[Openvas-commits] r7385 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Apr 21 03:31:24 CEST 2010


Author: reinke
Date: 2010-04-21 03:31:17 +0200 (Wed, 21 Apr 2010)
New Revision: 7385

Added:
   trunk/openvas-plugins/scripts/deb_2027_1.nasl
   trunk/openvas-plugins/scripts/deb_2028_1.nasl
   trunk/openvas-plugins/scripts/deb_2029_1.nasl
   trunk/openvas-plugins/scripts/deb_2030_1.nasl
   trunk/openvas-plugins/scripts/deb_2032_1.nasl
   trunk/openvas-plugins/scripts/deb_2033_1.nasl
   trunk/openvas-plugins/scripts/deb_2036_1.nasl
   trunk/openvas-plugins/scripts/deb_2037_1.nasl
   trunk/openvas-plugins/scripts/freebsd_ZendFramework1.nasl
   trunk/openvas-plugins/scripts/freebsd_curl3.nasl
   trunk/openvas-plugins/scripts/freebsd_dojo.nasl
   trunk/openvas-plugins/scripts/freebsd_ejabberd0.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox46.nasl
   trunk/openvas-plugins/scripts/freebsd_irssi.nasl
   trunk/openvas-plugins/scripts/freebsd_kdebase1.nasl
   trunk/openvas-plugins/scripts/freebsd_krb52.nasl
   trunk/openvas-plugins/scripts/freebsd_krb53.nasl
   trunk/openvas-plugins/scripts/freebsd_mahara.nasl
   trunk/openvas-plugins/scripts/freebsd_sudo6.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/ChangeLog	2010-04-21 01:31:17 UTC (rev 7385)
@@ -1,3 +1,26 @@
+2010-04-20 Thomas Reinke <reinke at securityspace.com>
+
+	* scripts/deb_2027_1.nasl,
+	scripts/deb_2028_1.nasl,
+	scripts/deb_2029_1.nasl,
+	scripts/deb_2030_1.nasl,
+	scripts/deb_2032_1.nasl,
+	scripts/deb_2033_1.nasl,
+	scripts/deb_2036_1.nasl,
+	scripts/deb_2037_1.nasl,
+	scripts/freebsd_ZendFramework1.nasl,
+	scripts/freebsd_curl3.nasl,
+	scripts/freebsd_dojo.nasl,
+	scripts/freebsd_ejabberd0.nasl,
+	scripts/freebsd_firefox46.nasl,
+	scripts/freebsd_irssi.nasl,
+	scripts/freebsd_kdebase1.nasl,
+	scripts/freebsd_krb52.nasl,
+	scripts/freebsd_krb53.nasl,
+	scripts/freebsd_mahara.nasl,
+	scripts/freebsd_sudo6.nasl:
+	New Plugins
+
 2010-04-20  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/gb_RHSA-2010_0141-01_tar.nasl,

Added: trunk/openvas-plugins/scripts/deb_2027_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2027_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2027_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,139 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2027-1 (xulrunner)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67263);
+ script_cve_id("CVE-2010-0174", "CVE-2010-0175", "CVE-2010-0176", "CVE-2010-0177", "CVE-2010-0178", "CVE-2010-0179");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2027-1 (xulrunner)");
+
+ desc = "The remote host is missing an update to xulrunner
+announced via advisory DSA 2027-1.
+
+Several remote vulnerabilities have been discovered in Xulrunner, a
+runtime environment for XUL applications, such as the Iceweasel web
+browser. The Common Vulnerabilities and Exposures project identifies
+the following problems:
+
+CVE-2010-0174
+
+Jesse Ruderman and Ehsan Akhgari discovered crashes in the layout
+engine, which might allow the execution of arbitrary code.
+
+CVE-2010-0175
+
+It was discovered that incorrect memory handling in the XUL event
+handler might allow the execution of arbitrary code.
+
+CVE-2010-0176
+
+It was discovered that incorrect memory handling in the XUL event
+handler might allow the execution of arbitrary code.
+
+CVE-2010-0177
+
+It was discovered that incorrect memory handling in the plugin code
+might allow the execution of arbitrary code.
