lpd", rpm:"cups-lpd~1.3.7~11.el5_4.3", rls:"RHENT_5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-devel", rpm:"cups-devel~1.3.7~11.el5_4.3", rls:"RHENT_5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1895_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1895_2.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1895_2.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,108 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1895-2 (opensaml2, shibboleth-sp2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66051);
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1895-2 (opensaml2, shibboleth-sp2)");
+
+ desc = "
+The remote host is missing an update to opensaml2, shibboleth-sp2
+announced via advisory DSA 1895-2.
+
+In DSA-1895-1, the xmltooling package was updated to address several
+security issues.  It turns out that the change related to SAML
+metadata processing for key constraints caused problems when applied
+without the matching changes in the opensaml2 and shibboleth-sp2
+packages.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 2.0-2+lenny1 of the opensaml2 packages, and version
+2.0.dfsg1-4+lenny1 of the shibboleth-sp2 packages.
+
+We recommend that you upgrade your opensaml2 and shibboleth-sp2
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201895-2
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1895-2 (opensaml2, shibboleth-sp2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"opensaml2-schemas", ver:"2.0-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libshibsp-doc", ver:"2.0.dfsg1-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"shibboleth-sp2-schemas", ver:"2.0.dfsg1-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsaml2-doc", ver:"2.0-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"opensaml2-tools", ver:"2.0-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libshibsp1", ver:"2.0.dfsg1-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsaml2-dev", ver:"2.0-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libapache2-mod-shib2", ver:"2.0.dfsg1-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsaml2", ver:"2.0-2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libshibsp-dev", ver:"2.0.dfsg1-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1905_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1905_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1905_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1905-1 (python-django)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66052);
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1905-1 (python-django)");
+
+ desc = "
+The remote host is missing an update to python-django
+announced via advisory DSA 1905-1.
+
+The forms library of python-django, a high-level Python web development
+framework, is using a badly chosen regular expression when validating
+email addresses and URLs.  An attacker can use this to perform denial
+of service attacks (100% CPU consumption) due to bad backtracking
+via a specially crafted email address or URL which is validated by the
+django forms library.
+
+
+python-django in the oldstable distribution (etch), is not affected by
+this problem.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.0.2-1+lenny2.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.1.1-1.
+
+
+We recommend that you upgrade your python-django packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201905-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1905-1 (python-django)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"python-django", ver:"1.0.2-1+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1907_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1907_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1907_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,105 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1907-1 (kvm)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66053);
+ script_cve_id("CVE-2008-5714", "CVE-2009-3290");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1907-1 (kvm)");
+
+ desc = "
+The remote host is missing an update to kvm
+announced via advisory DSA 1907-1.
+
+
+Several vulnerabilities have been discovered in kvm, a full virtualization system.
+The Common Vulnerabilities and Exposures project identifies the
+following problems:
+
+CVE-2008-5714
+
+Chris Webb discovered an off-by-one bug limiting KVM's VNC passwords to 7
+characters. This flaw might make it easier for remote attackers to guess the VNC
+password, which is limited to seven characters where eight was intended.
+
+CVE-2009-3290
+
+It was discovered that the kvm_emulate_hypercall function in KVM does not
+prevent access to MMU hypercalls from ring 0, which allows local guest OS users
+to cause a denial of service (guest kernel crash) and read or write guest kernel
+memory.
+
+
+For the stable distribution (lenny), these problems have been fixed in version
+72+dfsg-5~lenny3.
+
+The oldstable distribution (etch) does not contain kvm.
+
+For the testing distribution (squeeze) these problems will be fixed soon.
+
+For the unstable distribution (sid) these problems have been fixed in version
+85+dfsg-4.1
+
+
+We recommend that you upgrade your kvm packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201907-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1907-1 (kvm)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"kvm-source", ver:"72+dfsg-5~lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kvm", ver:"72+dfsg-5~lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1908_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1908_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1908_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,144 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1908-1 (samba)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66054);
+ script_cve_id("CVE-2009-2948", "CVE-2009-2906", "CVE-2009-2813");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1908-1 (samba)");
+
+ desc = "
+The remote host is missing an update to samba
+announced via advisory DSA 1908-1.
+
+Several vulnerabilities have been discovered in samba, an implementation of
+the SMB/CIFS protocol for Unix systems, providing support for cross-platform
+file and printer sharing with other operating systems and more.  The Common
+Vulnerabilities and Exposures project identifies the following problems:
+
+The mount.cifs utility is missing proper checks for file permissions when
+used in verbose mode.  This allows local users to partly disclose the
+content of arbitrary files by specifying the file as credentials file and
+attempting to mount a samba share (CVE-2009-2948).
+
+A reply to an oplock break notification which samba doesn't expect could
+lead to the service getting stuck in an infinite loop.  An attacker
+can use this to perform denial of service attacks via a specially crafted
+SMB request (CVE-2009-2906).
+
+A lack of error handling in case no home diretory was configured/specified
+for the user could lead to file disclosure.  In case the automated [homes]
+share is enabled or an explicit share is created with that username, samba
+fails to enforce sharing restrictions which results in an attacker being
+able to access the file system from the root directory (CVE-2009-2813).
+
+
+For the oldstable distribution (etch), this problem will be fixed soon.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 2:3.2.5-4lenny7.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2:3.4.2-1.
+
+
+We recommend that you upgrade your samba packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201908-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1908-1 (samba)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"samba-doc", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc-pdf", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-dbg", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"swat", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"winbind", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient-dev", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smbfs", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libwbclient0", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-tools", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpam-smbpass", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-common", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smbclient", ver:"3.2.5-4lenny7", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1909_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1909_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1909_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,105 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1909-1 (postgresql-ocaml)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66057);
+ script_cve_id("CVE-2009-2943");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1909-1 (postgresql-ocaml)");
+
+ desc = "
+The remote host is missing an update to postgresql-ocaml
+announced via advisory DSA 1909-1.
+
+
+It was discovered that postgresql-ocaml, OCaml bindings to PostgreSQL's
+libpq, was missing a function to call PQescapeStringConn(). This is
+needed, because PQescapeStringConn() honours the charset of the
+connection and prevents insufficient escaping, when certain multibyte
+character encodings are used. The added function is called
+escape_string_conn() and takes the established database connection as a
+first argument. The old escape_string() was kept for backwards
+compatibility.
+
+Developers using these bindings are encouraged to adjust their code to
+use the new function.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.7.0-3+lenny1.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.5.4-2+etch1.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem has been fixed in version 1.12.1-1.
+
+
+We recommend that you upgrade your postgresql-ocaml packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201909-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1909-1 (postgresql-ocaml)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libpostgresql-ocaml-dev", ver:"1.5.4-2+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostgresql-ocaml", ver:"1.5.4-2+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostgresql-ocaml-dev", ver:"1.7.0-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostgresql-ocaml", ver:"1.7.0-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1910_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1910_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1910_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,104 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1910-1 (mysql-ocaml)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66056);
+ script_cve_id("CVE-2009-2942");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1910-1 (mysql-ocaml)");
+
+ desc = "
+The remote host is missing an update to mysql-ocaml
+announced via advisory DSA 1910-1.
+
+
+It was discovered that mysql-ocaml, OCaml bindings for MySql, was
+missing a function to call mysql_real_escape_string(). This is needed,
+because mysql_real_escape_string() honours the charset of the connection
+and prevents insufficient escaping, when certain multibyte character
+encodings are used. The added function is called real_escape() and
+takes the established database connection as a first argument. The old
+escape_string() was kept for backwards compatibility.
+
+Developers using these bindings are encouraged to adjust their code to
+use the new function.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.0.4-4+lenny1.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1.0.4-2+etch1.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem will be fixed soon.
+
+
+We recommend that you upgrade your mysql-ocaml packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201910-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1910-1 (mysql-ocaml)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libmysql-ocaml", ver:"1.0.4-2+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmysql-ocaml-dev", ver:"1.0.4-2+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmysql-ocaml-dev", ver:"1.0.4-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmysql-ocaml", ver:"1.0.4-4+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1911_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1911_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1911_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,101 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1911-1 (pygresql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66055);
+ script_cve_id("CVE-2009-2940");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1911-1 (pygresql)");
+
+ desc = "
+The remote host is missing an update to pygresql
+announced via advisory DSA 1911-1.
+
+
+It was discovered that pygresql, a PostgreSQL module for Python, was
+missing a function to call PQescapeStringConn(). This is needed, because
+PQescapeStringConn() honours the charset of the connection and prevents
+insufficient escaping, when certain multibyte character encodings are
+used. The new function is called pg_escape_string(), which takes the
+database connection as a first argument. The old function
+escape_string() has been preserved as well for backwards compatibility.
+
+Developers using these bindings are encouraged to adjust their code to
+use the new function.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1:3.8.1-3+lenny1.
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 1:3.8.1-1etch2.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem has been fixed in version 1:4.0-1.
+
+
+We recommend that you upgrade your pygresql packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201911-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1911-1 (pygresql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"python-pygresql", ver:"3.8.1-1etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-pygresql", ver:"3.8.1-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-pygresql-dbg", ver:"3.8.1-3+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1912_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1912_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/deb_1912_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,105 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1912-1 (camlimages)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66058);
+ script_cve_id("CVE-2009-3296", "CVE-2009-2660");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1912-1 (camlimages)");
+
+ desc = "
+The remote host is missing an update to camlimages
+announced via advisory DSA 1912-1.
