[Openvas-commits] r5739 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Oct 27 01:38:01 CET 2009


Author: reinke
Date: 2009-10-27 01:37:56 +0100 (Tue, 27 Oct 2009)
New Revision: 5739

Added:
   trunk/openvas-plugins/scripts/RHSA_2009_1522.nasl
   trunk/openvas-plugins/scripts/deb_1912_2.nasl
   trunk/openvas-plugins/scripts/deb_1913_1.nasl
   trunk/openvas-plugins/scripts/deb_1914_1.nasl
   trunk/openvas-plugins/scripts/deb_1915_1.nasl
   trunk/openvas-plugins/scripts/deb_1916_1.nasl
   trunk/openvas-plugins/scripts/deb_1917_1.nasl
   trunk/openvas-plugins/scripts/deb_1918_1.nasl
   trunk/openvas-plugins/scripts/deb_1919_1.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10648.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10662.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10694.nasl
   trunk/openvas-plugins/scripts/fcore_2009_10702.nasl
   trunk/openvas-plugins/scripts/freebsd_elinks.nasl
   trunk/openvas-plugins/scripts/freebsd_squidGuard.nasl
   trunk/openvas-plugins/scripts/freebsd_xpdf4.nasl
   trunk/openvas-plugins/scripts/glsa_200910_01.nasl
   trunk/openvas-plugins/scripts/glsa_200910_02.nasl
   trunk/openvas-plugins/scripts/glsa_200910_03.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_280.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_281.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_282.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_283.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_284.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_285.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_286.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_287.nasl
   trunk/openvas-plugins/scripts/mdksa_2009_288.nasl
   trunk/openvas-plugins/scripts/ovcesa2009_1522.nasl
   trunk/openvas-plugins/scripts/sles10_apache2-mod_php4.nasl
   trunk/openvas-plugins/scripts/sles10_apache21.nasl
   trunk/openvas-plugins/scripts/sles10_cifs-mount2.nasl
   trunk/openvas-plugins/scripts/sles10_firefox35upgrad.nasl
   trunk/openvas-plugins/scripts/sles10_libapr-util10.nasl
   trunk/openvas-plugins/scripts/sles10_mozilla-nspr.nasl
   trunk/openvas-plugins/scripts/sles11_apache2.nasl
   trunk/openvas-plugins/scripts/sles11_cifs-mount0.nasl
   trunk/openvas-plugins/scripts/sles11_libapr-util10.nasl
   trunk/openvas-plugins/scripts/sles9p5060741.nasl
   trunk/openvas-plugins/scripts/sles9p5060841.nasl
   trunk/openvas-plugins/scripts/sles9p5060942.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl
   trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl
   trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl
   trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
   trunk/openvas-plugins/scripts/ubuntu_850_2.nasl
   trunk/openvas-plugins/scripts/ubuntu_851_1.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/ChangeLog	2009-10-27 00:37:56 UTC (rev 5739)
@@ -1,5 +1,57 @@
-2009-10-26  Michael Meyer <michael.meyer at intevation.de>
+2009-10-26  Thomas Reinke <reinke at securityspace.com>
 
+	* scripts/deb_1912_2.nasl,
+	scripts/deb_1913_1.nasl,
+	scripts/deb_1914_1.nasl,
+	scripts/deb_1915_1.nasl,
+	scripts/deb_1916_1.nasl,
+	scripts/deb_1917_1.nasl,
+	scripts/deb_1918_1.nasl,
+	scripts/deb_1919_1.nasl,
+	scripts/freebsd_elinks.nasl,
+	scripts/freebsd_squidGuard.nasl,
+	scripts/freebsd_xpdf4.nasl,
+	scripts/glsa_200910_01.nasl,
+	scripts/glsa_200910_02.nasl,
+	scripts/glsa_200910_03.nasl,
+	scripts/suse_sa_2009_048.nasl,
+	scripts/suse_sa_2009_049.nasl,
+	scripts/suse_sa_2009_050.nasl,
+	scripts/suse_sr_2009_017.nasl,
+	scripts/ubuntu_850_1.nasl,
+	scripts/ubuntu_850_2.nasl,
+	scripts/ubuntu_851_1.nasl,
+	scripts/mdksa_2009_280.nasl,
+	scripts/mdksa_2009_281.nasl,
+	scripts/mdksa_2009_282.nasl,
+	scripts/mdksa_2009_283.nasl,
+	scripts/mdksa_2009_284.nasl,
+	scripts/mdksa_2009_285.nasl,
+	scripts/mdksa_2009_286.nasl,
+	scripts/mdksa_2009_287.nasl,
+	scripts/mdksa_2009_288.nasl,
+	scripts/RHSA_2009_1522.nasl,
+	scripts/fcore_2009_10648.nasl,
+	scripts/fcore_2009_10662.nasl,
+	scripts/fcore_2009_10694.nasl,
+	scripts/fcore_2009_10702.nasl,
+	scripts/ovcesa2009_1522.nasl,
+	scripts/sles9p5060741.nasl,
+	scripts/sles9p5060841.nasl,
+	scripts/sles9p5060942.nasl,
+	scripts/sles10_apache2-mod_php4.nasl,
+	scripts/sles10_apache21.nasl,
+	scripts/sles10_cifs-mount2.nasl,
+	scripts/sles10_firefox35upgrad.nasl,
+	scripts/sles10_libapr-util10.nasl,
+	scripts/sles10_mozilla-nspr.nasl,
+	scripts/sles11_apache2.nasl,
+	scripts/sles11_cifs-mount0.nasl,
+	scripts/sles11_libapr-util10.nasl:
+	Added new scripts
+
+2009-10-26 Michael Meyer <michael.meyer at intevation.de>
+
 	* scripts/firewall_detect.nasl,
 	scripts/finger_akfingerd.nasl,
 	scripts/cvstrac_malformed_uri_dos.nasl,

Added: trunk/openvas-plugins/scripts/RHSA_2009_1522.nasl
===================================================================
--- trunk/openvas-plugins/scripts/RHSA_2009_1522.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/RHSA_2009_1522.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,118 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory RHSA-2009:1522 ()
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66082);
+ script_cve_id("CVE-2005-4881", "CVE-2009-3228");
+ script_version ("$Revision$");
+ script_name("RedHat Security Advisory RHSA-2009:1522");
+
+ desc = "
+The remote host is missing updates announced in
+advisory RHSA-2009:1522.
+
+The kernel packages contain the Linux kernel, the core of any Linux
+operating system.
+
+This update fixes the following security issues:
+
+* multiple, missing initialization flaws were found in the Linux kernel.
+Padding data in several core network structures was not initialized
+properly before being sent to user-space. These flaws could lead to
+information leaks. (CVE-2005-4881, CVE-2009-3228, Moderate)
+
+Solution:
+Please note that this update is available via
+Red Hat Network.  To use Red Hat Network, launch the Red
+Hat Update Agent with the following command: up2date
+
+http://rhn.redhat.com/errata/RHSA-2009-1522.html
+http://www.redhat.com/security/updates/classification/#moderate
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Redhat Security Advisory RHSA-2009:1522");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Red Hat Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-debuginfo", rpm:"kernel-debuginfo~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem", rpm:"kernel-hugemem~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem-devel", rpm:"kernel-hugemem-devel~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU", rpm:"kernel-xenU~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU-devel", rpm:"kernel-xenU-devel~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp", rpm:"kernel-largesmp~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp-devel", rpm:"kernel-largesmp-devel~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.9~89.0.15.EL", rls:"RHENT_4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1912_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1912_2.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1912_2.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,93 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1912-2 (advi)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66099);
+ script_cve_id("CVE-2009-3296", "CVE-2009-2660");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1912-2 (advi)");
+
+ desc = "
+The remote host is missing an update to advi
+announced via advisory DSA 1912-2.
+
+Due to the fact that advi, an active DVI previewer and presenter,
+statically links against camlimages it was neccessary to rebuilt it in
+order to incorporate the latest security fixes for camlimages, which
+could lead to integer overflows via specially crafted TIFF files
+(CVE-2009-3296) or GIFF and JPEG images (CVE-2009-2660).
+
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1.6.0-13+lenny2.
+
+Due to a bug in the archive system, the fix for the oldstable
+distribution (etch) cannot be released at the same time. These problems
+will be fixed in version 1.6.0-12+etch2, once it is available.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), these problems have been fixed in version 1.6.0-14+b1.
+
+
+We recommend that you upgrade your advi package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201912-2
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1912-2 (advi)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"advi-examples", ver:"1.6.0-13+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"advi", ver:"1.6.0-13+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1913_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1913_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1913_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1913-1 (bugzilla)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66096);
+ script_cve_id("CVE-2009-3165");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1913-1 (bugzilla)");
+
+ desc = "
+The remote host is missing an update to bugzilla
+announced via advisory DSA 1913-1.
+
+Max Kanat-Alexander, Bradley Baetz, and Frédéric Buclin discovered an SQL
+injection vulnerability in the Bug.create WebService function in Bugzilla, a
+web-based bug tracking system, which allows remote attackers to execute
+arbitrary SQL commands.
+
+
+For the stable distribution (lenny), this problem has been fixed in version
+3.0.4.1-2+lenny2.
+
+The oldstable distribution (etch) isn't affected by this problem.
+
+For the testing distribution (squeeze) and the unstable distribution
+(sid), this problem will be fixed soon.
+
+
+We recommend that you upgrade your bugzilla packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201913-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1913-1 (bugzilla)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"bugzilla3", ver:"3.0.4.1-2+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bugzilla3-doc", ver:"3.0.4.1-2+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1914_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1914_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1914_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,179 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1914-1 (mapserver)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66097);
+ script_cve_id("CVE-2009-0843", "CVE-2009-0842", "CVE-2009-0841", "CVE-2009-0840", "CVE-2009-0839", "CVE-2009-2281");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1914-1 (mapserver)");
+
+ desc = "
+The remote host is missing an update to mapserver
+announced via advisory DSA 1914-1.
+
+Several vulnerabilities have been discovered in mapserver, a CGI-based
+web framework to publish spatial data and interactive mapping applications.
+The Common Vulnerabilities and Exposures project identifies the following
+problems:
+
+CVE-2009-0843
+
+Missing input validation on a user supplied map queryfile name can be
+used by an attacker to check for the existence of a specific file by
+using the queryfile GET parameter and checking for differences in error
+messages.
+
+CVE-2009-0842
+
+A lack of file type verification when parsing a map file can lead to
+partial disclosure of content from arbitrary files through parser error
+messages.
+
+CVE-2009-0841
+
+Due to missing input validation when saving map files under certain
+conditions it is possible to perform directory traversal attacks and
+to create arbitrary files.
+NOTE: Unless the attacker is able to create directories in the image
+path or there is already a readable directory this doesn't affect
+installations on Linux as the fopen() syscall will fail in case a sub
+path is not readable.
+
+CVE-2009-0839
+
+It was discovered that mapserver is vulnerable to a stack-based buffer
+overflow when processing certain GET parameters.  An attacker can use
+this to execute arbitrary code on the server via crafted id parameters.
+
+CVE-2009-0840
+
+An integer overflow leading to a heap-based buffer overflow when
+processing the Content-Length header of an HTTP request can be used by an
+attacker to execute arbitrary code via crafted POST requests containing
+negative Content-Length values.
+
+CVE-2009-2281
+
+An integer overflow when processing HTTP requests can lead to a
+heap-based buffer overflow. An attacker can use this to execute arbitrary
+code either via crafted Content-Length values or large HTTP request. This
+is partly because of an incomplete fix for CVE-2009-0840.
+
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 4.10.0-5.1+etch4.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 5.0.3-3+lenny4.
+
+For the testing distribution (squeeze), this problem has been fixed in
+version 5.4.2-1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 5.4.2-1.
+
+
+We recommend that you upgrade your mapserver packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201914-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1914-1 (mapserver)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"mapserver-doc", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"cgi-mapserver", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mapserver-bin", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"php5-mapscript", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-mapscript", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"php4-mapscript", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"perl-mapscript", ver:"4.10.0-5.1+etch4", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmapscript-ruby", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mapserver-doc", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"cgi-mapserver", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-mapscript", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"perl-mapscript", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmapscript-ruby1.9", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mapserver-bin", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"php5-mapscript", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmapscript-ruby1.8", ver:"5.0.3-3+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1915_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1915_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1915_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,428 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1915-1 (linux-2.6)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66098);
+ script_cve_id("CVE-2009-2695", "CVE-2009-2903", "CVE-2009-2908", "CVE-2009-2909", "CVE-2009-2910", "CVE-2009-3001", "CVE-2009-3002", "CVE-2009-3286", "CVE-2009-3290", "CVE-2009-3613");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1915-1 (linux-2.6)");
+
+ desc = "
+The remote host is missing an update to linux-2.6
+announced via advisory DSA 1915-1.
