[Openvas-commits] r11523 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Aug 31 10:37:35 CEST 2011


Author: veerendragg
Date: 2011-08-31 10:37:30 +0200 (Wed, 31 Aug 2011)
New Revision: 11523

Added:
   trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10740_dhcp_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10928_mingw32-libpng_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10936_apache-commons-daemon_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_10954_mingw32-libpng_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_11197_cups_fc15.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_flash_player_mult_vuln_aug11_lin.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_aug11_win.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_detect.nasl
   trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_mult_code_exec_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_detect_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_01_aug11.nasl
   trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_02_aug11.nasl
   trunk/openvas-plugins/scripts/secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/cpe.inc
Log:
Added new plugins. Added new LSC plugins. Added new CPEs.

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/ChangeLog	2011-08-31 08:37:30 UTC (rev 11523)
@@ -1,3 +1,29 @@
+2011-08-31  Veerendra G.G <veerendragg at secpod.com>
+
+	* scripts/secpod_adobe_flash_player_mult_vuln_aug11_lin.nasl,
+	scripts/secpod_adobe_prdts_mult_vuln_aug11_win.nasl,
+	scripts/secpod_adobe_prdts_mult_vuln_macosx.nasl,
+	scripts/secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl,
+	scripts/secpod_realplayer_mult_vuln_macosx.nasl,
+	scripts/secpod_adobe_prdts_detect_macosx.nasl,
+	scripts/secpod_realplayer_mult_vuln_win_02_aug11.nasl,
+	scripts/secpod_mcafee_saas_endpoint_protection_detect.nasl,
+	scripts/secpod_realplayer_mult_vuln_win_01_aug11.nasl,
+	scripts/secpod_mcafee_saas_endpoint_protection_mult_code_exec_vuln.nasl,
+	scripts/secpod_realplayer_detect_macosx.nasl:
+	Added new plugins.
+
+	* scripts/gb_fedora_2011_10954_mingw32-libpng_fc14.nasl,
+	scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl,
+	scripts/gb_fedora_2011_10740_dhcp_fc15.nasl,
+	scripts/gb_fedora_2011_10928_mingw32-libpng_fc15.nasl,
+	scripts/gb_fedora_2011_11197_cups_fc15.nasl,
+	scripts/gb_fedora_2011_10936_apache-commons-daemon_fc15.nasl:
+	Added new LSC plugins.
+
+	* scripts/cpe.inc:
+	Added new CPEs.
+
 2011-08-30  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_squid_49356.nasl,
@@ -27,7 +53,7 @@
 	scripts/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl:
 	Added new plugin.
 
-	* scripts/cpe.inc
+	* scripts/cpe.inc,
 	scripts/gb_wordpress_45294.nasl,
 	scripts/gb_clamav_detect_win.nasl,
 	scripts/secpod_adobe_shockwave_player_detect.nasl:

Modified: trunk/openvas-plugins/scripts/cpe.inc
===================================================================
--- trunk/openvas-plugins/scripts/cpe.inc	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/cpe.inc	2011-08-31 08:37:30 UTC (rev 11523)
@@ -924,7 +924,11 @@
 "GoogleChrome/MacOSX/Version", "^([0-9.]+)", "cpe:/a:google:chrome:",
 "Opera/MacOSX/Version", "^([0-9.]+)", "cpe:/a:opera:opera_browser:",
 "IGSS/Win/Ver", "^([0-9.]+)", "cpe:/a:7t:igss:",
-"Adobe/Shockwave/MacOSX/Version", "^([0-9.]+)", "cpe:/a:adobe:shockwave_player:"
+"Adobe/Shockwave/MacOSX/Version", "^([0-9.]+)", "cpe:/a:adobe:shockwave_player:",
+"McAfee/SaaS/Win/Ver", "^([0-9.]+)", "cpe:/a:mcafee:saas_endpoint_protection:",
+"Adobe/Flash/Player/MacOSX/Version", "^([0-9.]+)", "cpe:/a:adobe:flash_player:",
+"Adobe/Air/MacOSX/Version", "^([0-9.]+)", "cpe:/a:adobe:adobe_air:",
+"RealPlayer/MacOSX/Version", "^([0-9.]+)", "cpe:/a:realnetworks:realplayer:"
 );
 
 