+
+It was discovered that CamlImages, an open source image processing
+library, suffers from several integer overflows, which may lead to a
+potentially exploitable heap overflow and result in arbitrary code
+execution. This advisory addresses issues with the reading of TIFF
+files. It also expands the patch for CVE-2009-2660 to cover another
+potential overflow in the processing of JPEG images.
+
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 2.20-8+etch3.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1:2.2.0-4+lenny3.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem will be fixed soon.
+
+
+We recommend that you upgrade your camlimages package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201912-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1912-1 (camlimages)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libcamlimages-ocaml-doc", ver:"2.20-8+etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcamlimages-ocaml-dev", ver:"2.20-8+etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcamlimages-ocaml", ver:"2.20-8+etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcamlimages-ocaml-doc", ver:"2.2.0-4+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcamlimages-ocaml-dev", ver:"2.2.0-4+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcamlimages-ocaml", ver:"2.2.0-4+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10252.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10252.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10252.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10252 (dnsmasq)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66043);
+ script_cve_id("CVE-2009-2957", "CVE-2009-2958");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10252 (dnsmasq)");
+
+ desc = "
+The remote host is missing an update to dnsmasq
+announced via advisory FEDORA-2009-10252.
+
+Update Information:
+
+This update fixes two security issues with dnsmasq's tftp server:
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958
+
+ChangeLog:
+
+* Mon Oct  5 2009 Mark McLoughlin  - 2.46-2
+- Fix multiple TFTP server vulnerabilities (CVE-2009-2957, CVE-2009-2958)
+
+References:
+
+[ 1 ] Bug #519020 - CVE-2009-2957, CVE-2009-2958 dnsmasq: multiple vulnerabilities in TFTP server
+https://bugzilla.redhat.com/show_bug.cgi?id=519020
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update dnsmasq' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10252
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10252 (dnsmasq)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dnsmasq", rpm:"dnsmasq~2.46~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dnsmasq-debuginfo", rpm:"dnsmasq-debuginfo~2.46~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10262.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10262.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10262.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,106 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10262 (deltarpm)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66038);
+ script_cve_id("CAN-2005-1849");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10262 (deltarpm)");
+
+ desc = "
+The remote host is missing an update to deltarpm
+announced via advisory FEDORA-2009-10262.
+
+Update Information:
+
+deltarpm prior to the current build ships with a bundled copy of zlib. This
+version of zlib has a known vulnerability with CVE identifier: CAN-2005-1849
+This build of deltarpm patches the program to use the system zlib (which was
+fixed when the vulnerability was first discovered) instead of the bundled copy.
+
+ChangeLog:
+
+* Mon Oct  5 2009 Jonathan Dieter  - 3.4-18
+- Re-split off drpmsync from main package
+* Wed Sep 30 2009 Toshio Kuratomi  - 3.4-17
+- Work around cvs tag problem
+* Wed Sep 30 2009 Toshio Kuratomi  - 3.4-16
+- Build against the system zlib, not the bundled library.  This remedies the
+fact that the included zlib is affected by CAN-2005-1849.
+- Fix cfile_detect_rsync() to detect rsync even if we don't have a zlib capable
+of making rsync-friendly compressed files.
+
+References:
+
+[ 1 ] Bug #526432 - deltarpm contains an own, modified copy of zlib
+https://bugzilla.redhat.com/show_bug.cgi?id=526432
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update deltarpm' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10262
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10262 (deltarpm)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"deltarpm", rpm:"deltarpm~3.4~18.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"drpmsync", rpm:"drpmsync~3.4~18.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"deltarpm-debuginfo", rpm:"deltarpm-debuginfo~3.4~18.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10285.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10285.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10285.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10285 (dnsmasq)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66037);
+ script_cve_id("CVE-2009-2957", "CVE-2009-2958");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10285 (dnsmasq)");
+
+ desc = "
+The remote host is missing an update to dnsmasq
+announced via advisory FEDORA-2009-10285.
+
+Update Information:
+
+This update fixes two security issues with dnsmasq's tftp server:
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958
+
+ChangeLog:
+
+* Mon Oct  5 2009 Mark McLoughlin  - 2.46-3
+- Fix multiple TFTP server vulnerabilities (CVE-2009-2957, CVE-2009-2958)
+
+References:
+
+[ 1 ] Bug #519020 - CVE-2009-2957, CVE-2009-2958 dnsmasq: multiple vulnerabilities in TFTP server
+https://bugzilla.redhat.com/show_bug.cgi?id=519020
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update dnsmasq' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10285
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10285 (dnsmasq)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dnsmasq", rpm:"dnsmasq~2.46~3.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dnsmasq-debuginfo", rpm:"dnsmasq-debuginfo~2.46~3.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10385.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10385.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10385.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,96 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10385 (dopewars)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66036);
+ script_cve_id("CVE-2009-3591");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10385 (dopewars)");
+
+ desc = "
+The remote host is missing an update to dopewars
+announced via advisory FEDORA-2009-10385.
+
+Update Information:
+
+Fix DoS.
+
+ChangeLog:
+
+* Fri Oct  9 2009 Jussi Lehtola  - 1.5.12-8.1033svn
+- Update to svn release to address security issues.
+
+References:
+
+[ 1 ] Bug #528081 - CVE-2009-3591 dopewars: DoS via REQUESTJET message with an invalid location
+https://bugzilla.redhat.com/show_bug.cgi?id=528081
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update dopewars' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10385
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10385 (dopewars)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dopewars", rpm:"dopewars~1.5.12~8.1033svn.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dopewars-sdl", rpm:"dopewars-sdl~1.5.12~8.1033svn.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dopewars-debuginfo", rpm:"dopewars-debuginfo~1.5.12~8.1033svn.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10390.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10390.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10390.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,89 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10390 (Django)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66045);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10390 (Django)");
+
+ desc = "
+The remote host is missing an update to Django
+announced via advisory FEDORA-2009-10390.
+
+ChangeLog:
+
+* Fri Oct  9 2009 Steve 'Ashcrow' Milner  - 1.1.1-1
+- Update to fix http://www.djangoproject.com/weblog/2009/oct/09/security/
+- Django-ignore-pyo-bz-495046.patch no longer needed.
+
+References:
+
+[ 1 ] Bug #528246 - Django's forms DOS in 1.1/1.0
+https://bugzilla.redhat.com/show_bug.cgi?id=528246
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update Django' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10390
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10390 (Django)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"Django", rpm:"Django~1.1.1~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"Django-doc", rpm:"Django-doc~1.1.1~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10432.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10432.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10432.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,89 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10432 (Django)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66046);
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10432 (Django)");
+
+ desc = "
+The remote host is missing an update to Django
+announced via advisory FEDORA-2009-10432.
+
+ChangeLog:
+
+* Fri Oct  9 2009 Steve 'Ashcrow' Milner  - 1.1.1-1
+- Update to fix http://www.djangoproject.com/weblog/2009/oct/09/security/
+- Django-ignore-pyo-bz-495046.patch no longer needed.
+
+References:
+
+[ 1 ] Bug #528246 - Django's forms DOS in 1.1/1.0
+https://bugzilla.redhat.com/show_bug.cgi?id=528246
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update Django' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10432
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10432 (Django)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"Django", rpm:"Django~1.1.1~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"Django-doc", rpm:"Django-doc~1.1.1~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10439.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10439.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10439.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,96 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10439 (dopewars)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66039);
+ script_cve_id("CVE-2009-3591");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10439 (dopewars)");
+
+ desc = "
+The remote host is missing an update to dopewars
+announced via advisory FEDORA-2009-10439.
+
+Update Information:
+
+Fix DoS.
+
+ChangeLog:
+
+* Fri Oct  9 2009 Jussi Lehtola  - 1.5.12-8.1033svn
+- Update to svn release to address security issues.
+
+References:
+
+[ 1 ] Bug #528081 - CVE-2009-3591 dopewars: DoS via REQUESTJET message with an invalid location
+https://bugzilla.redhat.com/show_bug.cgi?id=528081
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update dopewars' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10439
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10439 (dopewars)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dopewars", rpm:"dopewars~1.5.12~8.1033svn.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dopewars-sdl", rpm:"dopewars-sdl~1.5.12~8.1033svn.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dopewars-debuginfo", rpm:"dopewars-debuginfo~1.5.12~8.1033svn.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10445.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10445.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10445.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10445 (drupal-service_links)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66040);
+ script_cve_id("CVE-2009-3648");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10445 (drupal-service_links)");
+
+ desc = "
+The remote host is missing an update to drupal-service_links
+announced via advisory FEDORA-2009-10445.
+
+ChangeLog:
+
+* Fri Oct  9 2009 Jon Ciesla  - 6.x.1.0-5
+- Patch for CVE-2009-3648 from madirish.net, BZ 528200, 528201.
+
+References:
+
+[ 1 ] Bug #528200 - CVE-2009-3648 drupal-service_links: xss vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=528200
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update drupal-service_links' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10445
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10445 (drupal-service_links)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"drupal-service_links", rpm:"drupal-service_links~6.x.1.0~5.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10466.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10466.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10466.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10466 (drupal-service_links)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66041);
+ script_cve_id("CVE-2009-3648");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10466 (drupal-service_links)");
+
+ desc = "
+The remote host is missing an update to drupal-service_links
+announced via advisory FEDORA-2009-10466.
+
+ChangeLog:
+
+* Fri Oct  9 2009 Jon Ciesla  - 6.x.1.0-5
+- Patch for CVE-2009-3648 from madirish.net, BZ 528200, 528201.