+
+Several vulnerabilities have been discovered in the Linux kernel that
+may lead to a denial of service, sensitive memory leak or privilege escalation.
+For details, please visit the referenced security advisories.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201915-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1915-1 (linux-2.6)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"linux-source-2.6.26", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-manual-2.6.26", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-patch-debian-2.6.26", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-support-2.6.26-2", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-doc-2.6.26", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-tree-2.6.26", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-alpha-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-alpha-legacy", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-alpha-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-alpha-generic", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-alpha-generic", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-alpha-legacy", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-alpha", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-common", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-libc-dev", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-xen-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-common-vserver", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-common-openvz", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-modules-2.6.26-2-xen-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-openvz-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xen-linux-system-2.6.26-2-xen-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-openvz-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-common-xen", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-xen-amd64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-ixp4xx", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-arm", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-footbridge", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-ixp4xx", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-footbridge", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-iop32x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-orion5x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-iop32x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-orion5x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-versatile", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-armel", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-versatile", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-parisc-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-parisc64-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-parisc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-parisc-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-parisc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-hppa", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-parisc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-parisc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-parisc64-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-486", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-686-bigmem", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-xen-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-openvz-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-486", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-xen-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xen-linux-system-2.6.26-2-xen-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-i386", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-modules-2.6.26-2-xen-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-686-bigmem", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-686-bigmem", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-openvz-686", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-686-bigmem", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-itanium", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-itanium", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-itanium", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-mckinley", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-ia64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-mckinley", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-mckinley", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-itanium", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-mckinley", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-r5k-ip32", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-mips", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-sb1a-bcm91480b", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-r5k-ip32", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-4kc-malta", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-sb1-bcm91250a", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-sb1-bcm91250a", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-5kc-malta", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-5kc-malta", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-sb1a-bcm91480b", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-r4k-ip22", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-4kc-malta", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-r4k-ip22", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-mipsel", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-r5k-cobalt", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-r5k-cobalt", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-powerpc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-powerpc-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-powerpc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-powerpc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-powerpc-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-powerpc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-powerpc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-powerpc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-powerpc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-powerpc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-powerpc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-s390-tape", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-s390", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-s390x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-s390", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-s390x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-s390", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-s390x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-s390x", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-vserver-sparc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-all-sparc", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-sparc64-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-vserver-sparc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-sparc64-smp", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-image-2.6.26-2-sparc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"linux-headers-2.6.26-2-sparc64", ver:"2.6.26-19lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1916_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1916_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1916_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,105 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1916-1 (kdelibs)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66100);
+ script_cve_id("CVE-2009-2702");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1916-1 (kdelibs)");
+
+ desc = "
+The remote host is missing an update to kdelibs
+announced via advisory DSA 1916-1.
+
+Dan Kaminsky and Moxie Marlinspike discovered that kdelibs, core libraries from
+the official KDE release, does not properly handle a '\0' character in a domain
+name in the Subject Alternative Name field of an X.509 certificate, which allows
+man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted
+certificate issued by a legitimate Certification Authority.
+
+
+For the oldstable distribution (etch), this problem has been fixed in
+version 4:3.5.5a.dfsg.1-8etch3
+
+Due to a bug in the archive system, the fix for the stable distribution
+(lenny), will be released as version 4:3.5.10.dfsg.1-0lenny3 once it is
+available.
+
+For the testing distribution (squeeze), and the unstable distribution (sid),
+this problem has been fixed in version 4:3.5.10.dfsg.1-2.1
+
+
+We recommend that you upgrade your kdelibs pakcages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201916-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1916-1 (kdelibs)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"kdelibs-data", ver:"3.5.5a.dfsg.1-8etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdelibs", ver:"3.5.5a.dfsg.1-8etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdelibs4-doc", ver:"3.5.5a.dfsg.1-8etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdelibs4c2a", ver:"3.5.5a.dfsg.1-8etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdelibs-dbg", ver:"3.5.5a.dfsg.1-8etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdelibs4-dev", ver:"3.5.5a.dfsg.1-8etch3", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1917_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1917_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1917_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,100 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1917-1 (mimetex)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66101);
+ script_cve_id("CVE-2009-1382", "CVE-2009-2459");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1917-1 (mimetex)");
+
+ desc = "
+The remote host is missing an update to mimetex
+announced via advisory DSA 1917-1.
+
+
+Several vulnerabilities have been discovered in mimetex, a lightweight
+alternative to MathML. The Common Vulnerabilities and Exposures project
+identifies the following problems:
+
+CVE-2009-1382
+
+Chris Evans and Damien Miller, discovered multiple stack-based buffer overflow.
+An attacker could execute arbitrary code via a TeX file with long picture,
+circle, input tags.
+
+CVE-2009-2459
+
+Chris Evans discovered that mimeTeX contained certain directives that may be
+unsuitable for handling untrusted user input. A remote attacker can obtain
+sensitive information.
+
+
+For the oldstable distribution (etch), these problems have been fixed in
+version 1.50-1+etch1.
+
+Due to a bug in the archive system, the fix for the stable distribution
+(lenny) will be released as version 1.50-1+lenny1 once it is available.
+
+For the testing distribution (squeeze), and the unstable distribution (sid),
+these problems have been fixed in version 1.50-1.1.
+
+
+We recommend that you upgrade your mimetex packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201917-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1917-1 (mimetex)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"mimetex", ver:"1.50-1+etch1", rls:"DEB4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1918_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1918_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1918_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,107 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1918-1 (phpmyadmin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66102);
+ script_cve_id("CVE-2009-3696", "CVE-2009-3697");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1918-1 (phpmyadmin)");
+
+ desc = "
+The remote host is missing an update to phpmyadmin
+announced via advisory DSA 1918-1.
+
+Several remote vulnerabilities have been discovered in phpMyAdmin, a tool
+to administer MySQL over the web. The Common Vulnerabilities and Exposures
+project identifies the following problems:
+
+CVE-2009-3696
+
+Cross-site scripting (XSS) vulnerability allows remote attackers to
+inject arbitrary web script or HTML via a crafted MySQL table name.
+
+CVE-2009-3697
+
+SQL injection vulnerability in the PDF schema generator functionality
+allows remote attackers to execute arbitrary SQL commands. This issue
+does not apply to the version in Debian 4.0 Etch.
+
+Additionally, extra fortification has been added for the web based setup.php
+script. Although the shipped web server configuration should ensure that
+this script is protected, in practice this turned out not always to be the
+case. The config.inc.php file is not writable anymore by the webserver user
+anymore. See README.Debian for details on how to enable the setup.php
+script if and when you need it.
+
+
+For the old stable distribution (etch), these problems have been fixed in
+version 2.9.1.1-13.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 2.11.8.1-5+lenny3.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 3.2.2.1-1.
+
+We recommend that you upgrade your phpmyadmin package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201918-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1918-1 (phpmyadmin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"phpmyadmin", ver:"2.9.1.1-13", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"phpmyadmin", ver:"2.11.8.1-5+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_1919_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_1919_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/deb_1919_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,98 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 1919-1 (smarty)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66103);
+ script_cve_id("CVE-2008-4810", "CVE-2009-1669");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 1919-1 (smarty)");
+
+ desc = "
+The remote host is missing an update to smarty
+announced via advisory DSA 1919-1.
+
+Several remote vulnerabilities have been discovered in Smarty, a PHP
+templating engine. The Common Vulnerabilities and Exposures project
+identifies the following problems:
+
+CVE-2008-4810
+
+The _expand_quoted_text function allows for certain restrictions in
+templates, like function calling and PHP execution, to be bypassed.
+
+CVE-2009-1669
+
+The smarty_function_math function allows context-dependent attackers
+to execute arbitrary commands via shell metacharacters in the equation
+attribute of the math function.
+
+For the old stable distribution (etch), these problems have been fixed
+in version 2.6.14-1etch2.
+
+For the stable distribution (lenny), these problems have been fixed in
+version 2.6.20-1.2.
+
+For the unstable distribution (sid), these problems will be fixed soon.
+
+We recommend that you upgrade your smarty package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201919-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 1919-1 (smarty)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"smarty", ver:"2.6.14-1etch2", rls:"DEB4.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smarty", ver:"2.6.20-1.2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10648.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10648.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/fcore_2009_10648.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,109 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10648 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66092);
+ script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609", "CVE-2009-3605");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10648 (xpdf)");
+
+ desc = "
+The remote host is missing an update to xpdf
+announced via advisory FEDORA-2009-10648.
+
+Xpdf is an X Window System based viewer for Portable Document Format
+(PDF) files. Xpdf is a small and efficient program which uses
+standard X fonts.
+
+Update Information:
+
+- apply xpdf-3.02pl4 security patch to fix:
+    CVE-2009-1188/CVE-2009-3603, CVE-2009-3604, CVE-2009-3606,
+    CVE-2009-3608, CVE-2009-3609
+
+ChangeLog:
+
+* Fri Oct 16 2009 Tom spot Callaway  - 1:3.02-15
+- apply xpdf-3.02pl4 security patch to fix:
+CVE-2009-3603, CVE-2009-3604, CVE-2009-3605, CVE-2009-3606
+CVE-2009-3608, CVE-2009-3609
+
+References:
+
+[ 1 ] Bug #495907 - CVE-2009-1188 xpdf/poppler: SplashBitmap integer overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=495907
+[ 2 ] Bug #526911 - CVE-2009-3604 xpdf/poppler: Splash::drawImage integer overflow and missing allocation return value check
+https://bugzilla.redhat.com/show_bug.cgi?id=526911
+[ 3 ] Bug #526877 - CVE-2009-3606 xpdf/poppler: PSOutputDev::doImageL1Sep integer overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=526877
+[ 4 ] Bug #526637 - CVE-2009-3608 xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016)
+https://bugzilla.redhat.com/show_bug.cgi?id=526637
+[ 5 ] Bug #526893 - CVE-2009-3609 xpdf/poppler: ImageStream::ImageStream integer overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=526893
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update xpdf' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10648
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10648 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~15.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-debuginfo", rpm:"xpdf-debuginfo~3.02~15.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10662.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10662.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/fcore_2009_10662.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,121 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10662 (pidgin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66093);
+ script_cve_id("CVE-2009-3615", "CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084", "CVE-2009-3085", "CVE-2009-2694");
+ script_version ("$Revision$");
+ script_name("Fedora Core 11 FEDORA-2009-10662 (pidgin)");
+
+ desc = "
+The remote host is missing an update to pidgin
+announced via advisory FEDORA-2009-10662.
+
+Update Information: CVE-2009-3615
+
+ChangeLog:
+
+* Mon Oct 19 2009 Warren Togami  2.6.3-2
+- Upstream backport:
+3abad7606f4a2dfd1903df796f33924b12509a56 msn_servconn_disconnect-crash
+* Fri Oct 16 2009 Warren Togami  2.6.3-1
+- 2.6.3 CVE-2009-3615
+
+References:
+
+[ 1 ] Bug #529357 - CVE-2009-3615 Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client
+https://bugzilla.redhat.com/show_bug.cgi?id=529357
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update pidgin' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10662
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 11 FEDORA-2009-10662 (pidgin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"finch", rpm:"finch~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"finch-devel", rpm:"finch-devel~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple", rpm:"libpurple~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple-devel", rpm:"libpurple-devel~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple-perl", rpm:"libpurple-perl~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple-tcl", rpm:"libpurple-tcl~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-devel", rpm:"pidgin-devel~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-docs", rpm:"pidgin-docs~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-perl", rpm:"pidgin-perl~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-debuginfo", rpm:"pidgin-debuginfo~2.6.3~2.fc11", rls:"FC11")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10694.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10694.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/fcore_2009_10694.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,104 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10694 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66094);
+ script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609", "CVE-2009-3605", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10694 (xpdf)");
+
+ desc = "
+The remote host is missing an update to xpdf
+announced via advisory FEDORA-2009-10694.