+
+CVE-2010-0178
+
+Paul Stone discovered that forced drag-and-drop events could lead to
+Chrome privilege escalation.
+
+CVE-2010-0179
+
+It was discovered that a programming error in the XMLHttpRequestSpy
+module could lead to the execution of arbitrary code.
+
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1.9.0.19-1.
+
+For the unstable distribution (sid), these problems will be fixed soon.
+
+We recommend that you upgrade your xulrunner packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202027-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2027-1 (xulrunner)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libmozillainterfaces-java", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs-dev", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs1d", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-dbg", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"python-xpcom", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9-gnome-support", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"spidermonkey-bin", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs1d-dbg", ver:"1.9.0.19-1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2028_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2028_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2028_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,122 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2028-1 (xpdf)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67264);
+ script_cve_id("CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-3606", "CVE-2009-3608", "CVE-2009-3609");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2028-1 (xpdf)");
+
+ desc = "The remote host is missing an update to xpdf
+announced via advisory DSA 2028-1.
+
+Several vulnerabilities have been identified in xpdf, a suite of tools for
+viewing and converting Portable Document Format (PDF) files.
+
+The Common Vulnerabilities and Exposures project identifies the following
+problems:
+
+CVE-2009-1188 and CVE-2009-3603
+
+Integer overflow in SplashBitmap::SplashBitmap which might allow remote
+attackers to execute arbitrary code or an application crash via a crafted
+PDF document.
+
+CVE-2009-3604
+
+NULL pointer dereference or heap-based buffer overflow in
+Splash::drawImage which might allow remote attackers to cause a denial
+of service (application crash) or possibly execute arbitrary code via
+a crafted PDF document.
+
+CVE-2009-3606
+
+Integer overflow in the PSOutputDev::doImageL1Sep which might allow
+remote attackers to execute arbitrary code via a crafted PDF document.
+
+CVE-2009-3608
+
+Integer overflow in the ObjectStream::ObjectStream which might allow
+remote attackers to execute arbitrary code via a crafted PDF document.
+
+CVE-2009-3609
+
+Integer overflow in the ImageStream::ImageStream which might allow
+remote attackers to cause a denial of service via a crafted PDF
+document.
+
+
+For the stable distribution (lenny), this problem has been fixed in
+version 3.02-1.4+lenny2.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 3.02-2.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202028-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2028-1 (xpdf)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"xpdf", ver:"3.02-1.4+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xpdf-common", ver:"3.02-1.4+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xpdf-reader", ver:"3.02-1.4+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xpdf-utils", ver:"3.02-1.4+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2029_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2029_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2029_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2029-1 (imlib2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67265);
+ script_cve_id("CVE-2008-6079");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2029-1 (imlib2)");
+
+ desc = "The remote host is missing an update to imlib2
+announced via advisory DSA 2029-1.
+
+It was discovered that imlib2, a library to load and process several image
+formats, did not properly process various image file types.
+Several heap and stack based buffer overflows - partly due to integer
+overflows - in the ARGB, BMP, JPEG, LBM, PNM, TGA and XPM loaders can
+lead to the execution of arbitrary code via crafted image files.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.4.0-1.2+lenny1.
+
+For the testing distribution (squeeze), this problem has been fixed in
+version 1.4.2-1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.4.2-1.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202029-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2029-1 (imlib2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libimlib2", ver:"1.4.0-1.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libimlib2-dev", ver:"1.4.0-1.2+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2030_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2030_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2030_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,87 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2030-1 (mahara)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67266);
+ script_cve_id("CVE-2010-0400");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2030-1 (mahara)");
+
+ desc = "The remote host is missing an update to mahara
+announced via advisory DSA 2030-1.
+
+It was discovered that mahara, an electronic portfolio, weblog, and resume
+builder is not properly escaping input when generating a unique username
+based on a remote user name from a single sign-on application.  An attacker
+can use this to compromise the mahara database via crafted user names.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.0.4-4+lenny5.
+
+For the testing distribution (squeeze), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.2.4-1.