+
+References:
+
+[ 1 ] Bug #528200 - CVE-2009-3648 drupal-service_links: xss vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=528200
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update drupal-service_links' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10466
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10466 (drupal-service_links)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"drupal-service_links", rpm:"drupal-service_links~6.x.1.0~5.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10484.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10484.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10484.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10484 (rubygem-actionmailer)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66042);
+ script_cve_id("CVE-2009-3009");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10484 (rubygem-actionmailer)");
+
+ desc = "
+The remote host is missing an update to rubygem-actionmailer
+announced via advisory FEDORA-2009-10484.
+
+Update Information:
+
+- Fixes CVE-2009-3009  - Downgrade to Rails 2.3.2 to avoid update issues for
+existing applications
+
+ChangeLog:
+
+* Wed Oct  7 2009 David Lutterkort  - 1:2.3.2-3
+- Bump epoch; rails is not updatable across versions (bz 520843)
+- Kill test for now
+
+References:
+
+[ 1 ] Bug #520843 - CVE-2009-3009 ruby-activesupport: XSS vulnerability
+https://bugzilla.redhat.com/show_bug.cgi?id=520843
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update rubygem-actionmailer' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10484
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10484 (rubygem-actionmailer)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"rubygem-actionmailer", rpm:"rubygem-actionmailer~2.3.2~3.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10510.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10510.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10510.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10510 (phpMyAdmin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66044);
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10510 (phpMyAdmin)");
+
+ desc = "
+The remote host is missing an update to phpMyAdmin
+announced via advisory FEDORA-2009-10510.
+
+Update Information:
+
+Changes for 3.2.2.1:  - [security] XSS and SQL injection, thanks to Herman van
+Rink
+
+ChangeLog:
+
+* Tue Oct 13 2009 Robert Scheck  3.2.2.1-1
+- Upstream released 3.2.2.1 (#528769)
+- Require php-mcrypt for cookie authentication (#526979)
+
+References:
+
+[ 1 ] Bug #528769 - phpMyAdmin:  XSS and SQL injection (PMASA-2009-6)
+https://bugzilla.redhat.com/show_bug.cgi?id=528769
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update phpMyAdmin' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10510
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10510 (phpMyAdmin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"phpMyAdmin", rpm:"phpMyAdmin~3.2.2.1~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10520.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10520.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10520.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10520 (perl-Net-OAuth)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66047);
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10520 (perl-Net-OAuth)");
+
+ desc = "
+The remote host is missing an update to perl-Net-OAuth
+announced via advisory FEDORA-2009-10520.
+
+Update Information:
+
+A session fixation vulnerability was discovered in OAuth protocol 1.0. Perl
+OAuth bindings were updated to support the new version of the OAauth protocol
+that was issued to address the vulnerability.    All OAuth users are strongly
+advised to update to this updated package and protocol version 1.0a which fixes
+the vulnerability.    Upstream advisory: http://oauth.net/advisories/2009-1
+
+References:
+
+[ 1 ] Bug #528608 - current perl-Net-OAuth does not support OAuth 1.0a
+https://bugzilla.redhat.com/show_bug.cgi?id=528608
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update perl-Net-OAuth' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10520
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10520 (perl-Net-OAuth)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl-Net-OAuth", rpm:"perl-Net-OAuth~0.19~1.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10525.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10525.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10525.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,148 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10525 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66048);
+ script_cve_id("CVE-2009-2908", "CVE-2009-2903", "CVE-2009-3290", "CVE-2009-2847", "CVE-2009-2692", "CVE-2009-2406", "CVE-2009-2407", "CVE-2009-1895", "CVE-2009-1897", "CVE-2009-0065", "CVE-2008-5079", "CVE-2009-2909", "CVE-2009-2910");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10525 (kernel)");
+
+ desc = "
+The remote host is missing an update to kernel
+announced via advisory FEDORA-2009-10525.
+
+Update Information:
+
+Update to kernel 2.6.27.37:
+http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.36
+http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.37
+
+References:
+
+[ 1 ] Bug #527534 - CVE-2009-2908 kernel ecryptfs NULL pointer dereference
+https://bugzilla.redhat.com/show_bug.cgi?id=527534
+[ 2 ] Bug #528887 - CVE-2009-2909 kernel: ax25 stack overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=528887
+[ 3 ] Bug #526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak
+https://bugzilla.redhat.com/show_bug.cgi?id=526788
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update kernel' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10525
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10525 (kernel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel-headers", rpm:"kernel-headers~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo-common", rpm:"kernel-debuginfo-common~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE", rpm:"kernel-PAE~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-devel", rpm:"kernel-PAE-devel~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug", rpm:"kernel-PAEdebug~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug-devel", rpm:"kernel-PAEdebug-devel~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAE-debuginfo", rpm:"kernel-PAE-debuginfo~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-PAEdebug-debuginfo", rpm:"kernel-PAEdebug-debuginfo~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-firmware", rpm:"kernel-firmware~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-bootwrapper", rpm:"kernel-bootwrapper~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-debuginfo", rpm:"kernel-smp-debuginfo~2.6.27.37~170.2.104.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10530.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10530.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10530.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,91 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10530 (phpMyAdmin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66049);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10530 (phpMyAdmin)");
+
+ desc = "
+The remote host is missing an update to phpMyAdmin
+announced via advisory FEDORA-2009-10530.
+
+Update Information:
+
+Changes for 3.2.2.1:  - [security] XSS and SQL injection, thanks to Herman van
+Rink
+
+ChangeLog:
+
+* Tue Oct 13 2009 Robert Scheck  3.2.2.1-1
+- Upstream released 3.2.2.1 (#528769)
+- Require php-mcrypt for cookie authentication (#526979)
+
+References:
+
+[ 1 ] Bug #528769 - phpMyAdmin:  XSS and SQL injection (PMASA-2009-6)
+https://bugzilla.redhat.com/show_bug.cgi?id=528769
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update phpMyAdmin' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10530
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10530 (phpMyAdmin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"phpMyAdmin", rpm:"phpMyAdmin~3.2.2.1~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10539.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10539.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/fcore_2009_10539.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,95 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10539 (perl-Net-OAuth)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66050);
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10539 (perl-Net-OAuth)");
+
+ desc = "
+The remote host is missing an update to perl-Net-OAuth
+announced via advisory FEDORA-2009-10539.
+
+Update Information:
+
+A session fixation vulnerability was discovered in OAuth protocol 1.0. Perl
+OAuth bindings were updated to support the new version of the OAauth protocol
+that was issued to address the vulnerability.    All OAuth users are strongly
+advised to update to this updated package and protocol version 1.0a which fixes
+the vulnerability.    Upstream advisory: http://oauth.net/advisories/2009-1
+
+ChangeLog:
+
+* Tue Oct 13 2009 Lubomir Rintel (Good Data)  - 0.19-1
+- Update to 0.19, fixes security issue (2009.1)
+* Sun Jul 26 2009 Fedora Release Engineering  - 0.14-3
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
+
+References:
+
+[ 1 ] Bug #528608 - current perl-Net-OAuth does not support OAuth 1.0a
+https://bugzilla.redhat.com/show_bug.cgi?id=528608
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update perl-Net-OAuth' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10539
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10539 (perl-Net-OAuth)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"perl-Net-OAuth", rpm:"perl-Net-OAuth~0.19~1.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_php55.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php55.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/freebsd_php55.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,95 @@
+#
+#VID 437a68cf-b752-11de-b6eb-00e0815b8da8
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 437a68cf-b752-11de-b6eb-00e0815b8da8
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66065);
+ script_cve_id("CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: php5");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: php5
+
+CVE-2009-3291
+The php_openssl_apply_verification_policy function in PHP before
+5.2.11 does not properly perform certificate validation, which has
+unknown impact and attack vectors, probably related to an ability to
+spoof certificates.
+
+CVE-2009-3292
+Unspecified vulnerability in PHP before 5.2.11 has unknown impact and
+attack vectors related to 'missing sanity checks around exif
+processing.'
+
+CVE-2009-3293
+Unspecified vulnerability in the imagecolortransparent function in PHP
+before 5.2.11 has unknown impact and attack vectors related to an
+incorrect 'sanity check for the color index.'