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1196_system-config-printer_centos4_i386.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for system-config-printer CESA-2011:1196 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(880968);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1196");
+  script_cve_id("CVE-2011-2899");
+  script_name("CentOS Update for system-config-printer CESA-2011:1196 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  system-config-printer is a print queue configuration tool with a graphical
+  user interface.
+  
+  It was found that system-config-printer did not properly sanitize NetBIOS
+  and workgroup names when searching for network printers. A remote attacker
+  could use this flaw to execute arbitrary code with the privileges of the
+  user running system-config-printer. (CVE-2011-2899)
+  
+  All users of system-config-printer are advised to upgrade to these updated
+  packages, which contain a backported patch to resolve this issue. Running
+  instances of system-config-printer must be restarted for this update to
+  take effect.
+
+
+  Affected Software/OS:
+  system-config-printer on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-August/017704.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of system-config-printer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"system-config-printer", rpm:"system-config-printer~0.6.116.10~1.6.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"system-config-printer-gui", rpm:"system-config-printer-gui~0.6.116.10~1.6.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_10740_dhcp_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10740_dhcp_fc15.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10740_dhcp_fc15.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for dhcp FEDORA-2011-10740
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863464);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-10740");
+  script_cve_id("CVE-2011-2748", "CVE-2011-2749");
+  script_name("Fedora Update for dhcp FEDORA-2011-10740");
+  desc = "
+
+  Vulnerability Insight:
+  DHCP (Dynamic Host Configuration Protocol) is a protocol which allows
+  individual devices on an IP network to get their own network
+  configuration information (IP address, subnetmask, broadcast address,
+  etc.) from a DHCP server. The overall purpose of DHCP is to make it
+  easier to administer a large network.  The dhcp package includes the
+  ISC DHCP service and relay agent.
+  
+  To use DHCP on your network, install a DHCP service (or relay agent),
+  and on clients run a DHCP client daemon.  The dhcp package provides
+  the ISC DHCP service and relay agent.
+
+
+  Affected Software/OS:
+  dhcp on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064504.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of dhcp");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"dhcp", rpm:"dhcp~4.2.1~10.P1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_10928_mingw32-libpng_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10928_mingw32-libpng_fc15.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10928_mingw32-libpng_fc15.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,81 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for mingw32-libpng FEDORA-2011-10928
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863468);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-10928");
+  script_cve_id("CVE-2011-2690", "CVE-2011-2692", "CVE-2011-2501");
+  script_name("Fedora Update for mingw32-libpng FEDORA-2011-10928");
+  desc = "
+
+  Vulnerability Insight:
+  MinGW Windows Libpng library.
+
+
+  Affected Software/OS:
+  mingw32-libpng on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064528.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mingw32-libpng");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"mingw32-libpng", rpm:"mingw32-libpng~1.4.8~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_10936_apache-commons-daemon_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10936_apache-commons-daemon_fc15.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10936_apache-commons-daemon_fc15.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for apache-commons-daemon FEDORA-2011-10936
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863466);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-10936");
+  script_cve_id("CVE-2011-2729");
+  script_name("Fedora Update for apache-commons-daemon FEDORA-2011-10936");
+  desc = "
+
+  Vulnerability Insight:
+  The scope of this package is to define an API in line with the current
+  Java Platform APIs to support an alternative invocation mechanism
+  which could be used instead of the public static void main(String[])
+  method.  This specification covers the behavior and life cycle of what
+  we define as Java daemons, or, in other words, non interactive
+  Java applications.
+
+
+  Affected Software/OS:
+  apache-commons-daemon on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064564.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of apache-commons-daemon");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"apache-commons-daemon", rpm:"apache-commons-daemon~1.0.7~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_10954_mingw32-libpng_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_10954_mingw32-libpng_fc14.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_10954_mingw32-libpng_fc14.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,81 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for mingw32-libpng FEDORA-2011-10954
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863465);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-10954");
+  script_cve_id("CVE-2011-2690", "CVE-2011-2692", "CVE-2011-2501");
+  script_name("Fedora Update for mingw32-libpng FEDORA-2011-10954");
+  desc = "
+
+  Vulnerability Insight:
+  MinGW Windows Libpng library.
+
+
+  Affected Software/OS:
+  mingw32-libpng on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064547.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mingw32-libpng");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"mingw32-libpng", rpm:"mingw32-libpng~1.4.8~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_11197_cups_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_11197_cups_fc15.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_11197_cups_fc15.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for cups FEDORA-2011-11197
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863467);
+  script_version("$Revision$: 1.0");
+  script_tag(name:"cvss_base", value:"5.1");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-11197");
+  script_cve_id("CVE-2011-2896");
+  script_name("Fedora Update for cups FEDORA-2011-11197");
+  desc = "
+
+  Vulnerability Insight:
+  The Common UNIX Printing System provides a portable printing layer for
+  UNIX&#174; operating systems. It has been developed by Easy Software Products
+  to promote a standard printing solution for all UNIX vendors and users.
+  CUPS provides the System V and Berkeley command-line interfaces.
+
+
+  Affected Software/OS:
+  cups on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-August/064600.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of cups");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"cups", rpm:"cups~1.4.8~2.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/secpod_adobe_flash_player_mult_vuln_aug11_lin.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_flash_player_mult_vuln_aug11_lin.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_adobe_flash_player_mult_vuln_aug11_lin.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_adobe_flash_player_mult_vuln_aug11_lin.nasl 16701 2011-08-17 12:52:12Z aug $
+#
+# Adobe Flash Player Multiple Vulnerabilities August-2011 (Linux)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902710);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2130", "CVE-2011-2134", "CVE-2011-2137",
+                "CVE-2011-2135", "CVE-2011-2136", "CVE-2011-2138",
+                "CVE-2011-2139", "CVE-2011-2140", "CVE-2011-2414",
+                "CVE-2011-2415", "CVE-2011-2416", "CVE-2011-2417",
+                "CVE-2011-2425", "CVE-2011-2424");
+  script_bugtraq_id(49073, 49074, 49075, 49082, 49079, 49080, 49086, 49083,
+                    49076, 49077, 49081, 49084, 49085);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("Adobe Flash Player Multiple Vulnerabilities August-2011 (Linux)");
+  desc = "
+  Overview: This host is installed with Adobe Flash Player and is prone to
+  multiple vulnerabilities.
+
+  Vulnerability Insight:
+  Multiple flaws are caused by memory corruptions, cross-site information
+  disclosure, buffer overflow and integer overflow errors.
+
+  Impact:
+  Successful exploitation will let attackers to execute arbitrary code in the
+  context of the user running the affected application. Failed exploit attempts
+  will likely result in denial-of-service conditions.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Adobe Flash Player versions prior to 10.3.183.5
+
+  Fix: Upgrade to Adobe Flash Player version 10.3.183.5
+  For updates refer, http://www.adobe.com
+
+  References:
+  http://www.adobe.com/support/security/bulletins/apsb11-21.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Adobe Flash Player");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("General");
+  script_dependencies("gb_adobe_flash_player_detect_lin.nasl");
+  script_require_keys("AdobeFlashPlayer/Linux/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+## Get Adobe Flash Player version from KB
+flashVer = get_kb_item("AdobeFlashPlayer/Linux/Ver");
+if(flashVer)
+{
+  flashVer = ereg_replace(pattern:",", string:flashVer, replace: ".");
+
+  ## Check for Adobe flash player versions < 10.3.183.5
+  if(version_is_less(version:flashVer, test_version:"10.3.183.5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,92 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_adobe_prdts_detect_macosx.nasl 16701 2011-08-17 13:50:50Z aug $
+#
+# Adobe Products Version Detection (Mac OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902711);
+  script_version("$Revision: 1.0$");
+  script_tag(name:"risk_factor", value:"None");
+  script_name("Adobe Products Version Detection (Mac OS X)");
+  desc = "
+  Overview: This script finds the installed product version of Adobe Flash
+  Player and Adobe Air on Mac OS X and sets the result in KB ";
+
+  script_description(desc);
+  script_summary("Set the version of Adobe Products in KB");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_dependencies("gather-package-list.nasl");
+  script_family("Service detection");
+  exit(0);
+}
+
+
+include("ssh_func.inc");
+include("version_func.inc");
+
+## Checking OS
+sock = ssh_login_or_reuse_connection();
+if(!sock){
+  exit(0);
+}
+
+## Checking for Mac OS X
+if (!get_kb_item("ssh/login/osx_name")){
+   exit(0);
+}
+
+## Trying to get Adobe Flash Player version from packages
+buffer = get_kb_item("ssh/login/osx_pkgs");
+if(buffer != NULL && buffer =~ "com.adobe.pkg.FlashPlayer")
+{
+  ## Grep for the version
+  version = eregmatch(pattern:"FlashPlayer[^\n]([0-9.]+)", string:buffer);
+  if(version[1] != NULL)
+  {
+   ## Set the version in KB
+   set_kb_item(name: "Adobe/Flash/Player/MacOSX/Version", value:version[1]);
+   security_note(data:"Adobe Flash Player version " + version[1] +
+        " was detected on this host");
+  }
+}
+
+## Get the version of Adobe Air
+airVer = chomp(ssh_cmd(socket:sock, cmd:"defaults read /Applications/" +
+         "Adobe\ AIR\ Installer.app/Contents/Info " +
+         "CFBundleShortVersionString"));
+
+## Close Socket
+close(sock);
+
+## Exit if version not found
+if(isnull(airVer) || "does not exist" >< airVer){
+  exit(0);
+}
+
+## Set the version in KB
+set_kb_item(name: "Adobe/Air/MacOSX/Version", value:airVer);
+security_note(data:"Adobe Air version " + airVer +
+                  " was detected on this host");