+
+We recommend that you upgrade your mahara packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202030-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2030-1 (mahara)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"mahara-apache2", ver:"1.0.4-4+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mahara", ver:"1.0.4-4+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2032_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2032_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2032_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,102 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2032-1 (libpng)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67267);
+ script_cve_id("CVE-2009-2042", "CVE-2010-0205");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2032-1 (libpng)");
+
+ desc = "The remote host is missing an update to libpng
+announced via advisory DSA 2032-1.
+
+Several vulnerabilities have been discovered in libpng, a library for
+reading and writing PNG files. The Common Vulnerabilities and
+Exposures project identifies the following problems:
+
+CVE-2009-2042
+
+libpng does not properly parse 1-bit interlaced images with width values
+that are not divisible by 8, which causes libpng to include
+uninitialized bits in certain rows of a PNG file and might allow remote
+attackers to read portions of sensitive memory via out-of-bounds
+pixels in the file.
+
+CVE-2010-0205
+
+libpng does not properly handle compressed ancillary-chunk data that has
+a disproportionately large uncompressed representation, which allows
+remote attackers to cause a denial of service (memory and CPU
+consumption, and  application hang) via a crafted PNG file
+
+For the stable distribution (lenny), these problems have been fixed in
+version 1.2.27-2+lenny3.
+
+For the testing (squeeze) and unstable (sid) distribution, these
+problems have been fixed in version 1.2.43-1
+
+We recommend that you upgrade your libpng package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202032-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2032-1 (libpng)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libpng3", ver:"1.2.27-2+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpng12-dev", ver:"1.2.27-2+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpng12-0", ver:"1.2.27-2+lenny3", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2033_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2033_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2033_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,86 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2033-1 (ejabberd)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67268);
+ script_cve_id("CVE-2010-0305");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2033-1 (ejabberd)");
+
+ desc = "The remote host is missing an update to ejabberd
+announced via advisory DSA 2033-1.
+
+It was discovered that in ejabberd, a distributed XMPP/Jabber server
+written in Erlang, a problem in ejabberd_c2s.erl allows remote
+authenticated users to cause a denial of service by sending a large
+number of c2s (client2server) messages; that triggers an overload of the
+queue, which in turn causes a crash of the ejabberd daemon.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 2.0.1-6+lenny2.
+
+For the testing distribution (squeeze), this problem has been fixed in
+version 2.1.2-2.
+
+For the testing distribution (sid), this problem has been fixed in
+version 2.1.2-2.
+
+We recommend that you upgrade your ejabberd packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202033-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2033-1 (ejabberd)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"ejabberd", ver:"2.0.1-6+lenny2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2036_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2036_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2036_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,92 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2036-1 (jasper)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67269);
+ script_cve_id("CVE-2007-2721", "CVE-2008-3521");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2036-1 (jasper)");
+
+ desc = "The remote host is missing an update to jasper
+announced via advisory DSA 2036-1.
+
+It was discovered that the JasPer JPEG-2000 runtime library allowed an
+attacker to create a crafted input file that could lead to denial of
+service and heap corruption.
+
+Besides addressing this vulnerability, this updates also addresses a
+regression introduced in the security fix for CVE-2008-3521, applied
+before Debian Lenny's release, that could cause errors when reading some
+JPEG input files.
+
+For the stable distribution (lenny), this problem has been fixed in
+version 1.900.1-5.1+lenny1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.900.1-6.
+
+We recommend that you upgrade your jasper package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202036-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2036-1 (jasper)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libjasper-runtime", ver:"1.900.1-5.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libjasper1", ver:"1.900.1-5.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libjasper-dev", ver:"1.900.1-5.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2037_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2037_1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/deb_2037_1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,182 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2037-1 (kdm (kdebase))
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67270);
+ script_cve_id("CVE-2010-0436");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2037-1 (kdm (kdebase))");
+
+ desc = "The remote host is missing an update to kdm (kdebase)
+announced via advisory DSA 2037-1.
+
+Sebastian Krahmer discovered that a race condition in the KDE Desktop
+Environment's KDM display manager, allow a local user to elevate privileges
+to root.
+
+For the stable distribution (lenny), this problem has been fixed in version
+4:3.5.9.dfsg.1-6+lenny1.
+
+For the unstable distribution (sid), this problem will be fixed soon.