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.php.net/releases/5_2_11.php
+http://www.vuxml.org/freebsd/437a68cf-b752-11de-b6eb-00e0815b8da8.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: php5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"php5");
+if(!isnull(bver) && revcomp(a:bver, b:"5.2.11")<0) {
+    security_note(0, data:"Package php5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin20.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,86 @@
+#
+#VID 4769914e-b844-11de-b159-0030843d3802
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 4769914e-b844-11de-b159-0030843d3802
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66064);
+ script_cve_id("CVE-2009-3696", "CVE-2009-3697");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: phpMyAdmin");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   phpMyAdmin
+   phpMyAdmin211
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.phpmyadmin.net/home_page/security/PMASA-2009-6.php
+http://www.vuxml.org/freebsd/4769914e-b844-11de-b159-0030843d3802.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: phpMyAdmin");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"phpMyAdmin");
+if(!isnull(bver) && revcomp(a:bver, b:"3.2.2.1")<0) {
+    security_note(0, data:"Package phpMyAdmin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"phpMyAdmin211");
+if(!isnull(bver) && revcomp(a:bver, b:"2.11.9.6")<0) {
+    security_note(0, data:"Package phpMyAdmin211 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_py23-django1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_py23-django1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/freebsd_py23-django1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,145 @@
+#
+#VID 87917d6f-ba76-11de-bac2-001a4d563a0f
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 87917d6f-ba76-11de-bac2-001a4d563a0f
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66063);
+ script_version ("$Revision$");
+ script_name("django -- denial-of-service attack");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   py23-django
+   py24-django
+   py25-django
+   py26-django
+   py30-django
+   py31-django
+   py23-django-devel
+   py24-django-devel
+   py25-django-devel
+   py26-django-devel
+   py30-django-devel
+   py31-django-devel
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.djangoproject.com/weblog/2009/oct/09/security/
+http://www.vuxml.org/freebsd/87917d6f-ba76-11de-bac2-001a4d563a0f.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("django -- denial-of-service attack");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"py23-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.1")<0) {
+    security_note(0, data:"Package py23-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py24-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.1")<0) {
+    security_note(0, data:"Package py24-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py25-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.1")<0) {
+    security_note(0, data:"Package py25-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py26-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.1")<0) {
+    security_note(0, data:"Package py26-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py30-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.1")<0) {
+    security_note(0, data:"Package py30-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py31-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.1")<0) {
+    security_note(0, data:"Package py31-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py23-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"11603,1")<0) {
+    security_note(0, data:"Package py23-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py24-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"11603,1")<0) {
+    security_note(0, data:"Package py24-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py25-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"11603,1")<0) {
+    security_note(0, data:"Package py25-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py26-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"11603,1")<0) {
+    security_note(0, data:"Package py26-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py30-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"11603,1")<0) {
+    security_note(0, data:"Package py30-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py31-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"11603,1")<0) {
+    security_note(0, data:"Package py31-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_263.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_263.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_263.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:263 (sympa)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66019);
+ script_cve_id("CVE-2008-4476");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:263 (sympa)");
+
+ desc = "
+The remote host is missing an update to sympa
+announced via advisory MDVSA-2009:263.
+
+A vulnerability has been found and corrected in sympa:
+
+sympa.pl in sympa 5.3.4 allows local users to overwrite arbitrary
+files via a symlink attack on a temporary file.  NOTE: wwsympa.fcgi
+was also reported, but the issue occurred in a dead function, so it
+is not a vulnerability (CVE-2008-4476).
+
+This update fixes this vulnerability.
+
+Affected: 2008.1, Corporate 4.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:263
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:263 (sympa)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"sympa", rpm:"sympa~5.3.4~2.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"sympa", rpm:"sympa~5.1.0~2.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"sympa", rpm:"sympa~5.4.3~2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_264.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_264.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_264.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,114 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:264 (gd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66021);
+ script_cve_id("CVE-2007-3996");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:264 (gd)");
+
+ desc = "
+The remote host is missing an update to gd
+announced via advisory MDVSA-2009:264.
+
+Multiple integer overflows in libgd in PHP before 5.2.4 allow
+remote attackers to cause a denial of service (application crash)
+and possibly execute arbitrary code via a large (1) srcW or (2)
+srcH value to the (a) gdImageCopyResized function, or a large (3) sy
+(height) or (4) sx (width) value to the (b) gdImageCreate or the (c)
+gdImageCreateTrueColor function. (CVE-2007-3996)
+
+The updated packages have been patched to prevent this.
+
+Affected: Corporate 3.0, Multi Network Firewall 2.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:264
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:264 (gd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-devel", rpm:"libgd2-devel~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-static-devel", rpm:"libgd2-static-devel~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2", rpm:"lib64gd2~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2-devel", rpm:"lib64gd2-devel~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2-static-devel", rpm:"lib64gd2-static-devel~2.0.15~4.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.15~4.2.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.15~4.2.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-devel", rpm:"libgd2-devel~2.0.15~4.2.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-static-devel", rpm:"libgd2-static-devel~2.0.15~4.2.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_265.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_265.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_265.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,175 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:265 (egroupware)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66020);
+ script_cve_id("CVE-2008-1502");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:265 (egroupware)");
+
+ desc = "
+The remote host is missing an update to egroupware
+announced via advisory MDVSA-2009:265.
+
+A vulnerability has been found and corrected in egroupware:
+
+The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php
+in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5,
+and other products, allows remote attackers to bypass HTML filtering
+and conduct cross-site scripting (XSS) attacks via a string containing
+crafted URL protocols (CVE-2008-1502).
+
+This update fixes this vulnerability.
+
+Affected: Corporate 3.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:265
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:265 (egroupware)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"egroupware", rpm:"egroupware~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-addressbook", rpm:"egroupware-addressbook~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-backup", rpm:"egroupware-backup~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-bookmarks", rpm:"egroupware-bookmarks~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-calendar", rpm:"egroupware-calendar~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-comic", rpm:"egroupware-comic~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-developer_tools", rpm:"egroupware-developer_tools~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-email", rpm:"egroupware-email~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-emailadmin", rpm:"egroupware-emailadmin~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-etemplate", rpm:"egroupware-etemplate~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-felamimail", rpm:"egroupware-felamimail~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-filemanager", rpm:"egroupware-filemanager~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-forum", rpm:"egroupware-forum~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-ftp", rpm:"egroupware-ftp~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-fudforum", rpm:"egroupware-fudforum~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-headlines", rpm:"egroupware-headlines~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-infolog", rpm:"egroupware-infolog~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-jinn", rpm:"egroupware-jinn~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-messenger", rpm:"egroupware-messenger~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-news_admin", rpm:"egroupware-news_admin~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-phpbrain", rpm:"egroupware-phpbrain~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-phpldapadmin", rpm:"egroupware-phpldapadmin~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-phpsysinfo", rpm:"egroupware-phpsysinfo~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-polls", rpm:"egroupware-polls~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-projects", rpm:"egroupware-projects~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-registration", rpm:"egroupware-registration~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-sitemgr", rpm:"egroupware-sitemgr~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-skel", rpm:"egroupware-skel~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-stocks", rpm:"egroupware-stocks~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-tts", rpm:"egroupware-tts~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"egroupware-wiki", rpm:"egroupware-wiki~1.0~0.RC3.1.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_266.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_266.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_266.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:266 (awstats)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66022);
+ script_cve_id("CVE-2008-3714", "CVE-2008-5080");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:266 (awstats)");
+
+ desc = "
+The remote host is missing an update to awstats
+announced via advisory MDVSA-2009:266.
+
+A vulnerability has been found and corrected in awstats:
+
+awstats.pl in AWStats 6.8 and earlier does not properly remove quote
+characters, which allows remote attackers to conduct cross-site
+scripting (XSS) attacks via the query_string parameter. NOTE:
+this issue exists because of an incomplete fix for CVE-2008-3714
+(CVE-2008-5080).
+
+This update fixes this vulnerability.
+
+Affected: Corporate 4.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:266
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:266 (awstats)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"awstats", rpm:"awstats~6.4~4.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"awstats", rpm:"awstats~6.8~1.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_267.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_267.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_267.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,288 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:267 (xmlsec1)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66023);
+ script_cve_id("CVE-2009-0217");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:267 (xmlsec1)");
+
+ desc = "
+The remote host is missing an update to xmlsec1
+announced via advisory MDVSA-2009:267.
+
+A vulnerability has been found and corrected in xmlsec1:
+
+A missing check for the recommended minimum length of the truncated
+form of HMAC-based XML signatures was found in xmlsec1 prior to
+1.2.12. An attacker could use this flaw to create a specially-crafted
+XML file that forges an XML signature, allowing the attacker to
+bypass authentication that is based on the XML Signature specification
+(CVE-2009-0217).
+
+This update fixes this vulnerability.
+
+Affected: 2008.1, 2009.0, 2009.1, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:267
+http://www.kb.cert.org/vuls/id/466161
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:267 (xmlsec1)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libxmlsec1-1", rpm:"libxmlsec1-1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-devel", rpm:"libxmlsec1-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls1", rpm:"libxmlsec1-gnutls1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls-devel", rpm:"libxmlsec1-gnutls-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss1", rpm:"libxmlsec1-nss1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss-devel", rpm:"libxmlsec1-nss-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl1", rpm:"libxmlsec1-openssl1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl-devel", rpm:"libxmlsec1-openssl-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xmlsec1", rpm:"xmlsec1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-1", rpm:"lib64xmlsec1-1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-devel", rpm:"lib64xmlsec1-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls1", rpm:"lib64xmlsec1-gnutls1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls-devel", rpm:"lib64xmlsec1-gnutls-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss1", rpm:"lib64xmlsec1-nss1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss-devel", rpm:"lib64xmlsec1-nss-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl1", rpm:"lib64xmlsec1-openssl1~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl-devel", rpm:"lib64xmlsec1-openssl-devel~1.2.10~6.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-1", rpm:"libxmlsec1-1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-devel", rpm:"libxmlsec1-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls1", rpm:"libxmlsec1-gnutls1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls-devel", rpm:"libxmlsec1-gnutls-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss1", rpm:"libxmlsec1-nss1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss-devel", rpm:"libxmlsec1-nss-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl1", rpm:"libxmlsec1-openssl1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl-devel", rpm:"libxmlsec1-openssl-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xmlsec1", rpm:"xmlsec1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-1", rpm:"lib64xmlsec1-1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-devel", rpm:"lib64xmlsec1-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls1", rpm:"lib64xmlsec1-gnutls1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls-devel", rpm:"lib64xmlsec1-gnutls-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss1", rpm:"lib64xmlsec1-nss1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss-devel", rpm:"lib64xmlsec1-nss-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl1", rpm:"lib64xmlsec1-openssl1~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl-devel", rpm:"lib64xmlsec1-openssl-devel~1.2.10~7.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-1", rpm:"libxmlsec1-1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-devel", rpm:"libxmlsec1-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls1", rpm:"libxmlsec1-gnutls1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls-devel", rpm:"libxmlsec1-gnutls-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss1", rpm:"libxmlsec1-nss1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss-devel", rpm:"libxmlsec1-nss-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl1", rpm:"libxmlsec1-openssl1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl-devel", rpm:"libxmlsec1-openssl-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xmlsec1", rpm:"xmlsec1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-1", rpm:"lib64xmlsec1-1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-devel", rpm:"lib64xmlsec1-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls1", rpm:"lib64xmlsec1-gnutls1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls-devel", rpm:"lib64xmlsec1-gnutls-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss1", rpm:"lib64xmlsec1-nss1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss-devel", rpm:"lib64xmlsec1-nss-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl1", rpm:"lib64xmlsec1-openssl1~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl-devel", rpm:"lib64xmlsec1-openssl-devel~1.2.10~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-1", rpm:"libxmlsec1-1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-devel", rpm:"libxmlsec1-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls1", rpm:"libxmlsec1-gnutls1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-gnutls-devel", rpm:"libxmlsec1-gnutls-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss1", rpm:"libxmlsec1-nss1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-nss-devel", rpm:"libxmlsec1-nss-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl1", rpm:"libxmlsec1-openssl1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libxmlsec1-openssl-devel", rpm:"libxmlsec1-openssl-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xmlsec1", rpm:"xmlsec1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-1", rpm:"lib64xmlsec1-1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-devel", rpm:"lib64xmlsec1-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls1", rpm:"lib64xmlsec1-gnutls1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-gnutls-devel", rpm:"lib64xmlsec1-gnutls-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss1", rpm:"lib64xmlsec1-nss1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-nss-devel", rpm:"lib64xmlsec1-nss-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl1", rpm:"lib64xmlsec1-openssl1~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64xmlsec1-openssl-devel", rpm:"lib64xmlsec1-openssl-devel~1.2.10~7.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_268.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_268.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_268.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,278 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:268 (mono)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66025);
+ script_cve_id("CVE-2008-3422", "CVE-2009-0217");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:268 (mono)");
+
+ desc = "
+The remote host is missing an update to mono
+announced via advisory MDVSA-2009:268.