+
+Update Information:
+
+- apply xpdf-3.02pl4 security patch to fix:    CVE-2009-1188/CVE-2009-3603,
+CVE-2009-3604, CVE-2009-3606,    CVE-2009-3608, CVE-2009-3609
+
+ChangeLog:
+
+* Fri Oct 16 2009 Tom spot Callaway  - 1:3.02-15
+- apply xpdf-3.02pl4 security patch to fix:
+CVE-2009-3603, CVE-2009-3604, CVE-2009-3605, CVE-2009-3606
+CVE-2009-3608, CVE-2009-3609
+
+References:
+
+[ 1 ] Bug #495907 - CVE-2009-1188 xpdf/poppler: SplashBitmap integer overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=495907
+[ 2 ] Bug #526911 - CVE-2009-3604 xpdf/poppler: Splash::drawImage integer overflow and missing allocation return value check
+https://bugzilla.redhat.com/show_bug.cgi?id=526911
+[ 3 ] Bug #526877 - CVE-2009-3606 xpdf/poppler: PSOutputDev::doImageL1Sep integer overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=526877
+[ 4 ] Bug #526637 - CVE-2009-3608 xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016)
+https://bugzilla.redhat.com/show_bug.cgi?id=526637
+[ 5 ] Bug #526893 - CVE-2009-3609 xpdf/poppler: ImageStream::ImageStream integer overflow
+https://bugzilla.redhat.com/show_bug.cgi?id=526893
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update xpdf' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10694
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10694 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~15.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-debuginfo", rpm:"xpdf-debuginfo~3.02~15.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/fcore_2009_10702.nasl
===================================================================
--- trunk/openvas-plugins/scripts/fcore_2009_10702.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/fcore_2009_10702.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,121 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory FEDORA-2009-10702 (pidgin)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66095);
+ script_cve_id("CVE-2009-3615", "CVE-2009-2703", "CVE-2009-3083", "CVE-2009-3084", "CVE-2009-3085", "CVE-2009-2694");
+ script_version ("$Revision$");
+ script_name("Fedora Core 10 FEDORA-2009-10702 (pidgin)");
+
+ desc = "
+The remote host is missing an update to pidgin
+announced via advisory FEDORA-2009-10702.
+
+Update Information: CVE-2009-3615
+
+ChangeLog:
+
+* Mon Oct 19 2009 Warren Togami  2.6.3-2
+- Upstream backport:
+3abad7606f4a2dfd1903df796f33924b12509a56 msn_servconn_disconnect-crash
+* Fri Oct 16 2009 Warren Togami  2.6.3-1
+- 2.6.3 CVE-2009-3615
+
+References:
+
+[ 1 ] Bug #529357 - CVE-2009-3615 Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client
+https://bugzilla.redhat.com/show_bug.cgi?id=529357
+
+Solution: Apply the appropriate updates.
+
+This update can be installed with the yum update program.  Use 
+su -c 'yum update pidgin' at the command line.
+For more information, refer to Managing Software with yum,
+available at http://docs.fedoraproject.org/yum/.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-10702
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Fedora Core 10 FEDORA-2009-10702 (pidgin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Fedora Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"finch", rpm:"finch~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"finch-devel", rpm:"finch-devel~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple", rpm:"libpurple~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple-devel", rpm:"libpurple-devel~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple-perl", rpm:"libpurple-perl~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpurple-tcl", rpm:"libpurple-tcl~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-devel", rpm:"pidgin-devel~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-docs", rpm:"pidgin-docs~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-perl", rpm:"pidgin-perl~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"pidgin-debuginfo", rpm:"pidgin-debuginfo~2.6.3~2.fc10", rls:"FC10")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_elinks.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_elinks.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/freebsd_elinks.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,86 @@
+#
+#VID 2544f543-c178-11de-b175-001cc0377035
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 2544f543-c178-11de-b175-001cc0377035
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66114);
+ script_cve_id("CVE-2008-7224");
+ script_bugtraq_id(36574);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: elinks");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: elinks
+
+CVE-2008-7224
+Buffer overflow in entity_cache in ELinks before 0.11.4rc0 allows
+remote attackers to cause a denial of service (crash) via a crafted
+link.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380347
+http://linuxfromscratch.org/pipermail/elinks-users/2008-February/001604.html
+http://www.vuxml.org/freebsd/2544f543-c178-11de-b175-001cc0377035.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: elinks");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"elinks");
+if(!isnull(bver) && revcomp(a:bver, b:"0.11.4")<0) {
+    security_note(0, data:"Package elinks version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_squidGuard.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_squidGuard.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/freebsd_squidGuard.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,87 @@
+#
+#VID 692ab645-bf5d-11de-849b-00151797c2d4
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 692ab645-bf5d-11de-849b-00151797c2d4
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66115);
+ script_cve_id("CVE-2009-3700");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: squidGuard");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: squidGuard
+
+CVE-2009-3700
+** RESERVED **
+This candidate has been reserved by an organization or individual that
+will use it when announcing a new security problem.  When the
+candidate has been publicized, the details for this candidate will be
+provided.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091015
+http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019
+http://www.vuxml.org/freebsd/692ab645-bf5d-11de-849b-00151797c2d4.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: squidGuard");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"squidGuard");
+if(!isnull(bver) && revcomp(a:bver, b:"1.4_2")<0) {
+    security_note(0, data:"Package squidGuard version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_xpdf4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_xpdf4.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/freebsd_xpdf4.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,79 @@
+#
+#VID 8581189c-bd5f-11de-8709-0017a4cccfc6
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 8581189c-bd5f-11de-8709-0017a4cccfc6
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66116);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: xpdf");
+
+ desc = "
+The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: xpdf
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.securityfocus.com/archive/1/507261
+http://secunia.com/advisories/37053/
+http://www.vuxml.org/freebsd/8581189c-bd5f-11de-8709-0017a4cccfc6.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: xpdf");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"xpdf");
+if(!isnull(bver) && revcomp(a:bver, b:"3.02_11")<0) {
+    security_note(0, data:"Package xpdf version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/glsa_200910_01.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200910_01.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/glsa_200910_01.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,81 @@
+#
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from Gentoo's XML based advisory
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+                                                                                
+if(description)
+{
+ script_id(66108);
+ script_cve_id("CVE-2009-3490");
+ script_version ("$Revision$");
+ script_name("Gentoo Security Advisory GLSA 200910-01 (wget)");
+
+ desc = "
+The remote host is missing updates announced in
+advisory GLSA 200910-01.
+
+An error in the X.509 certificate handling of Wget might enable remote
+    attackers to conduct man-in-the-middle attacks.
+
+Solution:
+All Wget users should upgrade to the latest version:
+
+    # emerge --sync
+    # emerge --ask --oneshot --verbose =net-misc/wget-1.12
+
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200910-01
+http://bugs.gentoo.org/show_bug.cgi?id=286058
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Gentoo Security Advisory GLSA 200910-01 (wget)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Gentoo Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/gentoo");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-gentoo.inc");
+vuln = 0;
+if(ispkgvuln(pkg:"net-misc/wget", unaffected: make_list("ge 1.12"), vulnerable: make_list("lt 1.12"))) {
+    vuln=1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/glsa_200910_02.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200910_02.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/glsa_200910_02.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,86 @@
+#
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from Gentoo's XML based advisory
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+                                                                                
+if(description)
+{
+ script_id(66109);
+ script_cve_id("CVE-2009-1376", "CVE-2009-1889", "CVE-2009-2694", "CVE-2009-3026");
+ script_version ("$Revision$");
+ script_name("Gentoo Security Advisory GLSA 200910-02 (pidgin)");
+
+ desc = "
+The remote host is missing updates announced in
+advisory GLSA 200910-02.
+
+Multiple vulnerabilities have been discovered in Pidgin, leading to the
+    remote execution of arbitrary code, unauthorized information
+disclosure, or
+    Denial of Service.
+
+Solution:
+All Pidgin users should upgrade to the latest version:
+
+    # emerge --sync
+    # emerge --ask --oneshot --verbose =net-im/pidgin-2.5.9-r1
+
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200910-02
+http://bugs.gentoo.org/show_bug.cgi?id=276000
+http://bugs.gentoo.org/show_bug.cgi?id=281545
+http://bugs.gentoo.org/show_bug.cgi?id=283324
+http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Gentoo Security Advisory GLSA 200910-02 (pidgin)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Gentoo Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/gentoo");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-gentoo.inc");
+vuln = 0;
+if(ispkgvuln(pkg:"net-im/pidgin", unaffected: make_list("ge 2.5.9-r1"), vulnerable: make_list("lt 2.5.9-r1"))) {
+    vuln=1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/glsa_200910_03.nasl
===================================================================
--- trunk/openvas-plugins/scripts/glsa_200910_03.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/glsa_200910_03.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,82 @@
+#
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from Gentoo's XML based advisory
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+                                                                                
+if(description)
+{
+ script_id(66110);
+ script_cve_id("CVE-2007-0045", "CVE-2007-0048", "CVE-2009-2979", "CVE-2009-2980", "CVE-2009-2981", "CVE-2009-2982", "CVE-2009-2983", "CVE-2009-2985", "CVE-2009-2986", "CVE-2009-2988", "CVE-2009-2990", "CVE-2009-2991", "CVE-2009-2993", "CVE-2009-2994", "CVE-2009-2996", "CVE-2009-2997", "CVE-2009-2998", "CVE-2009-3431", "CVE-2009-3458", "CVE-2009-3459", "CVE-2009-3462");
+ script_version ("$Revision$");
+ script_name("Gentoo Security Advisory GLSA 200910-03 (acroread)");
+
+ desc = "
+The remote host is missing updates announced in
+advisory GLSA 200910-03.
+
+Multiple vulnerabilities in Adobe Reader might result in the execution of
+    arbitrary code, or other attacks.
+
+Solution:
+All Adobe Reader users should upgrade to the latest version:
+
+    # emerge --sync
+    # emerge --ask --oneshot --verbose =app-text/acroread-9.2
+
+http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200910-03
+http://bugs.gentoo.org/show_bug.cgi?id=289016
+http://www.adobe.com/support/security/bulletins/apsb09-15.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Gentoo Security Advisory GLSA 200910-03 (acroread)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Gentoo Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/gentoo");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-gentoo.inc");
+vuln = 0;
+if(ispkgvuln(pkg:"app-text/acroread", unaffected: make_list("ge 9.2"), vulnerable: make_list("lt 9.2"))) {
+    vuln=1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_280.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_280.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_280.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,130 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:280 (cups)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66085);
+ script_cve_id("CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:280 (cups)");
+
+ desc = "
+The remote host is missing an update to cups
+announced via advisory MDVSA-2009:280.
+
+Two integer overflow flaws were found in the CUPS pdftops filter. An
+attacker could create a malicious PDF file that would cause pdftops
+to crash or, potentially, execute arbitrary code as the lp user if
+the file was printed. (CVE-2009-3608, CVE-2009-3609)
+
+This update corrects the problem.
+
+Affected: 2009.1
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:280
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:280 (cups)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libpoppler4", rpm:"libpoppler4~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-devel", rpm:"libpoppler-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-glib4", rpm:"libpoppler-glib4~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-glib-devel", rpm:"libpoppler-glib-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt2", rpm:"libpoppler-qt2~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt4-3", rpm:"libpoppler-qt4-3~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt4-devel", rpm:"libpoppler-qt4-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt-devel", rpm:"libpoppler-qt-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler4", rpm:"lib64poppler4~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-devel", rpm:"lib64poppler-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-glib4", rpm:"lib64poppler-glib4~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-glib-devel", rpm:"lib64poppler-glib-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt2", rpm:"lib64poppler-qt2~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt4-3", rpm:"lib64poppler-qt4-3~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt4-devel", rpm:"lib64poppler-qt4-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt-devel", rpm:"lib64poppler-qt-devel~0.10.6~1.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_281.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_281.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_281.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,140 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:281 (cups)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66087);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0949", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:281 (cups)");
+
+ desc = "
+The remote host is missing an update to cups
+announced via advisory MDVSA-2009:281.
+
+Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2
+and earlier, CUPS 1.3.9 and earlier, and other products allow
+remote attackers to cause a denial of service (crash) via a
+crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2)
+JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap
+(CVE-2009-0146, CVE-2009-0147).
+
+Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and
+earlier allows remote attackers to cause a denial of service (daemon
+crash) and possibly execute arbitrary code via a crafted TIFF image,
+which is not properly handled by the (1) _cupsImageReadTIFF function
+in the imagetops filter and (2) imagetoraster filter, leading to a
+heap-based buffer overflow (CVE-2009-0163).
+
+Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier,
+as used in Poppler and other products, when running on Mac OS X,
+has unspecified impact, related to g*allocn (CVE-2009-0165).
+
+The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier,
+and other products allows remote attackers to cause a denial of service
+(crash) via a crafted PDF file that triggers a free of uninitialized
+memory (CVE-2009-0166).
+
+Multiple integer overflows in the pdftops filter in CUPS 1.1.17,
+1.1.22, and 1.3.7 allow remote attackers to cause a denial of service
+(application crash) or possibly execute arbitrary code via a crafted
+PDF file that triggers a heap-based buffer overflow, possibly
+related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c,
+(4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE:
+the JBIG2Stream.cxx vector may overlap CVE-2009-1179 (CVE-2009-0791).