+
+We recommend that you upgrade your kdm package.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202037-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2037-1 (kdm (kdebase))");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"kdebase-doc", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdeeject", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-doc-html", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-data", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ksmserver", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-bin", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-bin-kde3", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kappfinder", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"konsole", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kpersonalizer", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kcontrol", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kicker", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"klipper", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kfind", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libkonq4", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kate", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libkonq4-dev", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kmenuedit", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ksysguardd", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdepasswd", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ksysguard", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdm", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdeprint", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kpager", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-dbg", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ksplash", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdesktop", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-kio-plugins", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kdebase-dev", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"konqueror", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"konqueror-nsplugins", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"kwin", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"khelpcenter", ver:"4.0.0.really.3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ktip", ver:"3.5.9.dfsg.1-6+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_ZendFramework1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ZendFramework1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_ZendFramework1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,82 @@
+#
+#VID 8ad1c404-3e78-11df-a5a1-0050568452ac
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 8ad1c404-3e78-11df-a5a1-0050568452ac
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67296);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: ZendFramework");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: ZendFramework
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/
+http://framework.zend.com/security/advisory/ZF2010-07
+http://osdir.com/ml/bugtraq.security/2010-03/msg00133.html
+http://packetstormsecurity.org/1003-exploits/dojo-xss.txt
+http://secunia.com/advisories/38964
+http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/
+http://www.vuxml.org/freebsd/8ad1c404-3e78-11df-a5a1-0050568452ac.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: ZendFramework");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"ZendFramework");
+if(!isnull(bver) && revcomp(a:bver, b:"1.10.3")<0) {
+    security_note(0, data:"Package ZendFramework version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_curl3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_curl3.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_curl3.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,88 @@
+#
+#VID c8c31c41-49ed-11df-83fb-0015587e2cc1
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID c8c31c41-49ed-11df-83fb-0015587e2cc1
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67287);
+ script_cve_id("CVE-2010-0734");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: curl");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: curl
+
+CVE-2010-0734
+content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is
+enabled, does not properly restrict the amount of callback data sent
+to an application that requests automatic decompression, which might
+allow remote attackers to cause a denial of service (application
+crash) or have unspecified other impact by sending crafted compressed
+data to an application that relies on the intended data-length limit.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://curl.haxx.se/docs/adv_20100209.html
+http://www.debian.org/security/2010/dsa-2023
+http://www.openwall.com/lists/oss-security/2010/02/09/5
+http://www.vuxml.org/freebsd/c8c31c41-49ed-11df-83fb-0015587e2cc1.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: curl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"curl");
+if(!isnull(bver) && revcomp(a:bver, b:"7.10.5")>=0 && revcomp(a:bver, b:"7.20.0")<0) {
+    security_note(0, data:"Package curl version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_dojo.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dojo.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_dojo.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,81 @@
+#
+#VID 805603a1-3e7a-11df-a5a1-0050568452ac
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 805603a1-3e7a-11df-a5a1-0050568452ac
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67295);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: dojo");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: dojo
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/
+http://osdir.com/ml/bugtraq.security/2010-03/msg00133.html
+http://packetstormsecurity.org/1003-exploits/dojo-xss.txt
+http://secunia.com/advisories/38964
+http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/