+
+Multiple vulnerabilities has been found and corrected in mono:
+
+Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net
+class libraries in Mono 2.0 and earlier allow remote attackers to
+inject arbitrary web script or HTML via crafted attributes related to
+(1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs
+(RenderAttributes), (3) HtmlInputButton (RenderAttributes),
+(4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect
+(RenderChildren) (CVE-2008-3422).
+
+The XML HMAC signature system did not correctly check certain
+lengths. If an attacker sent a truncated HMAC, it could bypass
+authentication, leading to potential privilege escalation
+(CVE-2009-0217).
+
+This update fixes these vulnerabilities.
+
+Affected: 2008.1, 2009.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:268
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:268 (mono)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"jay", rpm:"jay~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono0", rpm:"libmono0~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono-devel", rpm:"libmono-devel~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono", rpm:"mono~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-bytefx-data-mysql", rpm:"mono-bytefx-data-mysql~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data", rpm:"mono-data~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-firebird", rpm:"mono-data-firebird~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-oracle", rpm:"mono-data-oracle~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-postgresql", rpm:"mono-data-postgresql~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sqlite", rpm:"mono-data-sqlite~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sybase", rpm:"mono-data-sybase~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-doc", rpm:"mono-doc~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-extras", rpm:"mono-extras~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-ibm-data-db2", rpm:"mono-ibm-data-db2~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-jscript", rpm:"mono-jscript~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-locale-extras", rpm:"mono-locale-extras~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-nunit", rpm:"mono-nunit~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-web", rpm:"mono-web~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-winforms", rpm:"mono-winforms~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono0", rpm:"lib64mono0~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono-devel", rpm:"lib64mono-devel~1.2.6~4.2mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"jay", rpm:"jay~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono0", rpm:"libmono0~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono-devel", rpm:"libmono-devel~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono", rpm:"mono~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-bytefx-data-mysql", rpm:"mono-bytefx-data-mysql~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data", rpm:"mono-data~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-firebird", rpm:"mono-data-firebird~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-oracle", rpm:"mono-data-oracle~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-postgresql", rpm:"mono-data-postgresql~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sqlite", rpm:"mono-data-sqlite~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sybase", rpm:"mono-data-sybase~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-doc", rpm:"mono-doc~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-extras", rpm:"mono-extras~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-ibm-data-db2", rpm:"mono-ibm-data-db2~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-jscript", rpm:"mono-jscript~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-locale-extras", rpm:"mono-locale-extras~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-nunit", rpm:"mono-nunit~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-web", rpm:"mono-web~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-winforms", rpm:"mono-winforms~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono0", rpm:"lib64mono0~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono-devel", rpm:"lib64mono-devel~1.9.1~5.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"jay", rpm:"jay~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono0", rpm:"libmono0~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono-devel", rpm:"libmono-devel~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono", rpm:"mono~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-bytefx-data-mysql", rpm:"mono-bytefx-data-mysql~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data", rpm:"mono-data~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-firebird", rpm:"mono-data-firebird~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-oracle", rpm:"mono-data-oracle~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-postgresql", rpm:"mono-data-postgresql~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sqlite", rpm:"mono-data-sqlite~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sybase", rpm:"mono-data-sybase~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-doc", rpm:"mono-doc~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-extras", rpm:"mono-extras~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-ibm-data-db2", rpm:"mono-ibm-data-db2~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-jscript", rpm:"mono-jscript~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-locale-extras", rpm:"mono-locale-extras~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-nunit", rpm:"mono-nunit~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-web", rpm:"mono-web~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-winforms", rpm:"mono-winforms~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono0", rpm:"lib64mono0~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono-devel", rpm:"lib64mono-devel~1.9.1~5.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_269.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_269.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_269.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,150 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:269 (mono)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66026);
+ script_cve_id("CVE-2009-0217");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:269 (mono)");
+
+ desc = "
+The remote host is missing an update to mono
+announced via advisory MDVSA-2009:269.
+
+A vulnerability has been found and corrected in mono:
+
+The XML HMAC signature system did not correctly check certain
+lengths. If an attacker sent a truncated HMAC, it could bypass
+authentication, leading to potential privilege escalation
+(CVE-2009-0217).
+
+This update fixes this vulnerability.
+
+Affected: 2009.1
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:269
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:269 (mono)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"jay", rpm:"jay~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono0", rpm:"libmono0~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmono-devel", rpm:"libmono-devel~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono", rpm:"mono~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-bytefx-data-mysql", rpm:"mono-bytefx-data-mysql~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data", rpm:"mono-data~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-firebird", rpm:"mono-data-firebird~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-oracle", rpm:"mono-data-oracle~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-postgresql", rpm:"mono-data-postgresql~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sqlite", rpm:"mono-data-sqlite~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-data-sybase", rpm:"mono-data-sybase~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-doc", rpm:"mono-doc~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"monodoc-core", rpm:"monodoc-core~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-extras", rpm:"mono-extras~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-ibm-data-db2", rpm:"mono-ibm-data-db2~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-jscript", rpm:"mono-jscript~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-locale-extras", rpm:"mono-locale-extras~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-nunit", rpm:"mono-nunit~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-wcf", rpm:"mono-wcf~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-web", rpm:"mono-web~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mono-winforms", rpm:"mono-winforms~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono0", rpm:"lib64mono0~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mono-devel", rpm:"lib64mono-devel~2.2~2.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_270.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_270.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_270.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,189 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:270 (wireshark)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66028);
+ script_cve_id("CVE-2009-3241");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:270 (wireshark)");
+
+ desc = "
+The remote host is missing an update to wireshark
+announced via advisory MDVSA-2009:270.
+
+A vulnerability has been found and corrected in wireshark:
+
+Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark
+0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers
+to cause a denial of service (memory and CPU consumption) via malformed
+OPCUA Service CallRequest packets (CVE-2009-3241).
+
+This update fixes this vulnerability.
+
+Affected: 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:270
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:270 (wireshark)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"dumpcap", rpm:"dumpcap~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark0", rpm:"libwireshark0~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark-devel", rpm:"libwireshark-devel~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rawshark", rpm:"rawshark~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tshark", rpm:"tshark~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-tools", rpm:"wireshark-tools~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark0", rpm:"lib64wireshark0~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark-devel", rpm:"lib64wireshark-devel~1.0.8~3.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dumpcap", rpm:"dumpcap~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark0", rpm:"libwireshark0~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark-devel", rpm:"libwireshark-devel~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rawshark", rpm:"rawshark~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tshark", rpm:"tshark~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-tools", rpm:"wireshark-tools~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark0", rpm:"lib64wireshark0~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark-devel", rpm:"lib64wireshark-devel~1.0.8~3.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dumpcap", rpm:"dumpcap~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark0", rpm:"libwireshark0~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark-devel", rpm:"libwireshark-devel~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rawshark", rpm:"rawshark~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tshark", rpm:"tshark~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-tools", rpm:"wireshark-tools~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark0", rpm:"lib64wireshark0~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark-devel", rpm:"lib64wireshark-devel~1.0.8~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dumpcap", rpm:"dumpcap~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark0", rpm:"libwireshark0~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwireshark-devel", rpm:"libwireshark-devel~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rawshark", rpm:"rawshark~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"tshark", rpm:"tshark~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-tools", rpm:"wireshark-tools~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark0", rpm:"lib64wireshark0~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wireshark-devel", rpm:"lib64wireshark-devel~1.0.8~3.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_271.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_271.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_271.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,94 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:271 (libnasl)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66027);
+ script_cve_id("CVE-2008-5077", "CVE-2009-0125");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:271 (libnasl)");
+
+ desc = "
+The remote host is missing an update to libnasl
+announced via advisory MDVSA-2009:271.