+
+The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10
+does not properly initialize memory for IPP request packets, which
+allows remote attackers to cause a denial of service (NULL pointer
+dereference and daemon crash) via a scheduler request with two
+consecutive IPP_TAG_UNSUPPORTED tags (CVE-2009-0949).
+
+Two integer overflow flaws were found in the CUPS pdftops filter. An
+attacker could create a malicious PDF file that would cause pdftops
+to crash or, potentially, execute arbitrary code as the lp user if
+the file was printed. (CVE-2009-3608, CVE-2009-3609)
+
+This update corrects the problems.
+
+Affected: Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:281
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:281 (cups)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-common", rpm:"cups-common~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-serial", rpm:"cups-serial~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2", rpm:"libcups2~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2-devel", rpm:"libcups2-devel~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cups", rpm:"php-cups~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2", rpm:"lib64cups2~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2-devel", rpm:"lib64cups2-devel~1.2.4~0.12.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_282.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_282.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_282.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,270 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:282 (cups)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66084);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0949", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:282 (cups)");
+
+ desc = "
+The remote host is missing an update to cups
+announced via advisory MDVSA-2009:282. For details,
+please visit the referenced security advisories.
+
+This update corrects the problems.
+
+Affected: 2009.0, Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:282
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:282 (cups)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"acl", rpm:"acl~2.2.47~4.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-common", rpm:"cups-common~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-serial", rpm:"cups-serial~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libacl1", rpm:"libacl1~2.2.47~4.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libacl-devel", rpm:"libacl-devel~2.2.47~4.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2", rpm:"libcups2~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2-devel", rpm:"libcups2-devel~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler3", rpm:"libpoppler3~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-devel", rpm:"libpoppler-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-glib3", rpm:"libpoppler-glib3~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-glib-devel", rpm:"libpoppler-glib-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt2", rpm:"libpoppler-qt2~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt4-3", rpm:"libpoppler-qt4-3~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt4-devel", rpm:"libpoppler-qt4-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt-devel", rpm:"libpoppler-qt-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cups", rpm:"php-cups~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64acl1", rpm:"lib64acl1~2.2.47~4.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64acl-devel", rpm:"lib64acl-devel~2.2.47~4.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2", rpm:"lib64cups2~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2-devel", rpm:"lib64cups2-devel~1.3.10~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler3", rpm:"lib64poppler3~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-devel", rpm:"lib64poppler-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-glib3", rpm:"lib64poppler-glib3~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-glib-devel", rpm:"lib64poppler-glib-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt2", rpm:"lib64poppler-qt2~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt4-3", rpm:"lib64poppler-qt4-3~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt4-devel", rpm:"lib64poppler-qt4-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt-devel", rpm:"lib64poppler-qt-devel~0.8.7~2.3mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acl", rpm:"acl~2.2.47~4.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-common", rpm:"cups-common~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-serial", rpm:"cups-serial~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libacl1", rpm:"libacl1~2.2.47~4.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libacl-devel", rpm:"libacl-devel~2.2.47~4.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2", rpm:"libcups2~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2-devel", rpm:"libcups2-devel~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenslp1", rpm:"libopenslp1~1.2.1~8.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libopenslp1-devel", rpm:"libopenslp1-devel~1.2.1~8.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler3", rpm:"libpoppler3~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-devel", rpm:"libpoppler-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-glib3", rpm:"libpoppler-glib3~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-glib-devel", rpm:"libpoppler-glib-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt2", rpm:"libpoppler-qt2~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt4-3", rpm:"libpoppler-qt4-3~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt4-devel", rpm:"libpoppler-qt4-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libpoppler-qt-devel", rpm:"libpoppler-qt-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"openslp", rpm:"openslp~1.2.1~8.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cups", rpm:"php-cups~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64acl1", rpm:"lib64acl1~2.2.47~4.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64acl-devel", rpm:"lib64acl-devel~2.2.47~4.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2", rpm:"lib64cups2~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2-devel", rpm:"lib64cups2-devel~1.3.10~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openslp1", rpm:"lib64openslp1~1.2.1~8.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64openslp1-devel", rpm:"lib64openslp1-devel~1.2.1~8.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler3", rpm:"lib64poppler3~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-devel", rpm:"lib64poppler-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-glib3", rpm:"lib64poppler-glib3~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-glib-devel", rpm:"lib64poppler-glib-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt2", rpm:"lib64poppler-qt2~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt4-3", rpm:"lib64poppler-qt4-3~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt4-devel", rpm:"lib64poppler-qt4-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64poppler-qt-devel", rpm:"lib64poppler-qt-devel~0.8.7~2.3mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_283.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_283.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_283.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,111 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:283 (cups)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66083);
+ script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-1179", "CVE-2009-0791", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-0949", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1196", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:283 (cups)");
+
+ desc = "
+The remote host is missing an update to cups
+announced via advisory MDVSA-2009:283. For details,
+please visit the referenced security advisories.
+
+This update corrects the problems.
+
+Affected: Corporate 3.0, Multi Network Firewall 2.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:283
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:283 (cups)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-common", rpm:"cups-common~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-serial", rpm:"cups-serial~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2", rpm:"libcups2~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2-devel", rpm:"libcups2-devel~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2", rpm:"lib64cups2~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64cups2-devel", rpm:"lib64cups2-devel~1.1.20~5.21.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups", rpm:"cups~1.1.20~5.21.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-common", rpm:"cups-common~1.1.20~5.21.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cups-serial", rpm:"cups-serial~1.1.20~5.21.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2", rpm:"libcups2~1.1.20~5.21.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libcups2-devel", rpm:"libcups2-devel~1.1.20~5.21.M20mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_284.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_284.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_284.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,202 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:284 (gd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66086);
+ script_cve_id("CVE-2009-3293", "CVE-2009-3546");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:284 (gd)");
+
+ desc = "
+The remote host is missing an update to gd
+announced via advisory MDVSA-2009:284.
+
+A vulnerability has been found and corrected in gd:
+
+The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the
+GD Graphics Library 2.x, does not properly verify a certain colorsTotal
+structure member, which might allow remote attackers to conduct
+buffer overflow or buffer over-read attacks via a crafted GD file,
+a different vulnerability than CVE-2009-3293.  NOTE: some of these
+details are obtained from third party information (CVE-2009-3546).
+
+This update fixes this vulnerability.
+
+Affected: 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
+          Enterprise Server 5.0, Multi Network Firewall 2.0
+
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:284
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:284 (gd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd-devel", rpm:"libgd-devel~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd-static-devel", rpm:"libgd-static-devel~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2", rpm:"lib64gd2~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd-devel", rpm:"lib64gd-devel~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd-static-devel", rpm:"lib64gd-static-devel~2.0.35~6.1mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd-devel", rpm:"libgd-devel~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd-static-devel", rpm:"libgd-static-devel~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2", rpm:"lib64gd2~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd-devel", rpm:"lib64gd-devel~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd-static-devel", rpm:"lib64gd-static-devel~2.0.35~8.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-devel", rpm:"libgd2-devel~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-static-devel", rpm:"libgd2-static-devel~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2", rpm:"lib64gd2~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2-devel", rpm:"lib64gd2-devel~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2-static-devel", rpm:"lib64gd2-static-devel~2.0.15~4.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-devel", rpm:"libgd2-devel~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-static-devel", rpm:"libgd2-static-devel~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2", rpm:"lib64gd2~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2-devel", rpm:"lib64gd2-devel~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2-static-devel", rpm:"lib64gd2-static-devel~2.0.33~3.6.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd-devel", rpm:"libgd-devel~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd-static-devel", rpm:"libgd-static-devel~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd2", rpm:"lib64gd2~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd-devel", rpm:"lib64gd-devel~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64gd-static-devel", rpm:"lib64gd-static-devel~2.0.35~6.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"gd-utils", rpm:"gd-utils~2.0.15~4.3.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2", rpm:"libgd2~2.0.15~4.3.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-devel", rpm:"libgd2-devel~2.0.15~4.3.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libgd2-static-devel", rpm:"libgd2-static-devel~2.0.15~4.3.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_285.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_285.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_285.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,772 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:285 (php)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66088);
+ script_cve_id("CVE-2009-3293", "CVE-2009-3546");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:285 (php)");
+
+ desc = "
+The remote host is missing an update to php
+announced via advisory MDVSA-2009:285.
+
+Multiple vulnerabilities has been found and corrected in php:
+
+The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the
+GD Graphics Library 2.x, does not properly verify a certain colorsTotal
+structure member, which might allow remote attackers to conduct
+buffer overflow or buffer over-read attacks via a crafted GD file,
+a different vulnerability than CVE-2009-3293.  NOTE: some of these
+details are obtained from third party information (CVE-2009-3546).
+
+Added two upstream patches to address a bypass vulnerability in
+open_basedir and safe_mode.
+
+Additionally on CS4 a regression was found and fixed when using the
+gd-bundled.so variant from the php-gd package.
+
+This update fixes these vulnerabilities.
+
+Affected: 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
+          Enterprise Server 5.0, Multi Network Firewall 2.0
+
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:285
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:285 (php)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libphp5_common5", rpm:"libphp5_common5~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-bcmath", rpm:"php-bcmath~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-bz2", rpm:"php-bz2~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-calendar", rpm:"php-calendar~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cgi", rpm:"php-cgi~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cli", rpm:"php-cli~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ctype", rpm:"php-ctype~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-curl", rpm:"php-curl~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dba", rpm:"php-dba~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dbase", rpm:"php-dbase~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-devel", rpm:"php-devel~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dom", rpm:"php-dom~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-exif", rpm:"php-exif~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-fcgi", rpm:"php-fcgi~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-filter", rpm:"php-filter~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ftp", rpm:"php-ftp~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gd", rpm:"php-gd~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gettext", rpm:"php-gettext~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gmp", rpm:"php-gmp~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-hash", rpm:"php-hash~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-iconv", rpm:"php-iconv~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-imap", rpm:"php-imap~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-json", rpm:"php-json~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ldap", rpm:"php-ldap~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mbstring", rpm:"php-mbstring~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mcrypt", rpm:"php-mcrypt~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mhash", rpm:"php-mhash~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mime_magic", rpm:"php-mime_magic~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ming", rpm:"php-ming~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mssql", rpm:"php-mssql~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mysql", rpm:"php-mysql~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mysqli", rpm:"php-mysqli~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ncurses", rpm:"php-ncurses~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-odbc", rpm:"php-odbc~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-openssl", rpm:"php-openssl~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pcntl", rpm:"php-pcntl~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo", rpm:"php-pdo~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_dblib", rpm:"php-pdo_dblib~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_mysql", rpm:"php-pdo_mysql~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_odbc", rpm:"php-pdo_odbc~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_pgsql", rpm:"php-pdo_pgsql~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_sqlite", rpm:"php-pdo_sqlite~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pgsql", rpm:"php-pgsql~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-posix", rpm:"php-posix~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pspell", rpm:"php-pspell~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-readline", rpm:"php-readline~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-recode", rpm:"php-recode~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-session", rpm:"php-session~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-shmop", rpm:"php-shmop~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-snmp", rpm:"php-snmp~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-soap", rpm:"php-soap~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sockets", rpm:"php-sockets~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sqlite", rpm:"php-sqlite~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sybase", rpm:"php-sybase~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvmsg", rpm:"php-sysvmsg~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvsem", rpm:"php-sysvsem~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvshm", rpm:"php-sysvshm~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-tidy", rpm:"php-tidy~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-tokenizer", rpm:"php-tokenizer~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-wddx", rpm:"php-wddx~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xml", rpm:"php-xml~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlreader", rpm:"php-xmlreader~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlrpc", rpm:"php-xmlrpc~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlwriter", rpm:"php-xmlwriter~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xsl", rpm:"php-xsl~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-zlib", rpm:"php-zlib~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64php5_common5", rpm:"lib64php5_common5~5.2.6~18.8mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libphp5_common5", rpm:"libphp5_common5~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-bcmath", rpm:"php-bcmath~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-bz2", rpm:"php-bz2~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-calendar", rpm:"php-calendar~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cgi", rpm:"php-cgi~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cli", rpm:"php-cli~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ctype", rpm:"php-ctype~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-curl", rpm:"php-curl~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dba", rpm:"php-dba~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dbase", rpm:"php-dbase~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-devel", rpm:"php-devel~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dom", rpm:"php-dom~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-exif", rpm:"php-exif~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-fcgi", rpm:"php-fcgi~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-filter", rpm:"php-filter~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ftp", rpm:"php-ftp~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gd", rpm:"php-gd~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gettext", rpm:"php-gettext~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gmp", rpm:"php-gmp~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-hash", rpm:"php-hash~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-iconv", rpm:"php-iconv~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-imap", rpm:"php-imap~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-json", rpm:"php-json~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ldap", rpm:"php-ldap~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mbstring", rpm:"php-mbstring~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mcrypt", rpm:"php-mcrypt~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mhash", rpm:"php-mhash~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mime_magic", rpm:"php-mime_magic~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ming", rpm:"php-ming~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mssql", rpm:"php-mssql~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mysql", rpm:"php-mysql~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mysqli", rpm:"php-mysqli~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ncurses", rpm:"php-ncurses~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-odbc", rpm:"php-odbc~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-openssl", rpm:"php-openssl~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pcntl", rpm:"php-pcntl~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo", rpm:"php-pdo~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_dblib", rpm:"php-pdo_dblib~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_mysql", rpm:"php-pdo_mysql~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_odbc", rpm:"php-pdo_odbc~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_pgsql", rpm:"php-pdo_pgsql~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_sqlite", rpm:"php-pdo_sqlite~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pgsql", rpm:"php-pgsql~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-posix", rpm:"php-posix~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pspell", rpm:"php-pspell~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-readline", rpm:"php-readline~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-recode", rpm:"php-recode~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-session", rpm:"php-session~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-shmop", rpm:"php-shmop~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-snmp", rpm:"php-snmp~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-soap", rpm:"php-soap~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sockets", rpm:"php-sockets~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sqlite", rpm:"php-sqlite~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sybase", rpm:"php-sybase~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvmsg", rpm:"php-sysvmsg~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvsem", rpm:"php-sysvsem~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvshm", rpm:"php-sysvshm~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-tidy", rpm:"php-tidy~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-tokenizer", rpm:"php-tokenizer~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-wddx", rpm:"php-wddx~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xml", rpm:"php-xml~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlreader", rpm:"php-xmlreader~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlrpc", rpm:"php-xmlrpc~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlwriter", rpm:"php-xmlwriter~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xsl", rpm:"php-xsl~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-zip", rpm:"php-zip~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-zlib", rpm:"php-zlib~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64php5_common5", rpm:"lib64php5_common5~5.2.9~6.3mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libphp_common432", rpm:"libphp_common432~4.3.4~4.31.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php432-devel", rpm:"php432-devel~4.3.4~4.31.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cgi", rpm:"php-cgi~4.3.4~4.31.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cli", rpm:"php-cli~4.3.4~4.31.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gd", rpm:"php-gd~4.3.4~1.9.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64php_common432", rpm:"lib64php_common432~4.3.4~4.31.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libphp4_common4", rpm:"libphp4_common4~4.4.4~1.13.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libphp5_common5", rpm:"libphp5_common5~5.1.6~1.15.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php4-cgi", rpm:"php4-cgi~4.4.4~1.13.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php4-cli", rpm:"php4-cli~4.4.4~1.13.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php4-devel", rpm:"php4-devel~4.4.4~1.13.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php4-gd", rpm:"php4-gd~4.4.4~1.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cgi", rpm:"php-cgi~5.1.6~1.15.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cli", rpm:"php-cli~5.1.6~1.15.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-devel", rpm:"php-devel~5.1.6~1.15.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-fcgi", rpm:"php-fcgi~5.1.6~1.15.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gd", rpm:"php-gd~5.1.6~1.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-posix", rpm:"php-posix~5.1.6~1.1.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64php4_common4", rpm:"lib64php4_common4~4.4.4~1.13.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64php5_common5", rpm:"lib64php5_common5~5.1.6~1.15.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libphp5_common5", rpm:"libphp5_common5~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-bcmath", rpm:"php-bcmath~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-bz2", rpm:"php-bz2~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-calendar", rpm:"php-calendar~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cgi", rpm:"php-cgi~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cli", rpm:"php-cli~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ctype", rpm:"php-ctype~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-curl", rpm:"php-curl~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dba", rpm:"php-dba~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dbase", rpm:"php-dbase~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-devel", rpm:"php-devel~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-dom", rpm:"php-dom~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-exif", rpm:"php-exif~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-fcgi", rpm:"php-fcgi~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-filter", rpm:"php-filter~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ftp", rpm:"php-ftp~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gd", rpm:"php-gd~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gettext", rpm:"php-gettext~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gmp", rpm:"php-gmp~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-hash", rpm:"php-hash~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-iconv", rpm:"php-iconv~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-imap", rpm:"php-imap~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-json", rpm:"php-json~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ldap", rpm:"php-ldap~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mbstring", rpm:"php-mbstring~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mcrypt", rpm:"php-mcrypt~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mhash", rpm:"php-mhash~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mime_magic", rpm:"php-mime_magic~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ming", rpm:"php-ming~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mssql", rpm:"php-mssql~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mysql", rpm:"php-mysql~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-mysqli", rpm:"php-mysqli~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-ncurses", rpm:"php-ncurses~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-odbc", rpm:"php-odbc~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-openssl", rpm:"php-openssl~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pcntl", rpm:"php-pcntl~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo", rpm:"php-pdo~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_dblib", rpm:"php-pdo_dblib~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_mysql", rpm:"php-pdo_mysql~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_odbc", rpm:"php-pdo_odbc~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_pgsql", rpm:"php-pdo_pgsql~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pdo_sqlite", rpm:"php-pdo_sqlite~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pgsql", rpm:"php-pgsql~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-posix", rpm:"php-posix~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-pspell", rpm:"php-pspell~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-readline", rpm:"php-readline~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-recode", rpm:"php-recode~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-session", rpm:"php-session~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-shmop", rpm:"php-shmop~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-snmp", rpm:"php-snmp~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-soap", rpm:"php-soap~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sockets", rpm:"php-sockets~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sqlite", rpm:"php-sqlite~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sybase", rpm:"php-sybase~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvmsg", rpm:"php-sysvmsg~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvsem", rpm:"php-sysvsem~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-sysvshm", rpm:"php-sysvshm~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-tidy", rpm:"php-tidy~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-tokenizer", rpm:"php-tokenizer~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-wddx", rpm:"php-wddx~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xml", rpm:"php-xml~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlreader", rpm:"php-xmlreader~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlrpc", rpm:"php-xmlrpc~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xmlwriter", rpm:"php-xmlwriter~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-xsl", rpm:"php-xsl~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-zlib", rpm:"php-zlib~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"lib64php5_common5", rpm:"lib64php5_common5~5.2.6~18.9mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libphp_common432", rpm:"libphp_common432~4.3.4~4.31.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php432-devel", rpm:"php432-devel~4.3.4~4.31.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cgi", rpm:"php-cgi~4.3.4~4.31.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-cli", rpm:"php-cli~4.3.4~4.31.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php-gd", rpm:"php-gd~4.3.4~1.9.C30mdk", rls:"MNDK_2.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_286.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_286.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_286.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,101 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:286 (ocaml-camlimages)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66089);
+ script_cve_id("CVE-2009-2295", "CVE-2009-2660", "CVE-2009-3296");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:286 (ocaml-camlimages)");
+
+ desc = "
+The remote host is missing an update to ocaml-camlimages
+announced via advisory MDVSA-2009:286.
+
+Multiple vulnerabilities has been found and corrected in
+ocaml-camlimages:
+
+Multiple integer overflows in CamlImages 2.2 and earlier might allow
+context-dependent attackers to execute arbitrary code via a crafted
+PNG image with large width and height values that trigger a heap-based
+buffer overflow in the (1) read_png_file or (2) read_png_file_as_rgb24
+function (CVE-2009-2295).
+
+Multiple integer overflows in CamlImages 2.2 might allow
+context-dependent attackers to execute arbitrary code via images
+containing large width and height values that trigger a heap-based
+buffer overflow, related to (1) crafted GIF files (gifread.c) and
+(2) crafted JPEG files (jpegread.c), a different vulnerability than
+CVE-2009-2295 (CVE-2009-2660).
+
+Multiple integer overflows in tiffread.c in CamlImages 2.2 might allow
+remote attackers to execute arbitrary code via TIFF images containing
+large width and height values that trigger heap-based buffer overflows
+(CVE-2009-3296).
+
+This update fixes these vulnerabilities.
+
+Affected: Enterprise Server 5.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:286
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:286 (ocaml-camlimages)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"ocaml-camlimages", rpm:"ocaml-camlimages~2.20~13.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ocaml-camlimages-devel", rpm:"ocaml-camlimages-devel~2.20~13.1mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_287.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_287.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_287.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,126 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:287 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66090);
+ script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:287 (xpdf)");
+
+ desc = "
+The remote host is missing an update to xpdf
+announced via advisory MDVSA-2009:287.
+
+Multiple vulnerabilities has been found and corrected in xpdf:
+
+Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x
+before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers
+to execute arbitrary code via a crafted PDF document that triggers a
+heap-based buffer overflow.  NOTE: some of these details are obtained
+from third party information.  NOTE: this issue reportedly exists
+because of an incomplete fix for CVE-2009-1188 (CVE-2009-3603).
+
+The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x
+before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF,
+does not properly allocate memory, which allows remote attackers to
+cause a denial of service (application crash) or possibly execute
+arbitrary code via a crafted PDF document that triggers a NULL pointer
+dereference or a heap-based buffer overflow (CVE-2009-3604).
+
+Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf
+before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might
+allow remote attackers to execute arbitrary code via a crafted PDF
+document that triggers a heap-based buffer overflow (CVE-2009-3606).
+
+Integer overflow in the ObjectStream::ObjectStream function in XRef.cc
+in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in
+GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote
+attackers to execute arbitrary code via a crafted PDF document that
+triggers a heap-based buffer overflow (CVE-2009-3608).
+
+Integer overflow in the ImageStream::ImageStream function in Stream.cc
+in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf,
+kdegraphics KPDF, and CUPS pdftops, allows remote attackers to
+cause a denial of service (application crash) via a crafted PDF
+document that triggers a NULL pointer dereference or buffer over-read
+(CVE-2009-3609).
+
+This update fixes these vulnerabilities.
+
+Affected: 2009.0, Corporate 3.0, Corporate 4.0
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:287
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:287 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~12.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-common", rpm:"xpdf-common~3.02~12.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~0.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.02~0.3.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf", rpm:"xpdf~3.02~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"xpdf-tools", rpm:"xpdf-tools~3.02~0.3.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/mdksa_2009_288.nasl
===================================================================
--- trunk/openvas-plugins/scripts/mdksa_2009_288.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/mdksa_2009_288.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,358 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory MDVSA-2009:288 (proftpd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66091);
+ script_cve_id("CVE-2009-2408");
+ script_version ("$Revision$");
+ script_name("Mandrake Security Advisory MDVSA-2009:288 (proftpd)");
+
+ desc = "
+The remote host is missing an update to proftpd
+announced via advisory MDVSA-2009:288.
+
+A vulnerability has been identified and corrected in proftpd:
+
+The mod_tls module in proftpd < 1.3.2b is vulnerable to a similar
+security issue as CVE-2009-2408.
+
+This update fixes these vulnerability.