+http://www.vuxml.org/freebsd/805603a1-3e7a-11df-a5a1-0050568452ac.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: dojo");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"dojo");
+if(!isnull(bver) && revcomp(a:bver, b:"1.4.2")<0) {
+    security_note(0, data:"Package dojo version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_ejabberd0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ejabberd0.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_ejabberd0.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,87 @@
+#
+#VID a04a3c13-4932-11df-83fb-0015587e2cc1
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID a04a3c13-4932-11df-83fb-0015587e2cc1
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67288);
+ script_cve_id("CVE-2010-0305");
+ script_bugtraq_id(38003);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: ejabberd");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: ejabberd
+
+CVE-2010-0305
+ejabberd_c2s.erl in ejabberd before 2.1.3 allows remote attackers to
+cause a denial of service (daemon crash) via a large number of c2s
+(aka client2server) messages that trigger a queue overload.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/advisories/38337
+http://support.process-one.net/browse/EJAB-1173
+http://www.openwall.com/lists/oss-security/2010/01/29/1
+http://xforce.iss.net/xforce/xfdb/56025
+http://www.vuxml.org/freebsd/a04a3c13-4932-11df-83fb-0015587e2cc1.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: ejabberd");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"ejabberd");
+if(!isnull(bver) && revcomp(a:bver, b:"2.1.3")<0) {
+    security_note(0, data:"Package ejabberd version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_firefox46.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox46.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_firefox46.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,84 @@
+#
+#VID ec8f449f-40ed-11df-9edc-000f20797ede
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID ec8f449f-40ed-11df-9edc-000f20797ede
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67297);
+ script_cve_id("CVE-2010-1121");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: firefox");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: firefox
+
+CVE-2010-1121
+Unspecified vulnerability in Mozilla Firefox 3 on Windows 7 allows
+remote attackers to execute arbitrary code via unknown vectors that
+trigger memory corruption, as demonstrated by Nils during a Pwn2Own
+competition at CanSecWest 2010.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.mozilla.org/security/announce/2010/mfsa2010-25.html
+http://www.vuxml.org/freebsd/ec8f449f-40ed-11df-9edc-000f20797ede.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: firefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.6,1")>0 && revcomp(a:bver, b:"3.6.3,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_irssi.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_irssi.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_irssi.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,105 @@
+#
+#VID 3b7967f1-49e8-11df-83fb-0015587e2cc1
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 3b7967f1-49e8-11df-83fb-0015587e2cc1
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67289);
+ script_cve_id("CVE-2010-1155", "CVE-2010-1156");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: irssi");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   irssi
+   zh-irssi
+   irssi-devel
+
+CVE-2010-1155
+Irssi before 0.8.15, when SSL is used, does not verify that the server
+hostname matches a domain name in the subject's Common Name (CN) field
+or a Subject Alternative Name field of the X.509 certificate, which
+allows man-in-the-middle attackers to spoof IRC servers via an
+arbitrary certificate.
+
+CVE-2010-1156
+core/nicklist.c in Irssi before 0.8.15 allows remote attackers to
+cause a denial of service (NULL pointer dereference and application
+crash) via vectors related to an attempted fuzzy nick match at the
+instant that a victim leaves a channel.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://xforce.iss.net/xforce/xfdb/57790
+http://xforce.iss.net/xforce/xfdb/57791
+http://www.vuxml.org/freebsd/3b7967f1-49e8-11df-83fb-0015587e2cc1.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: irssi");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"irssi");
+if(!isnull(bver) && revcomp(a:bver, b:"0.8.15")<0) {
+    security_note(0, data:"Package irssi version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"zh-irssi");
+if(!isnull(bver) && revcomp(a:bver, b:"0.8.15")<0) {
+    security_note(0, data:"Package zh-irssi version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"irssi-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"20100325")<0) {
+    security_note(0, data:"Package irssi-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_kdebase1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_kdebase1.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_kdebase1.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,92 @@
+#
+#VID 3987c5d1-47a9-11df-a0d5-0016d32f24fb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 3987c5d1-47a9-11df-a0d5-0016d32f24fb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67294);
+ script_cve_id("CVE-2010-0436");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: kdebase");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   kdebase
+   kdebase-workspace
+
+CVE-2010-0436
+Race condition in backend/ctrl.c in KDM in KDE Software Compilation
+(SC) 2.2.0 through 4.4.2 allows local users to change the permissions
+of arbitrary files, and consequently gain privileges, by blocking the
+removal of a certain directory that contains a control socket, related
+to improper interaction with ksm.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.kde.org/info/security/advisory-20100413-1.txt
+http://www.vuxml.org/freebsd/3987c5d1-47a9-11df-a0d5-0016d32f24fb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: kdebase");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"kdebase");
+if(!isnull(bver) && revcomp(a:bver, b:"4")<0) {
+    security_note(0, data:"Package kdebase version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"kdebase-workspace");
+if(!isnull(bver) && revcomp(a:bver, b:"4.3.5_1")<=0) {
+    security_note(0, data:"Package kdebase-workspace version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_krb52.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_krb52.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_krb52.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,85 @@
+#
+#VID a30573dc-4893-11df-a5f9-001641aeabdf
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID a30573dc-4893-11df-a5f9-001641aeabdf
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67290);
+ script_cve_id("CVE-2010-0629");
+ script_bugtraq_id(39247);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: krb5");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: krb5
+
+CVE-2010-0629
+Use-after-free vulnerability in kadmin/server/server_stubs.c in
+kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote
+authenticated users to cause a denial of service (daemon crash) via a
+request from a kadmin client that sends an invalid API version number.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt
+http://www.vuxml.org/freebsd/a30573dc-4893-11df-a5f9-001641aeabdf.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: krb5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"krb5");
+if(!isnull(bver) && revcomp(a:bver, b:"1.6.3_9")<=0) {
+    security_note(0, data:"Package krb5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_krb53.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_krb53.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_krb53.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,94 @@
+#
+#VID 9ac0f9c4-492b-11df-83fb-0015587e2cc1
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 9ac0f9c4-492b-11df-83fb-0015587e2cc1
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67291);
+ script_cve_id("CVE-2010-0283", "CVE-2010-0628");
+ script_bugtraq_id(38260,38904);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: krb5");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: krb5
+
+CVE-2010-0283
+The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7
+before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial
+of service (assertion failure and daemon crash) via an invalid (1)
+AS-REQ or (2) TGS-REQ request.
+
+CVE-2010-0628
+The spnego_gss_accept_sec_context function in
+lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in
+MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows
+remote attackers to cause a denial of service (assertion failure and
+daemon crash) via an invalid packet that triggers incorrect
+preparation of an error token.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-001.txt
+http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt
+http://www.vuxml.org/freebsd/9ac0f9c4-492b-11df-83fb-0015587e2cc1.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: krb5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"krb5");
+if(!isnull(bver) && revcomp(a:bver, b:"1.7")>=0 && revcomp(a:bver, b:"1.7_2")<=0) {
+    security_note(0, data:"Package krb5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_mahara.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mahara.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_mahara.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,83 @@
+#
+#VID 5053420c-4935-11df-83fb-0015587e2cc1
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 5053420c-4935-11df-83fb-0015587e2cc1
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67292);
+ script_cve_id("CVE-2010-0400");
+ script_bugtraq_id(39253);
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: mahara");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: mahara
+
+CVE-2010-0400
+SQL injection vulnerability in lib/user.php in mahara 1.0.4 allows
+remote attackers to execute arbitrary SQL commands via a username.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.debian.org/security/2010/dsa-2030
+http://www.vuxml.org/freebsd/5053420c-4935-11df-83fb-0015587e2cc1.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: mahara");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"mahara");
+if(!isnull(bver) && revcomp(a:bver, b:"1.1.8")<0) {
+    security_note(0, data:"Package mahara version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_sudo6.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_sudo6.nasl	2010-04-20 20:54:55 UTC (rev 7384)
+++ trunk/openvas-plugins/scripts/freebsd_sudo6.nasl	2010-04-21 01:31:17 UTC (rev 7385)
@@ -0,0 +1,87 @@
+#
+#VID 1a9f678d-48ca-11df-85f8-000c29a67389
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 1a9f678d-48ca-11df-85f8-000c29a67389
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(67293);
+ script_cve_id("CVE-2010-1163");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: sudo");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: sudo
+
+CVE-2010-1163
+The command matching functionality in sudo 1.6.8 through 1.7.2p5 does
+not properly handle when a file in the current working directory has
+the same name as a pseudo-command in the sudoers file and the PATH
+contains an entry for '.', which allows local users to execute
+arbitrary commands via a Trojan horse executable, as demonstrated
+using sudoedit, a different vulnerability than CVE-2010-0426.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.sudo.ws/pipermail/sudo-announce/2010-April/000093.html
+http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html
+http://www.vuxml.org/freebsd/1a9f678d-48ca-11df-85f8-000c29a67389.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: sudo");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"sudo");
+if(!isnull(bver) && revcomp(a:bver, b:"1.7.2.6")<0) {
+    security_note(0, data:"Package sudo version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list