+
+A vulnerability has been found and corrected in libnasl:
+
+nasl/nasl_crypto2.c in the Nessus Attack Scripting Language library
+(aka libnasl) 2.2.11 does not properly check the return value from
+the OpenSSL DSA_do_verify function, which allows remote attackers to
+bypass validation of the certificate chain via a malformed SSL/TLS
+signature, a similar vulnerability to CVE-2008-5077 (CVE-2009-0125).
+
+This update fixes this vulnerability.
+
+Affected: Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:271
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:271 (libnasl)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libnasl2", rpm:"libnasl2~2.2.4~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnasl2-devel", rpm:"libnasl2-devel~2.2.4~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64nasl2", rpm:"lib64nasl2~2.2.4~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64nasl2-devel", rpm:"lib64nasl2-devel~2.2.4~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_272.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_272.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_272.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,123 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:272 (libmikmod)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66029);
+ script_cve_id("CVE-2007-6720", "CVE-2009-0179");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:272 (libmikmod)");
+
+ desc = "
+The remote host is missing an update to libmikmod
+announced via advisory MDVSA-2009:272.
+
+Multiple vulnerabilities has been found and corrected in libmikmod:
+
+libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and
+possibly other products, relies on the channel count of the last
+loaded song, rather than the currently playing song, for certain
+playback calculations, which allows user-assisted attackers to cause
+a denial of service (application crash) by loading multiple songs
+(aka MOD files) with different numbers of channels (CVE-2007-6720).
+
+libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other
+products, allows user-assisted attackers to cause a denial of service
+(application crash) by loading an XM file (CVE-2009-0179).
+
+This update fixes these vulnerabilities.
+
+Affected: 2008.1, 2009.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:272
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:272 (libmikmod)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libmikmod2", rpm:"libmikmod2~3.1.11a~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmikmod-devel", rpm:"libmikmod-devel~3.1.11a~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mikmod2", rpm:"lib64mikmod2~3.1.11a~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mikmod-devel", rpm:"lib64mikmod-devel~3.1.11a~10.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmikmod3", rpm:"libmikmod3~3.2.0~0.beta2.2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmikmod-devel", rpm:"libmikmod-devel~3.2.0~0.beta2.2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mikmod3", rpm:"lib64mikmod3~3.2.0~0.beta2.2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mikmod-devel", rpm:"lib64mikmod-devel~3.2.0~0.beta2.2.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmikmod3", rpm:"libmikmod3~3.2.0~0.beta2.2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmikmod-devel", rpm:"libmikmod-devel~3.2.0~0.beta2.2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mikmod3", rpm:"lib64mikmod3~3.2.0~0.beta2.2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64mikmod-devel", rpm:"lib64mikmod-devel~3.2.0~0.beta2.2.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_273.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_273.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_273.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:273 (strongswan)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66030);
+ script_cve_id("CVE-2009-2185");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:273 (strongswan)");
+
+ desc = "
+The remote host is missing an update to strongswan
+announced via advisory MDVSA-2009:273.
+
+A vulnerability has been found and corrected in strongswan:
+
+The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c,
+libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10,
+4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before
+2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial
+of service (pluto IKE daemon crash) via an X.509 certificate with (1)
+crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME
+string, or (3) a crafted GENERALIZEDTIME string (CVE-2009-2185).
+
+This update fixes this vulnerability.
+
+Affected: Multi Network Firewall 2.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:273
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:273 (strongswan)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"strongswan", rpm:"strongswan~2.0.2~1.1.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_274.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_274.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_274.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,82 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:274 (phpmyadmin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66031);
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:274 (phpmyadmin)");
+
+ desc = "
+The remote host is missing an update to phpmyadmin
+announced via advisory MDVSA-2009:274.
+
+This is a security release for XSS and SQL injection problems.
+
+This upgrade provides phpmyadmin 2.11.9.6 for CS4 and 3.2.2.1 for
+MES5 which is not vulnerable for these security issues.
+
+Affected: Corporate 4.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:274
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:274 (phpmyadmin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"phpMyAdmin", rpm:"phpMyAdmin~2.11.9.6~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"phpmyadmin", rpm:"phpmyadmin~3.2.2.1~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_275.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_275.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_275.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:275 (python-django)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66024);
+ script_cve_id("CVE-2009-2659");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:275 (python-django)");
+
+ desc = "
+The remote host is missing an update to python-django
+announced via advisory MDVSA-2009:275.
+
+A vulnerability has been found and corrected in python-django:
+
+The Admin media handler in core/servers/basehttp.py in Django 1.0
+and 0.96 does not properly map URL requests to expected static media
+files, which allows remote attackers to conduct directory traversal
+attacks and read arbitrary files via a crafted URL (CVE-2009-2659).
+
+The versions of Django shipping with Mandriva Linux have been updated
+to the latest patched version that include the fix for this issue.
+In addition, they provide other bug fixes.
+
+Affected: 2008.1
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:275
+http://www.djangoproject.com/weblog/2009/jul/28/security/
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:275 (python-django)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"python-django", rpm:"python-django~0.96.5~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_276.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_276.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_276.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,100 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:276 (python-django)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66032);
+ script_cve_id("CVE-2009-2659", "CVE-2009-3695");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:276 (python-django)");
+
+ desc = "
+The remote host is missing an update to python-django
+announced via advisory MDVSA-2009:276.
+
+Multiple vulnerabilities has been found and corrected in python-django:
+
+The Admin media handler in core/servers/basehttp.py in Django 1.0
+and 0.96 does not properly map URL requests to expected static media
+files, which allows remote attackers to conduct directory traversal
+attacks and read arbitrary files via a crafted URL (CVE-2009-2659).
+
+Algorithmic complexity vulnerability in the forms library in Django
+1.0 before 1.0.4 and 1.1 before 1.1.1 allows remote attackers to cause
+a denial of service (CPU consumption) via a crafted (1) EmailField
+(email address) or (2) URLField (URL) that triggers a large amount
+of backtracking in a regular expression (CVE-2009-3695).
+
+The versions of Django shipping with Mandriva Linux have been updated
+to the latest patched version that include the fix for this issue.
+In addition, they provide other bug fixes.
+
+Affected: 2009.0, 2009.1, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:276
+http://www.djangoproject.com/weblog/2009/jul/28/security/
+http://www.djangoproject.com/weblog/2009/oct/09/security/
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:276 (python-django)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"python-django", rpm:"python-django~1.0.4~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-django", rpm:"python-django~1.0.4~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-django", rpm:"python-django~1.0.4~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_277.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_277.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_277.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,534 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:277 (samba)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66033);
+ script_cve_id("CVE-2009-2813", "CVE-2009-2906", "CVE-2009-2948");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:277 (samba)");
+
+ desc = "
+The remote host is missing an update to samba
+announced via advisory MDVSA-2009:277.
+
+Multiple vulnerabilities has been found and corrected in samba:
+
+The SMB (aka Samba) subsystem in Apple Mac OS X 10.5.8, when Windows
+File Sharing is enabled, does not properly handle errors in resolving
+pathnames, which allows remote authenticated users to bypass intended
+sharing restrictions, and read, create, or modify files, in certain
+circumstances involving user accounts that lack home directories
+(CVE-2009-2813).
+
+smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8,
+and 3.4 before 3.4.2 allows remote authenticated users to cause a
+denial of service (infinite loop) via an unanticipated oplock break
+notification reply packet (CVE-2009-2906).
+
+mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before
+3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root,
+does not properly enforce permissions, which allows local users to
+read part of the credentials file and obtain the password by specifying
+the path to the credentials file and using the --verbose or -v option
+(CVE-2009-2948).
+
+The versions of samba shipping with Mandriva Linux
+CS4/MES5/2008.1/2009.0/2009.1 have been updated to the latest version
+that includes the fixes for these issues. Additionally for 2009.1
+the version upgrade provides many upstream bug fixes such as improved
+Windows(tm) 7 support. The version for CS3 has been patched to address
+these security issues.