+
+Affected: 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
+          Enterprise Server 5.0
+
+
+Solution:
+To upgrade automatically use MandrakeUpdate or urpmi.  The verification
+of md5 checksums and GPG signatures is performed automatically for you.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:288
+http://bugs.proftpd.org/show_bug.cgi?id=3275
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Mandrake Security Advisory MDVSA-2009:288 (proftpd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Mandrake Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-devel", rpm:"proftpd-devel~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_autohost", rpm:"proftpd-mod_autohost~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ban", rpm:"proftpd-mod_ban~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_case", rpm:"proftpd-mod_case~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ctrls_admin", rpm:"proftpd-mod_ctrls_admin~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_gss", rpm:"proftpd-mod_gss~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ifsession", rpm:"proftpd-mod_ifsession~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ldap", rpm:"proftpd-mod_ldap~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_load", rpm:"proftpd-mod_load~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab", rpm:"proftpd-mod_quotatab~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_file", rpm:"proftpd-mod_quotatab_file~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_ldap", rpm:"proftpd-mod_quotatab_ldap~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_radius", rpm:"proftpd-mod_quotatab_radius~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_sql", rpm:"proftpd-mod_quotatab_sql~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_radius", rpm:"proftpd-mod_radius~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ratio", rpm:"proftpd-mod_ratio~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_rewrite", rpm:"proftpd-mod_rewrite~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_shaper", rpm:"proftpd-mod_shaper~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_site_misc", rpm:"proftpd-mod_site_misc~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql", rpm:"proftpd-mod_sql~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql_mysql", rpm:"proftpd-mod_sql_mysql~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql_postgres", rpm:"proftpd-mod_sql_postgres~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_time", rpm:"proftpd-mod_time~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_tls", rpm:"proftpd-mod_tls~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_vroot", rpm:"proftpd-mod_vroot~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap", rpm:"proftpd-mod_wrap~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap_file", rpm:"proftpd-mod_wrap_file~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap_sql", rpm:"proftpd-mod_wrap_sql~1.3.2~0.2mdv2009.0", rls:"MNDK_2009.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-devel", rpm:"proftpd-devel~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_autohost", rpm:"proftpd-mod_autohost~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ban", rpm:"proftpd-mod_ban~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_case", rpm:"proftpd-mod_case~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ctrls_admin", rpm:"proftpd-mod_ctrls_admin~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_gss", rpm:"proftpd-mod_gss~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ifsession", rpm:"proftpd-mod_ifsession~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ldap", rpm:"proftpd-mod_ldap~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_load", rpm:"proftpd-mod_load~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab", rpm:"proftpd-mod_quotatab~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_file", rpm:"proftpd-mod_quotatab_file~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_ldap", rpm:"proftpd-mod_quotatab_ldap~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_radius", rpm:"proftpd-mod_quotatab_radius~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_sql", rpm:"proftpd-mod_quotatab_sql~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_radius", rpm:"proftpd-mod_radius~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ratio", rpm:"proftpd-mod_ratio~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_rewrite", rpm:"proftpd-mod_rewrite~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sftp", rpm:"proftpd-mod_sftp~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_shaper", rpm:"proftpd-mod_shaper~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_site_misc", rpm:"proftpd-mod_site_misc~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql", rpm:"proftpd-mod_sql~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql_mysql", rpm:"proftpd-mod_sql_mysql~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql_postgres", rpm:"proftpd-mod_sql_postgres~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_time", rpm:"proftpd-mod_time~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_tls", rpm:"proftpd-mod_tls~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_vroot", rpm:"proftpd-mod_vroot~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap", rpm:"proftpd-mod_wrap~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap_file", rpm:"proftpd-mod_wrap_file~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap_sql", rpm:"proftpd-mod_wrap_sql~1.3.2~4.1mdv2009.1", rls:"MNDK_2009.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2~0.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-anonymous", rpm:"proftpd-anonymous~1.3.2~0.2.C30mdk", rls:"MNDK_3.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2~0.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-anonymous", rpm:"proftpd-anonymous~1.3.2~0.2.20060mlcs4", rls:"MNDK_4.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd", rpm:"proftpd~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-devel", rpm:"proftpd-devel~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_autohost", rpm:"proftpd-mod_autohost~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ban", rpm:"proftpd-mod_ban~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_case", rpm:"proftpd-mod_case~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ctrls_admin", rpm:"proftpd-mod_ctrls_admin~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_gss", rpm:"proftpd-mod_gss~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ifsession", rpm:"proftpd-mod_ifsession~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ldap", rpm:"proftpd-mod_ldap~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_load", rpm:"proftpd-mod_load~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab", rpm:"proftpd-mod_quotatab~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_file", rpm:"proftpd-mod_quotatab_file~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_ldap", rpm:"proftpd-mod_quotatab_ldap~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_radius", rpm:"proftpd-mod_quotatab_radius~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_quotatab_sql", rpm:"proftpd-mod_quotatab_sql~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_radius", rpm:"proftpd-mod_radius~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_ratio", rpm:"proftpd-mod_ratio~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_rewrite", rpm:"proftpd-mod_rewrite~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_shaper", rpm:"proftpd-mod_shaper~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_site_misc", rpm:"proftpd-mod_site_misc~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql", rpm:"proftpd-mod_sql~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql_mysql", rpm:"proftpd-mod_sql_mysql~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_sql_postgres", rpm:"proftpd-mod_sql_postgres~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_time", rpm:"proftpd-mod_time~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_tls", rpm:"proftpd-mod_tls~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_vroot", rpm:"proftpd-mod_vroot~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap", rpm:"proftpd-mod_wrap~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap_file", rpm:"proftpd-mod_wrap_file~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"proftpd-mod_wrap_sql", rpm:"proftpd-mod_wrap_sql~1.3.2~0.2mdvmes5", rls:"MNDK_mes5")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ovcesa2009_1522.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ovcesa2009_1522.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/ovcesa2009_1522.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,105 @@
+#CESA-2009:1522 66117 2
+# $Id$
+# Description: Auto-generated from advisory CESA-2009:1522 (kernel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66117);
+ script_cve_id("CVE-2005-4881", "CVE-2009-3228");
+ script_version ("$Revision$");
+ script_name("CentOS Security Advisory CESA-2009:1522 (kernel)");
+
+ desc = "
+The remote host is missing updates to kernel announced in
+advisory CESA-2009:1522.
+
+For details on the issues addressed in this update,
+please visit the referenced security advisories.
+
+Solution:
+Update the appropriate packages on your system.
+
+http://www.securityspace.com/smysecure/catid.html?in=CESA-2009:1522
+http://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:1522
+https://rhn.redhat.com/errata/RHSA-2009-1522.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("CentOS Security Advisory CESA-2009:1522 (kernel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("CentOS Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-devel", rpm:"kernel-devel~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem", rpm:"kernel-hugemem~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-hugemem-devel", rpm:"kernel-hugemem-devel~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp", rpm:"kernel-smp~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-smp-devel", rpm:"kernel-smp-devel~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU", rpm:"kernel-xenU~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-doc", rpm:"kernel-doc~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp", rpm:"kernel-largesmp~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-largesmp-devel", rpm:"kernel-largesmp-devel~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"kernel-xenU-devel", rpm:"kernel-xenU-devel~2.6.9~89.0.15.EL", rls:"CentOS4")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache2-mod_php4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache2-mod_php4.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles10_apache2-mod_php4.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,271 @@
+#
+#VID slesp2-apache2-mod_php5-6510
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for PHP5
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66075);
+ script_cve_id("CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-2687");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for PHP5");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2-mod_php5
+    php5
+    php5-bcmath
+    php5-bz2
+    php5-calendar
+    php5-ctype
+    php5-curl
+    php5-dba
+    php5-dbase
+    php5-devel
+    php5-dom
+    php5-exif
+    php5-fastcgi
+    php5-ftp
+    php5-gd
+    php5-gettext
+    php5-gmp
+    php5-iconv
+    php5-imap
+    php5-json
+    php5-ldap
+    php5-mbstring
+    php5-mcrypt
+    php5-mhash
+    php5-mysql
+    php5-ncurses
+    php5-odbc
+    php5-openssl
+    php5-pcntl
+    php5-pdo
+    php5-pear
+    php5-pgsql
+    php5-posix
+    php5-pspell
+    php5-shmop
+    php5-snmp
+    php5-soap
+    php5-sockets
+    php5-sqlite
+    php5-suhosin
+    php5-sysvmsg
+    php5-sysvsem
+    php5-sysvshm
+    php5-tokenizer
+    php5-wddx
+    php5-xmlreader
+    php5-xmlrpc
+    php5-xsl
+    php5-zlib
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for PHP5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-mod_php5", rpm:"apache2-mod_php5~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5", rpm:"php5~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bcmath", rpm:"php5-bcmath~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-bz2", rpm:"php5-bz2~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-calendar", rpm:"php5-calendar~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ctype", rpm:"php5-ctype~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-curl", rpm:"php5-curl~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dba", rpm:"php5-dba~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dbase", rpm:"php5-dbase~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-devel", rpm:"php5-devel~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-dom", rpm:"php5-dom~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-exif", rpm:"php5-exif~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-fastcgi", rpm:"php5-fastcgi~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ftp", rpm:"php5-ftp~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gd", rpm:"php5-gd~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gettext", rpm:"php5-gettext~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-gmp", rpm:"php5-gmp~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-iconv", rpm:"php5-iconv~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-imap", rpm:"php5-imap~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-json", rpm:"php5-json~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ldap", rpm:"php5-ldap~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mbstring", rpm:"php5-mbstring~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mcrypt", rpm:"php5-mcrypt~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mhash", rpm:"php5-mhash~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-mysql", rpm:"php5-mysql~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-ncurses", rpm:"php5-ncurses~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-odbc", rpm:"php5-odbc~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-openssl", rpm:"php5-openssl~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pcntl", rpm:"php5-pcntl~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pdo", rpm:"php5-pdo~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pear", rpm:"php5-pear~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pgsql", rpm:"php5-pgsql~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-posix", rpm:"php5-posix~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-pspell", rpm:"php5-pspell~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-shmop", rpm:"php5-shmop~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-snmp", rpm:"php5-snmp~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-soap", rpm:"php5-soap~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sockets", rpm:"php5-sockets~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sqlite", rpm:"php5-sqlite~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-suhosin", rpm:"php5-suhosin~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvmsg", rpm:"php5-sysvmsg~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvsem", rpm:"php5-sysvsem~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-sysvshm", rpm:"php5-sysvshm~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-tokenizer", rpm:"php5-tokenizer~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-wddx", rpm:"php5-wddx~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlreader", rpm:"php5-xmlreader~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xmlrpc", rpm:"php5-xmlrpc~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-xsl", rpm:"php5-xsl~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"php5-zlib", rpm:"php5-zlib~5.2.5~9.22", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_apache21.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_apache21.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles10_apache21.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,99 @@
+#
+#VID slesp2-apache2-6571
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Apache 2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66074);
+ script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Apache 2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2
+    apache2-devel
+    apache2-doc
+    apache2-example-pages
+    apache2-prefork
+    apache2-worker
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Apache 2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.3~16.25.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.3~16.25.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.3~16.25.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.3~16.25.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.3~16.25.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.3~16.25.4", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_cifs-mount2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_cifs-mount2.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles10_cifs-mount2.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,119 @@
+#
+#VID slesp2-cifs-mount-6518
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Samba
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66073);
+ script_cve_id("CVE-2009-2813", "CVE-2009-2948", "CVE-2009-2906");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Samba");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cifs-mount
+    libmsrpc
+    libmsrpc-devel
+    libsmbclient
+    libsmbclient-devel
+    samba
+    samba-client
+    samba-krb-printing
+    samba-python
+    samba-vscan
+    samba-winbind
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Samba");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc", rpm:"libmsrpc~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc-devel", rpm:"libmsrpc-devel~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-python", rpm:"samba-python~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan", rpm:"samba-vscan~0.3.6b~42.85.5", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.32~0.16", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_firefox35upgrad.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_firefox35upgrad.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles10_firefox35upgrad.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,111 @@
+#
+#VID slesp2-firefox35upgrade-6562
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Mozilla Firefox
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66077);
+ script_cve_id("CVE-2009-3069", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3073", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Mozilla Firefox");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    MozillaFirefox
+    MozillaFirefox-branding-SLED
+    MozillaFirefox-translations
+    mozilla-xulrunner190
+    mozilla-xulrunner190-gnomevfs
+    mozilla-xulrunner190-translations
+    mozilla-xulrunner191
+    mozilla-xulrunner191-gnomevfs
+    mozilla-xulrunner191-translations
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Mozilla Firefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.5.3~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-branding-SLED", rpm:"MozillaFirefox-branding-SLED~3.5~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.5.3~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.14~0.5.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.14~0.5.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.14~0.5.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191", rpm:"mozilla-xulrunner191~1.9.1.3~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-gnomevfs", rpm:"mozilla-xulrunner191-gnomevfs~1.9.1.3~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner191-translations", rpm:"mozilla-xulrunner191-translations~1.9.1.3~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_libapr-util10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_libapr-util10.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles10_libapr-util10.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-libapr-util1-6546
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libapr
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66078);
+ script_cve_id("CVE-2009-2412");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for libapr");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libapr-util1
+    libapr-util1-devel
+    libapr1
+    libapr1-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for libapr");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.2.2~13.10.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.2.2~13.10.1", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.2.2~13.8.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.2.2~13.8.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles10_mozilla-nspr.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles10_mozilla-nspr.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles10_mozilla-nspr.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,91 @@
+#
+#VID slesp2-mozilla-nspr-6541
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Mozilla NSS
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66076);
+ script_cve_id("CVE-2009-2404", "CVE-2009-2408");
+ script_version ("$Revision$");
+ script_name("SLES10: Security update for Mozilla NSS");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mozilla-nspr
+    mozilla-nspr-devel
+    mozilla-nss
+    mozilla-nss-devel
+
+
+More details may also be found by searching for the SuSE
+Enterprise Server 10 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES10: Security update for Mozilla NSS");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla-nspr", rpm:"mozilla-nspr~4.8~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-nspr-devel", rpm:"mozilla-nspr-devel~4.8~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-nss", rpm:"mozilla-nss~3.12.3.1~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-nss-devel", rpm:"mozilla-nss-devel~3.12.3.1~1.4.2", rls:"SLES10.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles11_apache2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_apache2.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles11_apache2.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,106 @@
+#
+#VID ca7f5abf8025ba6ef69af14cd6570458
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Apache 2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66081);
+ script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
+ script_version ("$Revision$");
+ script_name("SLES11: Security update for Apache 2");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2
+    apache2-doc
+    apache2-example-pages
+    apache2-prefork
+    apache2-utils
+    apache2-worker
+
+References:
+    https://bugzilla.novell.com/show_bug.cgi?id=521906
+    https://bugzilla.novell.com/show_bug.cgi?id=513080
+    https://bugzilla.novell.com/show_bug.cgi?id=512583
+    https://bugzilla.novell.com/show_bug.cgi?id=539571
+    https://bugzilla.novell.com/show_bug.cgi?id=519194
+    https://bugzilla.novell.com/show_bug.cgi?id=538322
+
+More details may also be found by searching for the SuSE
+Enterprise Server 11 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES11: Security update for Apache 2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.10~2.21.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.10~2.21.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.10~2.21.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.10~2.21.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.10~2.21.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.10~2.21.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles11_cifs-mount0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_cifs-mount0.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles11_cifs-mount0.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,117 @@
+#
+#VID dbedb3fb1fc74639fa0c893e6c0ad7f6
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for Samba
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66079);
+ script_cve_id("CVE-2009-2813", "CVE-2009-2948", "CVE-2009-2906");
+ script_version ("$Revision$");
+ script_name("SLES11: Security update for Samba");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    cifs-mount
+    ldapsmb
+    libsmbclient0
+    libtalloc1
+    libtdb1
+    libwbclient0
+    samba
+    samba-client
+    samba-krb-printing
+    samba-winbind
+
+References:
+    https://bugzilla.novell.com/show_bug.cgi?id=539517
+
+More details may also be found by searching for the SuSE
+Enterprise Server 11 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES11: Security update for Samba");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ldapsmb", rpm:"ldapsmb~1.34b~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc1", rpm:"libtalloc1~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb1", rpm:"libtdb1~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.2.7~11.8.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles11_libapr-util10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles11_libapr-util10.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles11_libapr-util10.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,85 @@
+#
+#VID 015ff2ecbdd9a5bbf220d3d2b1722666
+# OpenVAS Vulnerability Test
+# $
+# Description: Security update for libapr
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(66080);
+ script_cve_id("CVE-2009-2412");
+ script_version ("$Revision$");
+ script_name("SLES11: Security update for libapr");
+
+ desc = "The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libapr-util1
+    libapr1
+
+References:
+    https://bugzilla.novell.com/show_bug.cgi?id=529591
+
+More details may also be found by searching for the SuSE
+Enterprise Server 11 patch database located at
+http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES11: Security update for libapr");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.3.4~12.20.2", rls:"SLES11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.3.3~11.16.1", rls:"SLES11.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles9p5060741.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5060741.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles9p5060741.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Security update for epiphany
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66072);
+ script_cve_id("CVE-2009-2404", "CVE-2009-2408");
+ script_version ("$Revision$");
+ script_name("SLES9: Security update for epiphany");
+
+ desc = "
+The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    mozilla
+    mozilla-devel
+    mozilla-dom-inspector
+    mozilla-irc
+    mozilla-mail
+    mozilla-venkman
+
+For more information, please visit the referenced security
+advisories.