Added: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_aug11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_aug11_win.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_aug11_win.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_adobe_prdts_mult_vuln_aug11_win.nasl 16701 2011-08-17 12:52:12Z aug $
+#
+# Adobe Air and Flash Player Multiple Vulnerabilities August-2011 (Windows)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902709);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2130", "CVE-2011-2134", "CVE-2011-2137",
+                "CVE-2011-2135", "CVE-2011-2136", "CVE-2011-2138",
+                "CVE-2011-2139", "CVE-2011-2140", "CVE-2011-2414",
+                "CVE-2011-2415", "CVE-2011-2416", "CVE-2011-2417",
+                "CVE-2011-2425", "CVE-2011-2424");
+  script_bugtraq_id(49073, 49074, 49075, 49082, 49079, 49080, 49086, 49083,
+                    49076, 49077, 49081, 49084, 49085);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("Adobe Air and Flash Player Multiple Vulnerabilities August-2011 (Windows)");
+  desc = "
+  Overview: This host is installed with Adobe Air and/or Flash Player and is
+  prone to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  Multiple flaws are caused by memory corruptions, cross-site information
+  disclosure, buffer overflow and integer overflow errors.
+
+  Impact:
+  Successful exploitation will let attackers to execute arbitrary code in the
+  context of the user running the affected application. Failed exploit attempts
+  will likely result in denial-of-service conditions.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Adobe Air versions prior to 2.7.1
+  Adobe Flash Player versions prior to 10.3.183.5
+
+  Fix: Upgrade to Adobe Flash Player version 10.3.183.5 and Adobe Air version
+  2.7.1 or later.
+  For updates refer, http://www.adobe.com
+
+  References:
+  http://www.adobe.com/support/security/bulletins/apsb11-21.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Adobe Air and Flash Player");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("General");
+  script_dependencies("gb_adobe_flash_player_detect_win.nasl");
+  script_require_keys("AdobeFlashPlayer/Win/Ver", "Adobe/Air/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+## Get Adobe Flash Player version from KB
+flashVer = get_kb_item("AdobeFlashPlayer/Win/Ver");
+if(flashVer)
+{
+  ## Check for Adobe flash player versions < 10.3.183.5
+  if(version_is_less(version:flashVer, test_version:"10.3.183.5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+}
+
+## Get Adobe Air version from KB
+airVer = get_kb_item("Adobe/Air/Win/Ver");
+if(airVer)
+{
+   ## Check for Adobe air versions < 2.7.1
+  if(version_is_less(version:airVer, test_version:"2.7.1")){
+    security_hole(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_macosx.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_mult_vuln_macosx.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_adobe_prdts_mult_vuln_macosx.nasl 16701 2011-08-19 11:52:12Z aug $
+#
+# Adobe Air and Flash Player Multiple Vulnerabilities (Mac OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902712);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2130", "CVE-2011-2134", "CVE-2011-2137",
+                "CVE-2011-2135", "CVE-2011-2136", "CVE-2011-2138",
+                "CVE-2011-2139", "CVE-2011-2140", "CVE-2011-2414",
+                "CVE-2011-2415", "CVE-2011-2416", "CVE-2011-2417",
+                "CVE-2011-2425", "CVE-2011-2424");
+  script_bugtraq_id(49073, 49074, 49075, 49082, 49079, 49080, 49086, 49083,
+                    49076, 49077, 49081, 49084, 49085);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("Adobe Air and Flash Player Multiple Vulnerabilities (Mac OS X)");
+  desc = "
+  Overview: This host is installed with Adobe Air and/or Flash Player and is
+  prone to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  Multiple flaws are caused by memory corruptions, cross-site information
+  disclosure, buffer overflow and integer overflow errors.
+
+  Impact:
+  Successful exploitation will let attackers to execute arbitrary code in the
+  context of the user running the affected application. Failed exploit attempts
+  will likely result in denial-of-service conditions.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Adobe Air versions prior to 2.7.1
+  Adobe Flash Player versions prior to 10.3.183.5
+
+  Fix: Upgrade to Adobe Flash Player version 10.3.183.5 and Adobe Air version
+  2.7.1 or later.
+  For updates refer, http://www.adobe.com
+
+  References:
+  http://www.adobe.com/support/security/bulletins/apsb11-21.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Adobe Air and Flash Player");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("General");
+  script_dependencies("secpod_adobe_prdts_detect_macosx.nasl");
+  script_require_keys("Adobe/Flash/Player/MacOSX/Version", "Adobe/Air/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+## Get Adobe Flash Player version from KB
+flashVer = get_kb_item("Adobe/Flash/Player/MacOSX/Version");
+if(flashVer)
+{
+  ## Check for Adobe flash player versions < 10.3.183.5
+  if(version_is_less(version:flashVer, test_version:"10.3.183.5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+}
+
+## Get Adobe Air version from KB
+airVer = get_kb_item("Adobe/Air/MacOSX/Version");
+if(airVer)
+{
+   ## Check for Adobe air versions < 2.7.1
+  if(version_is_less(version:airVer, test_version:"2.7.1")){
+    security_hole(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_detect.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_detect.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,75 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_mcafee_saas_endpoint_protection_detect.nasl 16699 2011-08-29 15:15:15Z aug $
+#
+# McAfee SaaS Endpoint Protection Version Detection (Windows)
+#
+# Authors:
+# Sooraj KS <kssooraj at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902561);
+  script_version("$Revision: 1.0$");
+  script_tag(name:"risk_factor", value:"None");
+  script_name("McAfee SaaS Endpoint Protection Version Detection (Windows)");
+  desc = "
+  Overview: This script finds the installed McAfee SaaS Endpoint Protection
+  version and saves the result in KB. ";
+
+  script_description(desc);
+  script_summary("Set the Version of McAfee SaaS Endpoint Protection in KB");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Service detection");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_keys("SMB/WindowsVersion");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("secpod_smb_func.inc");
+
+## Confirm Windows
+if(!get_kb_item("SMB/WindowsVersion")){
+  exit(0);
+}
+
+## Confirm Application
+key = "SOFTWARE\McAfee\ManagedServices\Agent";
+if(!registry_key_exists(key:key)) {
+  exit(0);
+}
+
+name = registry_get_sz(key:key, item:"szAppName");
+if("McAfee Security-as-a-Service" >< name)
+{
+  ## Get Version
+  version = registry_get_sz(key:key, item:"szMyAsUtilVersion");
+  if(version)
+  {
+    ## Set McAfee SaaS Endpoint Protection Version in KB
+    set_kb_item(name:"McAfee/SaaS/Win/Ver", value:version);
+    security_note(data:"McAfee SaaS Endpoint Protection " + version +
+                       " was detected on the host");
+  }
+}