+
+Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
+          Enterprise Server 5.0
+
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:277
+http://www.samba.org/samba/security/CVE-2009-2813.html
+http://www.samba.org/samba/security/CVE-2009-2906.html
+http://www.samba.org/samba/security/CVE-2009-2948.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:277 (samba)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-devel", rpm:"libsmbclient0-devel~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-static-devel", rpm:"libsmbclient0-static-devel~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mount-cifs", rpm:"mount-cifs~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nss_wins", rpm:"nss_wins~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-server", rpm:"samba-server~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan-icap", rpm:"samba-vscan-icap~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0", rpm:"lib64smbclient0~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-devel", rpm:"lib64smbclient0-devel~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-static-devel", rpm:"lib64smbclient0-static-devel~3.0.37~0.1mdv2008.1", rls:"MNDK_2008.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi0", rpm:"libnetapi0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi-devel", rpm:"libnetapi-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-devel", rpm:"libsmbclient0-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-static-devel", rpm:"libsmbclient0-static-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes0", rpm:"libsmbsharemodes0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc1", rpm:"libtalloc1~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc-devel", rpm:"libtalloc-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb1", rpm:"libtdb1~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb-devel", rpm:"libtdb-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient-devel", rpm:"libwbclient-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mount-cifs", rpm:"mount-cifs~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nss_wins", rpm:"nss_wins~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-server", rpm:"samba-server~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netapi0", rpm:"lib64netapi0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netapi-devel", rpm:"lib64netapi-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0", rpm:"lib64smbclient0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-devel", rpm:"lib64smbclient0-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-static-devel", rpm:"lib64smbclient0-static-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbsharemodes0", rpm:"lib64smbsharemodes0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbsharemodes-devel", rpm:"lib64smbsharemodes-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64talloc1", rpm:"lib64talloc1~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64talloc-devel", rpm:"lib64talloc-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64tdb1", rpm:"lib64tdb1~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64tdb-devel", rpm:"lib64tdb-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wbclient0", rpm:"lib64wbclient0~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wbclient-devel", rpm:"lib64wbclient-devel~3.2.15~0.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi0", rpm:"libnetapi0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi-devel", rpm:"libnetapi-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-devel", rpm:"libsmbclient0-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-static-devel", rpm:"libsmbclient0-static-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes0", rpm:"libsmbsharemodes0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient-devel", rpm:"libwbclient-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mount-cifs", rpm:"mount-cifs~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nss_wins", rpm:"nss_wins~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-server", rpm:"samba-server~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netapi0", rpm:"lib64netapi0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netapi-devel", rpm:"lib64netapi-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0", rpm:"lib64smbclient0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-devel", rpm:"lib64smbclient0-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-static-devel", rpm:"lib64smbclient0-static-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbsharemodes0", rpm:"lib64smbsharemodes0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbsharemodes-devel", rpm:"lib64smbsharemodes-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wbclient0", rpm:"lib64wbclient0~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wbclient-devel", rpm:"lib64wbclient-devel~3.3.8~0.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-devel", rpm:"libsmbclient0-devel~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-static-devel", rpm:"libsmbclient0-static-devel~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mount-cifs", rpm:"mount-cifs~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nss_wins", rpm:"nss_wins~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-passdb-xml", rpm:"samba-passdb-xml~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-server", rpm:"samba-server~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-smbldap-tools", rpm:"samba-smbldap-tools~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan-antivir", rpm:"samba-vscan-antivir~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan-clamav", rpm:"samba-vscan-clamav~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan-icap", rpm:"samba-vscan-icap~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0", rpm:"lib64smbclient0~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-devel", rpm:"lib64smbclient0-devel~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-static-devel", rpm:"lib64smbclient0-static-devel~3.0.14a~6.11.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-devel", rpm:"libsmbclient0-devel~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-static-devel", rpm:"libsmbclient0-static-devel~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mount-cifs", rpm:"mount-cifs~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nss_wins", rpm:"nss_wins~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-server", rpm:"samba-server~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan-icap", rpm:"samba-vscan-icap~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0", rpm:"lib64smbclient0~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-devel", rpm:"lib64smbclient0-devel~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-static-devel", rpm:"lib64smbclient0-static-devel~3.0.37~0.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi0", rpm:"libnetapi0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi-devel", rpm:"libnetapi-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-devel", rpm:"libsmbclient0-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0-static-devel", rpm:"libsmbclient0-static-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes0", rpm:"libsmbsharemodes0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc1", rpm:"libtalloc1~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc-devel", rpm:"libtalloc-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb1", rpm:"libtdb1~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb-devel", rpm:"libtdb-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient-devel", rpm:"libwbclient-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mount-cifs", rpm:"mount-cifs~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nss_wins", rpm:"nss_wins~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-server", rpm:"samba-server~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netapi0", rpm:"lib64netapi0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64netapi-devel", rpm:"lib64netapi-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0", rpm:"lib64smbclient0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-devel", rpm:"lib64smbclient0-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbclient0-static-devel", rpm:"lib64smbclient0-static-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbsharemodes0", rpm:"lib64smbsharemodes0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64smbsharemodes-devel", rpm:"lib64smbsharemodes-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64talloc1", rpm:"lib64talloc1~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64talloc-devel", rpm:"lib64talloc-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64tdb1", rpm:"lib64tdb1~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64tdb-devel", rpm:"lib64tdb-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wbclient0", rpm:"lib64wbclient0~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64wbclient-devel", rpm:"lib64wbclient-devel~3.2.15~0.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_278.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_278.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_278.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:278 (compiz-fusion-plugins-main)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66034);
+ script_cve_id("CVE-2007-3920", "CVE-2008-6514");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:278 (compiz-fusion-plugins-main)");
+
+ desc = "
+The remote host is missing an update to compiz-fusion-plugins-main
+announced via advisory MDVSA-2009:278.
+
+A vulnerability has been found and corrected in
+compiz-fusion-plugins-main:
+
+The Expo plugin in Compiz Fusion 0.7.8 allows local users with physical
+access to drag the screen saver aside and access the locked desktop
+by using Expo mouse shortcuts, a related issue to CVE-2007-3920
+(CVE-2008-6514).
+
+This update fixes this vulnerability.
+
+Affected: 2009.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:278
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:278 (compiz-fusion-plugins-main)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"compiz-fusion-plugins-main", rpm:"compiz-fusion-plugins-main~0.7.8~0.20080912.1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"compiz-fusion-plugins-main-devel", rpm:"compiz-fusion-plugins-main-devel~0.7.8~0.20080912.1.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_279.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_279.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/mdksa_2009_279.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:279 (ocaml-mysql)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66035);
+ script_cve_id("CVE-2009-2942");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:279 (ocaml-mysql)");
+
+ desc = "
+The remote host is missing an update to ocaml-mysql
+announced via advisory MDVSA-2009:279.
+
+A vulnerability has been found and corrected in ocaml-mysql:
+
+It was discovered that mysql-ocaml, OCaml bindings for MySql,
+was missing a function to call mysql_real_escape_string(). This
+is needed, because mysql_real_escape_string() honours the charset
+of the connection and prevents insufficient escaping, when certain
+multibyte character encodings are used. The added function is called
+real_escape() and takes the established database connection as a first
+argument. The old escape_string() was kept for backwards compatibility
+(CVE-2009-2942).
+
+This update fixes this vulnerability.
+
+Affected: Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:279
+http://www.debian.org/security/2009/dsa-1910
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:279 (ocaml-mysql)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ocaml-mysql", rpm:"ocaml-mysql~1.0.4~9.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ocaml-mysql-devel", rpm:"ocaml-mysql-devel~1.0.4~9.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1500.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,75 @@
+#CESA-2009:1500 66066 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1500 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66066);
+ script_cve_id("CVE-2009-0791", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1500 (xpdf)");
+
+ desc = "
+The remote host is missing updates to xpdf announced in
+advisory CESA-2009:1500.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1500
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1500
+https://rhn.redhat.com/errata/RHSA-2009-1500.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1500 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~2.02~17.el3", rls:"CentOS3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1501.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,74 @@
+#CESA-2009:1501 66067 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1501 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66067);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1501 (xpdf)");
+
+ desc = "
+The remote host is missing updates to xpdf announced in
+advisory CESA-2009:1501.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1501
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1501
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1501 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.00~22.el4_8.1", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1503.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,74 @@
+#CESA-2009:1503 66068 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1503 (gpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66068);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1503 (gpdf)");
+
+ desc = "
+The remote host is missing updates to gpdf announced in
+advisory CESA-2009:1503.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1503
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1503
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1503 (gpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gpdf", rpm:"gpdf~2.8.2~7.7.2.el4_8.5", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1512.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,77 @@
+#CESA-2009:1512 66069 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1512 (kdegraphics)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66069);
+ script_cve_id("CVE-2009-0791", "CVE-2009-1188", "CVE-2009-3604", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1512 (kdegraphics)");
+
+ desc = "
+The remote host is missing updates to kdegraphics announced in
+advisory CESA-2009:1512.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1512
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1512
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1512 (kdegraphics)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kdegraphics", rpm:"kdegraphics~3.3.1~15.el4_8.2", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kdegraphics-devel", rpm:"kdegraphics-devel~3.3.1~15.el4_8.2", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles11_apache2-mod_php1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_apache2-mod_php1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/sles11_apache2-mod_php1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,257 @@
+#
+#VID 6f524102537d5a77ed575f0190599d68
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66009);
+ script_cve_id("CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-2687");
+ script_version ("$Revision$");
+ script_name("SLES11: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-hash
+    php5-iconv
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mysql
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xmlwriter
+    php5-xsl
+    php5-zip
+    php5-zlib
+
+References:
+    https://bugzilla.novell.com/show_bug.cgi?id=540242
+
+More details may also be found by searching for the SuSE
+Enterprise Server 11 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES11: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-hash", rpm:"php5-hash~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlwriter", rpm:"php5-xmlwriter~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zip", rpm:"php5-zip~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.6~50.23.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_016.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,831 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SR:2009:016
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66059);
+ script_cve_id("CVE-2008-5349", "CVE-2008-7159", "CVE-2008-7160", "CVE-2009-1297", "CVE-2009-2408", "CVE-2009-2475", "CVE-2009-2476", "CVE-2009-2625", "CVE-2009-2632", "CVE-2009-2661", "CVE-2009-2670", "CVE-2009-2671", "CVE-2009-2672", "CVE-2009-2673", "CVE-2009-2674", "CVE-2009-2675", "CVE-2009-2689", "CVE-2009-2690", "CVE-2009-3051", "CVE-2009-3111", "CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231", "CVE-2009-3235", "CVE-2009-3241");
+ script_version ("$Revision$");
+ script_name("SuSE Security Summary SUSE-SR:2009:016");
+
+ desc = "
+The remote host is missing updates announced in
+advisory SUSE-SR:2009:016.  SuSE Security Summaries are short
+on detail when it comes to the names of packages affected by
+a particular bug. Because of this, while this test will detect
+out of date packages, it cannot tell you what bugs impact
+which packages, or vice versa.