+
+More details may also be found by searching for keyword
+5060741 within the SuSE Enterprise Server 9 patch
+database at http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES9: Security update for epiphany");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"mozilla", rpm:"mozilla~1.8_seamonkey_1.1.18~0.1", rls:"SLES9.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles9p5060841.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5060841.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles9p5060841.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,89 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Security update for Samba
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66071);
+ script_cve_id("CVE-2009-2813", "CVE-2009-2948", "CVE-2009-2906");
+ script_version ("$Revision$");
+ script_name("SLES9: Security update for Samba");
+
+ desc = "
+The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    libsmbclient
+    libsmbclient-devel
+    samba
+    samba-client
+    samba-doc
+    samba-pdb
+    samba-python
+    samba-vscan
+    samba-winbind
+
+For more information, please visit the referenced security
+advisories.
+
+More details may also be found by searching for keyword
+5060841 within the SuSE Enterprise Server 9 patch
+database at http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES9: Security update for Samba");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.0.26a~0.11", rls:"SLES9.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/sles9p5060942.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sles9p5060942.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/sles9p5060942.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Security update for Apache 2
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66070);
+ script_cve_id("CVE-2009-1890", "CVE-2009-1891", "CVE-2009-3094", "CVE-2009-3095");
+ script_version ("$Revision$");
+ script_name("SLES9: Security update for Apache 2");
+
+ desc = "
+The remote host is missing updates to packages that affect
+the security of your system.  One or more of the following packages
+are affected:
+
+    apache2
+    apache2-devel
+    apache2-doc
+    apache2-example-pages
+    apache2-prefork
+    apache2-worker
+    libapr0
+
+For more information, please visit the referenced security
+advisories.
+
+More details may also be found by searching for keyword
+5060942 within the SuSE Enterprise Server 9 patch
+database at http://download.novell.com/patch/finder/
+
+Solution:
+
+Please install the updates provided by SuSE.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SLES9: Security update for Apache 2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.0.59~1.14", rls:"SLES9.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_048.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,194 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SA:2009:048 (MozillaFirefox)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66104);
+ script_cve_id("CVE-2009-2404", "CVE-2009-2408", "CVE-2009-2654", "CVE-2009-2662", "CVE-2009-2663", "CVE-2009-2664", "CVE-2009-3069", "CVE-2009-3070", "CVE-2009-3071", "CVE-2009-3072", "CVE-2009-3073", "CVE-2009-3075", "CVE-2009-3076", "CVE-2009-3077", "CVE-2009-3078", "CVE-2009-3079");
+ script_version ("$Revision$");
+ script_name("SuSE Security Advisory SUSE-SA:2009:048 (MozillaFirefox)");
+
+ desc = "
+The remote host is missing updates announced in
+advisory SUSE-SA:2009:048.
+
+The Mozilla Firefox was updated to current stable versions on all
+affected Linux products.
+
+openSUSE 10.3,11.0 and 11.1: Firefox was updated to the current stable
+branch version 3.0.14. These updates were already released on
+September 21st.
+
+The SUSE Linux Enterprise 11 products were upgraded to Mozilla Firefox
+3.5.3, released on September 30th.
+
+The SUSE Linux Enterprise 10 Service Pack 2 and 3 were upgraded to
+Mozilla Firefox 3.5.3, released on October 20th.
+
+For details on the issues addresses with these updates, please
+visit the referenced security advisories.
+
+Solution:
+Update your system with the packages as indicated in
+the referenced security advisory.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:048
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SA:2009:048 (MozillaFirefox)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.0.14~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-branding-upstream", rpm:"MozillaFirefox-branding-upstream~3.0.14~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.0.14~0.1.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-devel", rpm:"mozilla-xulrunner190-devel~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xpcom190", rpm:"python-xpcom190~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-devel", rpm:"mozilla-xulrunner190-devel~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox", rpm:"MozillaFirefox~3.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"MozillaFirefox-translations", rpm:"MozillaFirefox-translations~3.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190", rpm:"mozilla-xulrunner190~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-devel", rpm:"mozilla-xulrunner190-devel~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs", rpm:"mozilla-xulrunner190-gnomevfs~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations", rpm:"mozilla-xulrunner190-translations~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-xpcom190", rpm:"python-xpcom190~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-64bit", rpm:"mozilla-xulrunner190-64bit~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-64bit", rpm:"mozilla-xulrunner190-gnomevfs-64bit~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-64bit", rpm:"mozilla-xulrunner190-translations-64bit~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-64bit", rpm:"mozilla-xulrunner190-64bit~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-64bit", rpm:"mozilla-xulrunner190-gnomevfs-64bit~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-64bit", rpm:"mozilla-xulrunner190-translations-64bit~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-32bit", rpm:"mozilla-xulrunner190-32bit~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-32bit", rpm:"mozilla-xulrunner190-gnomevfs-32bit~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-32bit", rpm:"mozilla-xulrunner190-translations-32bit~1.9.0.14~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-32bit", rpm:"mozilla-xulrunner190-32bit~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-32bit", rpm:"mozilla-xulrunner190-gnomevfs-32bit~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-32bit", rpm:"mozilla-xulrunner190-translations-32bit~1.9.0.14~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-32bit", rpm:"mozilla-xulrunner190-32bit~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-gnomevfs-32bit", rpm:"mozilla-xulrunner190-gnomevfs-32bit~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"mozilla-xulrunner190-translations-32bit", rpm:"mozilla-xulrunner190-translations-32bit~1.9.0.14~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_049.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,84 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SA:2009:049 (acroread, acroread_ja)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66105);
+ script_cve_id("CVE-2007-0045", "CVE-2007-0048", "CVE-2009-2564", "CVE-2009-2979", "CVE-2009-2980", "CVE-2009-2981", "CVE-2009-2982", "CVE-2009-2983", "CVE-2009-2985", "CVE-2009-2986", "CVE-2009-2988", "CVE-2009-2990", "CVE-2009-2991", "CVE-2009-2992", "CVE-2009-2993", "CVE-2009-2994", "CVE-2009-2996", "CVE-2009-2997", "CVE-2009-2998", "CVE-2009-3431", "CVE-2009-3458", "CVE-2009-3459", "CVE-2009-3462");
+ script_version ("$Revision$");
+ script_name("SuSE Security Advisory SUSE-SA:2009:049 (acroread, acroread_ja)");
+
+ desc = "
+The remote host is missing updates announced in
+advisory SUSE-SA:2009:049.
+
+Adobe Reader has been updated to fix numerous security
+vulnerabilities. Some of the vulnerabilities allowed attackers to
+potentially execute arbitrary code on the victim's system via
+specially crafted PDF files.
+
+Solution:
+Update your system with the packages as indicated in
+the referenced security advisory.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:049
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SA:2009:049 (acroread, acroread_ja)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/suse_sa_2009_050.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,273 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SA:2009:050 (apache2,libapr1)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66106);
+ script_cve_id("CVE-2009-1195", "CVE-2009-1890", "CVE-2009-1891", "CVE-2009-2412", "CVE-2009-3094", "CVE-2009-3095");
+ script_version ("$Revision$");
+ script_name("SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1)");
+
+ desc = "
+The remote host is missing updates announced in
+advisory SUSE-SA:2009:050.
+
+The Apache web server was updated to fix various security issues:
+- the option IncludesNOEXEC could be bypassed via .htaccess (CVE-2009-1195)
+- mod_proxy could run into an infinite loop when used as reverse  proxy
+(CVE-2009-1890)
+- mod_deflate continued to compress large files even after a network
+connection was closed, causing mod_deflate to consume large amounts
+of CPU (CVE-2009-1891)
+- The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in
+the mod_proxy_ftp module allows remote FTP servers to cause a denial
+of service (NULL pointer dereference and child process crash) via a
+malformed reply to an EPSV command. (CVE-2009-3094)
+- access restriction bypass in mod_proxy_ftp module (CVE-2009-3095)
+
+Also the libapr1 and libapr-util1 Apache helper libraries were updated
+to fix multiple integer overflows that could probably be used to
+execute arbitrary code remotely. (CVE-2009-2412)
+
+Solution:
+Update your system with the packages as indicated in
+the referenced security advisory.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:050
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"apache2-debuginfo", rpm:"apache2-debuginfo~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-debugsource", rpm:"apache2-debugsource~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-debuginfo", rpm:"libapr-util1-debuginfo~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-debugsource", rpm:"libapr-util1-debugsource~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-debuginfo", rpm:"libapr1-debuginfo~1.3.3~12.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-debugsource", rpm:"libapr1-debugsource~1.3.3~12.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-mysql", rpm:"libapr-util1-dbd-mysql~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-pgsql", rpm:"libapr-util1-dbd-pgsql~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-sqlite3", rpm:"libapr-util1-dbd-sqlite3~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.3.3~12.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.3.3~12.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-debuginfo", rpm:"apache2-debuginfo~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-debugsource", rpm:"apache2-debugsource~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-debuginfo", rpm:"libapr-util1-debuginfo~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-debugsource", rpm:"libapr-util1-debugsource~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-debuginfo", rpm:"libapr1-debuginfo~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-debugsource", rpm:"libapr1-debugsource~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-mysql", rpm:"libapr-util1-dbd-mysql~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-pgsql", rpm:"libapr-util1-dbd-pgsql~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-sqlite3", rpm:"libapr-util1-dbd-sqlite3~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-mysql", rpm:"libapr-util1-dbd-mysql~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-pgsql", rpm:"libapr-util1-dbd-pgsql~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-sqlite3", rpm:"libapr-util1-dbd-sqlite3~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.2.9~9.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.2.9~9.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-64bit", rpm:"libapr-util1-64bit~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel-64bit", rpm:"libapr-util1-devel-64bit~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-64bit", rpm:"libapr1-64bit~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel-64bit", rpm:"libapr1-devel-64bit~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-64bit", rpm:"libapr-util1-64bit~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel-64bit", rpm:"libapr-util1-devel-64bit~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-64bit", rpm:"libapr1-64bit~1.2.9~9.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel-64bit", rpm:"libapr1-devel-64bit~1.2.9~9.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl
===================================================================
--- trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/suse_sr_2009_017.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,486 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory SUSE-SR:2009:017
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66107);
+ script_cve_id("CVE-2008-5349", "CVE-2009-2625", "CVE-2009-2687", "CVE-2009-2813", "CVE-2009-2905", "CVE-2009-2906", "CVE-2009-2948", "CVE-2009-3009", "CVE-2009-3086", "CVE-2009-3229", "CVE-2009-3230", "CVE-2009-3231", "CVE-2009-3291", "CVE-2009-3292", "CVE-2009-3293", "CVE-2009-3618", "CVE-2009-3619", "CVE-2009-3696", "CVE-2009-3697");
+ script_version ("$Revision$");
+ script_name("SuSE Security Summary SUSE-SR:2009:017");
+
+ desc = "
+The remote host is missing updates announced in
+advisory SUSE-SR:2009:017.  SuSE Security Summaries are short
+on detail when it comes to the names of packages affected by
+a particular bug. Because of this, while this test will detect
+out of date packages, it cannot tell you what bugs impact
+which packages, or vice versa.