+
+Solution:
+
+Update all out of date packages.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SR:2009:016");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"aria2", rpm:"aria2~0.16.0~1.19.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot11", rpm:"dovecot11~1.1.7~1.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot11-backend-mysql", rpm:"dovecot11-backend-mysql~1.1.7~1.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot11-backend-pgsql", rpm:"dovecot11-backend-pgsql~1.1.7~1.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot11-backend-sqlite", rpm:"dovecot11-backend-sqlite~1.1.7~1.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot11-devel", rpm:"dovecot11-devel~1.1.7~1.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot11-fts-lucene", rpm:"dovecot11-fts-lucene~1.1.7~1.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc", rpm:"glibc~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-devel", rpm:"glibc-devel~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-html", rpm:"glibc-html~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-i18ndata", rpm:"glibc-i18ndata~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-info", rpm:"glibc-info~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-locale", rpm:"glibc-locale~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-obsolete", rpm:"glibc-obsolete~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"glibc-profile", rpm:"glibc-profile~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gnome-do", rpm:"gnome-do~0.6.1.0~2.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk", rpm:"java-1_6_0-openjdk~1.6_b16~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-demo", rpm:"java-1_6_0-openjdk-demo~1.6_b16~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-devel", rpm:"java-1_6_0-openjdk-devel~1.6_b16~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-javadoc", rpm:"java-1_6_0-openjdk-javadoc~1.6_b16~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-plugin", rpm:"java-1_6_0-openjdk-plugin~1.6_b16~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-src", rpm:"java-1_6_0-openjdk-src~1.6_b16~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi", rpm:"kiwi~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-desc-isoboot", rpm:"kiwi-desc-isoboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-desc-netboot", rpm:"kiwi-desc-netboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-desc-oemboot", rpm:"kiwi-desc-oemboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-desc-usbboot", rpm:"kiwi-desc-usbboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-desc-vmxboot", rpm:"kiwi-desc-vmxboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-desc-xenboot", rpm:"kiwi-desc-xenboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-doc", rpm:"kiwi-doc~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-instsource", rpm:"kiwi-instsource~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-pxeboot", rpm:"kiwi-pxeboot~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-pxeboot-prebuild", rpm:"kiwi-pxeboot-prebuild~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kiwi-tools", rpm:"kiwi-tools~3.01~13.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsatsolver-devel", rpm:"libsatsolver-devel~0.13.8~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libssh-devel", rpm:"libssh-devel~0.2~5.7.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libssh-devel-doc", rpm:"libssh-devel-doc~0.2~5.7.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libssh2", rpm:"libssh2~0.2~5.7.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libusb-0_1-4", rpm:"libusb-0_1-4~0.1.12~139.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libusb-devel", rpm:"libusb-devel~0.1.12~139.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libusbpp-0_1-4", rpm:"libusbpp-0_1-4~0.1.12~139.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libzypp", rpm:"libzypp~5.30.13~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libzypp-devel", rpm:"libzypp-devel~5.30.13~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"nscd", rpm:"nscd~2.9~2.12.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-satsolver", rpm:"perl-satsolver~0.13.8~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"perl-zypp", rpm:"perl-zypp~0.4.8~2.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-hash", rpm:"php5-hash~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-readline", rpm:"php5-readline~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tidy", rpm:"php5-tidy~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlwriter", rpm:"php5-xmlwriter~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zip", rpm:"php5-zip~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.11~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.3.8~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.3.8~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.3.8~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.3.8~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.3.8~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.3.8~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-satsolver", rpm:"python-satsolver~0.13.8~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-zypp", rpm:"python-zypp~0.4.8~2.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ruby-satsolver", rpm:"ruby-satsolver~0.13.8~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ruby-zypp", rpm:"ruby-zypp~0.4.8~2.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"satsolver-tools", rpm:"satsolver-tools~0.13.8~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"sg3_utils", rpm:"sg3_utils~1.27~16.19.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"sg3_utils-devel", rpm:"sg3_utils-devel~1.27~16.19.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"sysconfig", rpm:"sysconfig~0.71.11~7.5.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.0.4~2.11.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-devel", rpm:"wireshark-devel~1.0.4~2.11.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"yast2-gtk", rpm:"yast2-gtk~2.17.14~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"zypper", rpm:"zypper~1.0.12~0.1.3", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot", rpm:"dovecot~1.0.13~24.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot-devel", rpm:"dovecot-devel~1.0.13~24.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk", rpm:"java-1_6_0-openjdk~1.6_b16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-demo", rpm:"java-1_6_0-openjdk-demo~1.6_b16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-devel", rpm:"java-1_6_0-openjdk-devel~1.6_b16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-javadoc", rpm:"java-1_6_0-openjdk-javadoc~1.6_b16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-plugin", rpm:"java-1_6_0-openjdk-plugin~1.6_b16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"java-1_6_0-openjdk-src", rpm:"java-1_6_0-openjdk-src~1.6_b16~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-hash", rpm:"php5-hash~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-readline", rpm:"php5-readline~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tidy", rpm:"php5-tidy~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlwriter", rpm:"php5-xmlwriter~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zip", rpm:"php5-zip~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.11~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.3.8~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.3.8~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.3.8~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.3.8~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.3.8~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.3.8~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.0.0~17.16", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-devel", rpm:"wireshark-devel~1.0.0~17.16", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot", rpm:"dovecot~1.0.5~6.6", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"dovecot-devel", rpm:"dovecot-devel~1.0.5~6.6", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freeradius", rpm:"freeradius~1.1.6~47.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freeradius-devel", rpm:"freeradius-devel~1.1.6~47.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"freeradius-dialupadmin", rpm:"freeradius-dialupadmin~1.1.6~47.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-hash", rpm:"php5-hash~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-readline", rpm:"php5-readline~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tidy", rpm:"php5-tidy~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlwriter", rpm:"php5-xmlwriter~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zip", rpm:"php5-zip~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.11~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~8.2.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~8.2.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~8.2.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~8.2.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~8.2.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~8.2.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~0.99.6~31.22", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"wireshark-devel", rpm:"wireshark-devel~0.99.6~31.22", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_848_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_848_1.nasl	2009-10-19 16:54:42 UTC (rev 5627)
+++ trunk/openvas-plugins/scripts/ubuntu_848_1.nasl	2009-10-19 19:50:22 UTC (rev 5628)
@@ -0,0 +1,172 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-848-1 (zope3)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66062);
+ script_cve_id("CVE-2009-0668", "CVE-2009-0669");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-848-1 (zope3)");
+
+ desc = "
+The remote host is missing an update to zope3
+announced via advisory USN-848-1.
+
+Details follow:
+
+It was discovered that the Zope Object Database (ZODB) database server
+(ZEO) improperly filtered certain commands when a database is shared among
+multiple applications or application instances. A remote attacker could
+send malicious commands to the server and execute arbitrary code.
+(CVE-2009-0668)
+
+It was discovered that the Zope Object Database (ZODB) database server
+(ZEO) did not handle authentication properly when a database is shared
+among multiple applications or application instances. A remote attacker
+could use this flaw to bypass security restrictions. (CVE-2009-0669)
+
+It was discovered that Zope did not limit the number of new object ids a
+client could request. A remote attacker could use this flaw to consume a
+huge amount of resources, leading to a denial of service. (No CVE
+identifier)
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 6.06 LTS:
+  zope3                           3.2.1-1ubuntu1.2
+
+Ubuntu 8.04 LTS:
+  zope3                           3.3.1-5ubuntu2.2
+
+Ubuntu 8.10:
+  zope3                           3.3.1-7ubuntu0.2
+
+Ubuntu 9.04:
+  zope3                           3.4.0-0ubuntu3.3
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-848-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-848-1 (zope3)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"python-zopeinterface", ver:"3.2.1-1ubuntu1.2", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-sandbox", ver:"3.2.1-1ubuntu1.2", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-doc", ver:"3.2.1-1ubuntu1.2", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python2.4-zopeinterface", ver:"3.2.1-1ubuntu1.2", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3", ver:"3.2.1-1ubuntu1.2", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-doc", ver:"3.3.1-5ubuntu2.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-sandbox", ver:"3.3.1-5ubuntu2.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-zopeinterface-dbg", ver:"3.3.1-5ubuntu2.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-zopeinterface", ver:"3.3.1-5ubuntu2.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-dbg", ver:"3.3.1-5ubuntu2.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3", ver:"3.3.1-5ubuntu2.2", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-doc", ver:"3.3.1-7ubuntu0.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-sandbox", ver:"3.3.1-7ubuntu0.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-zopeinterface-dbg", ver:"3.3.1-7ubuntu0.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-zopeinterface", ver:"3.3.1-7ubuntu0.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-dbg", ver:"3.3.1-7ubuntu0.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3", ver:"3.3.1-7ubuntu0.2", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-doc", ver:"3.4.0-0ubuntu3.3", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-sandbox", ver:"3.4.0-0ubuntu3.3", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-zopeinterface-dbg", ver:"3.4.0-0ubuntu3.3", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-zopeinterface", ver:"3.4.0-0ubuntu3.3", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3-dbg", ver:"3.4.0-0ubuntu3.3", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"zope3", ver:"3.4.0-0ubuntu3.3", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list