+
+Solution:
+
+Update all out of date packages.
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("SuSE Security Advisory SUSE-SR:2009:017");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("SuSE Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/rpms");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-rpm.inc");
+vuln = 0;
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.10~2.8.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ldapsmb", rpm:"ldapsmb~1.34b~6.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-mysql", rpm:"libapr-util1-dbd-mysql~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-pgsql", rpm:"libapr-util1-dbd-pgsql~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-sqlite3", rpm:"libapr-util1-dbd-sqlite3~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.3.4~13.3.2", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.3.3~12.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.3.3~12.2.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi-devel", rpm:"libnetapi-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi0", rpm:"libnetapi0~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnewt0_52", rpm:"libnewt0_52~0.52.10~1.40.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes0", rpm:"libsmbsharemodes0~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc-devel", rpm:"libtalloc-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc1", rpm:"libtalloc1~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb-devel", rpm:"libtdb-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb1", rpm:"libtdb1~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient-devel", rpm:"libwbclient-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt", rpm:"newt~0.52.10~1.40.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-devel", rpm:"newt-devel~0.52.10~1.40.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-doc", rpm:"newt-doc~0.52.10~1.40.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-static", rpm:"newt-static~0.52.10~1.40.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"python-newt", rpm:"python-newt~0.52.10~1.40.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rubygem-actionpack-2_1", rpm:"rubygem-actionpack-2_1~2.1.1~2.24.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"rubygem-activesupport-2_1", rpm:"rubygem-activesupport-2_1~2.1.1~2.24.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-devel", rpm:"samba-devel~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan", rpm:"samba-vscan~0.3.6b~6.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.2.7~11.4.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.1.18~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.1.18~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-irc", rpm:"seamonkey-irc~1.1.18~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.1.18~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-spellchecker", rpm:"seamonkey-spellchecker~1.1.18~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-venkman", rpm:"seamonkey-venkman~1.1.18~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"viewvc", rpm:"viewvc~1.0.9~0.1.1", rls:"openSUSE11.1")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.8~28.8", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ldapsmb", rpm:"ldapsmb~1.34b~195.12", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-mysql", rpm:"libapr-util1-dbd-mysql~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-pgsql", rpm:"libapr-util1-dbd-pgsql~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-sqlite3", rpm:"libapr-util1-dbd-sqlite3~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.2.12~43.4", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.2.12~27.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi-devel", rpm:"libnetapi-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnetapi0", rpm:"libnetapi0~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libnewt0_52", rpm:"libnewt0_52~0.52.9~20.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes0", rpm:"libsmbsharemodes0~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc-devel", rpm:"libtalloc-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtalloc1", rpm:"libtalloc1~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb-devel", rpm:"libtdb-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libtdb1", rpm:"libtdb1~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient-devel", rpm:"libwbclient-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt", rpm:"newt~0.52.9~20.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-devel", rpm:"newt-devel~0.52.9~20.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-doc", rpm:"newt-doc~0.52.9~20.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-python", rpm:"newt-python~0.52.9~20.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-static", rpm:"newt-static~0.52.9~20.2", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-devel", rpm:"samba-devel~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.2.4~4.7", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.1.18~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.1.18~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-irc", rpm:"seamonkey-irc~1.1.18~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.1.18~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-spellchecker", rpm:"seamonkey-spellchecker~1.1.18~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-venkman", rpm:"seamonkey-venkman~1.1.18~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"viewvc", rpm:"viewvc~1.0.9~0.1", rls:"openSUSE11.0")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"acroread", rpm:"acroread~8.1.7~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2", rpm:"apache2~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-devel", rpm:"apache2-devel~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-doc", rpm:"apache2-doc~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-example-pages", rpm:"apache2-example-pages~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-prefork", rpm:"apache2-prefork~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-utils", rpm:"apache2-utils~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"apache2-worker", rpm:"apache2-worker~2.2.4~70.11", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"cifs-mount", rpm:"cifs-mount~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"ldapsmb", rpm:"ldapsmb~1.34b~110.10", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1", rpm:"libapr-util1~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-mysql", rpm:"libapr-util1-dbd-mysql~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-pgsql", rpm:"libapr-util1-dbd-pgsql~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-dbd-sqlite3", rpm:"libapr-util1-dbd-sqlite3~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr-util1-devel", rpm:"libapr-util1-devel~1.2.8~68.4", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1", rpm:"libapr1~1.2.9~9.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libapr1-devel", rpm:"libapr1-devel~1.2.9~9.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc", rpm:"libmsrpc~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libmsrpc-devel", rpm:"libmsrpc-devel~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes", rpm:"libsmbsharemodes~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt", rpm:"newt~0.52.7~36.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-devel", rpm:"newt-devel~0.52.7~36.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-doc", rpm:"newt-doc~0.52.7~36.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"newt-static", rpm:"newt-static~0.52.7~36.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba", rpm:"samba~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-devel", rpm:"samba-devel~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-python", rpm:"samba-python~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-vscan", rpm:"samba-vscan~0.3.6b~181.10", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.0.32~0.2", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.1.18~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.1.18~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-irc", rpm:"seamonkey-irc~1.1.18~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.1.18~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-spellchecker", rpm:"seamonkey-spellchecker~1.1.18~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"seamonkey-venkman", rpm:"seamonkey-venkman~1.1.18~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+if(isrpmvuln(pkg:"viewvc", rpm:"viewvc~1.0.9~0.1", rls:"openSUSE10.3")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_850_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_850_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/ubuntu_850_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,205 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-850-1 (poppler)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66111);
+ script_cve_id("CVE-2009-0755", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3605", "CVE-2009-3607", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-850-1 (poppler)");
+
+ desc = "
+The remote host is missing an update to poppler
+announced via advisory USN-850-1.
+
+Details follow:
+
+It was discovered that poppler contained multiple security issues when
+parsing malformed PDF documents. If a user or automated system were tricked
+into opening a crafted PDF file, an attacker could cause a denial of
+service or execute arbitrary code with privileges of the user invoking the
+program.
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 6.06 LTS:
+  libpoppler1                     0.5.1-0ubuntu7.6
+  libpoppler1-glib                0.5.1-0ubuntu7.6
+
+Ubuntu 8.04 LTS:
+  libpoppler-glib2                0.6.4-1ubuntu3.3
+  libpoppler2                     0.6.4-1ubuntu3.3
+
+Ubuntu 8.10:
+  libpoppler-glib3                0.8.7-1ubuntu0.4
+  libpoppler3                     0.8.7-1ubuntu0.4
+
+Ubuntu 9.04:
+  libpoppler-glib4                0.10.5-1ubuntu2.4
+  libpoppler4                     0.10.5-1ubuntu2.4
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-850-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-850-1 (poppler)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler1-glib", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler1-qt", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler1", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.5.1-0ubuntu7.6", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib2", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt2", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-2", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-dev", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler2", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.6.4-1ubuntu3.3", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib3", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt2", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-3", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-dev", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler3", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-dbg", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.8.7-1ubuntu0.4", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib4", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt2", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-3", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-dev", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler4", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-dbg", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.10.5-1ubuntu2.4", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_850_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_850_2.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/ubuntu_850_2.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,213 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-850-2 (poppler)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66113);
+ script_cve_id("CVE-2009-3605");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-850-2 (poppler)");
+
+ desc = "
+The remote host is missing an update to poppler
+announced via advisory USN-850-2.
+
+Details follow:
+
+USN-850-1 fixed vulnerabilities in poppler. The security fix for
+CVE-2009-3605 introduced a regression that would cause certain
+applications, such as Okular, to segfault when opening certain PDF files.
+
+This update fixes the problem. We apologize for the inconvenience.
+
+Original advisory details:
+
+ It was discovered that poppler contained multiple security issues when
+ parsing malformed PDF documents. If a user or automated system were tricked
+ into opening a crafted PDF file, an attacker could cause a denial of
+ service or execute arbitrary code with privileges of the user invoking the
+ program.
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 6.06 LTS:
+  libpoppler1                     0.5.1-0ubuntu7.7
+  libpoppler1-glib                0.5.1-0ubuntu7.7
+
+Ubuntu 8.04 LTS:
+  libpoppler-glib2                0.6.4-1ubuntu3.4
+  libpoppler2                     0.6.4-1ubuntu3.4
+
+Ubuntu 8.10:
+  libpoppler-glib3                0.8.7-1ubuntu0.5
+  libpoppler3                     0.8.7-1ubuntu0.5
+
+Ubuntu 9.04:
+  libpoppler-glib4                0.10.5-1ubuntu2.5
+  libpoppler4                     0.10.5-1ubuntu2.5
+
+In general, a standard system upgrade is sufficient to effect the
+necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-850-2
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-850-2 (poppler)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler1-glib", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler1-qt", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler1", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.5.1-0ubuntu7.7", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib2", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt2", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-2", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-dev", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler2", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.6.4-1ubuntu3.4", rls:"UBUNTU8.04 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib3", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt2", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-3", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-dev", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler3", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-dbg", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.8.7-1ubuntu0.5", rls:"UBUNTU8.10")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-dev", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib-dev", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-glib4", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt-dev", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt2", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-3", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler-qt4-dev", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpoppler4", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-dbg", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"poppler-utils", ver:"0.10.5-1ubuntu2.5", rls:"UBUNTU9.04")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/ubuntu_851_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ubuntu_851_1.nasl	2009-10-26 22:12:42 UTC (rev 5738)
+++ trunk/openvas-plugins/scripts/ubuntu_851_1.nasl	2009-10-27 00:37:56 UTC (rev 5739)
@@ -0,0 +1,97 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory USN-851-1 (elinks)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+                                                                                
+if(description)
+{
+ script_id(66112);
+ script_cve_id("CVE-2006-5925", "CVE-2008-7224");
+ script_version ("$Revision$");
+ script_name("Ubuntu USN-851-1 (elinks)");
+
+ desc = "
+The remote host is missing an update to elinks
+announced via advisory USN-851-1.
+
+Details follow:
+
+Teemu Salmela discovered that Elinks did not properly validate input when
+processing smb:// URLs. If a user were tricked into viewing a malicious
+website and had smbclient installed, a remote attacker could execute
+arbitrary code with the privileges of the user invoking the program.
+(CVE-2006-5925)
+
+Jakub Wilk discovered a logic error in Elinks, leading to a buffer
+overflow. If a user were tricked into viewing a malicious website, a remote
+attacker could cause a denial of service via application crash, or possibly
+execute arbitrary code with the privileges of the user invoking the
+program. (CVE-2008-7224)
+
+Solution:
+The problem can be corrected by upgrading your system to the
+following package versions:
+
+Ubuntu 6.06 LTS:
+  elinks                          0.10.6-1ubuntu3.4
+  elinks-lite                     0.10.6-1ubuntu3.4
+
+After a standard system upgrade you need to restart Elinks to effect
+the necessary changes.
+
+https://secure1.securityspace.com/smysecure/catid.html?in=USN-851-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Ubuntu USN-851-1 (elinks)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
+ script_family("Ubuntu Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"elinks", ver:"0.10.6-1ubuntu3.4", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"elinks-lite", ver:"0.10.6-1ubuntu3.4", rls:"UBUNTU6.06 LTS")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list