Added: trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_mult_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_mult_code_exec_vuln.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_mcafee_saas_endpoint_protection_mult_code_exec_vuln.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_mcafee_saas_endpoint_protection_mult_code_exec_vuln.nasl 16699 2011-08-29 15:15:15Z aug $
+#
+# McAfee SaaS Endpoint Protection ActiveX Controls Multiple Code Execution Vulnerabilities
+#
+# Authors:
+# Sooraj KS <kssooraj at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902562);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-3006", "CVE-2011-3007");
+  script_bugtraq_id(49087);
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("McAfee SaaS Endpoint Protection ActiveX Controls Multiple Code Execution Vulnerabilities");
+  desc = "
+  Overview: This host is installed with McAfee SaaS Endpoint Protection and is
+  prone to multiple code execution vulnerabilities.
+
+  Vulnerability Insight:
+  - An error within the MyASUtil ActiveX control (MyAsUtil5.2.0.603.dll) when
+    processing the 'CreateSecureObject()' method can be exploited to inject
+    and execute arbitrary commands.
+  - The insecure 'Start()' method within the MyCioScan ActiveX control
+    (myCIOScn.dll) can be exploited to write to arbitrary files in the context
+    of the currently logged-on user.
+
+  Impact:
+  Successful exploitation could allow attackers to execute arbitrary code in
+  the context of the application running the ActiveX control.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  McAfee SaaS Endpoint Protection version 5.2.1 and prior.
+
+  Fix: Upgrade to McAfee SaaS Endpoint Protection version 5.2.2 or later,
+  For updates refer, http://www.mcafeeasap.com/
+
+  References:
+  http://secunia.com/advisories/45506
+  http://securitytracker.com/id/1025890
+  https://kc.mcafee.com/corporate/index?page=content&id=SB10016 ";
+
+  script_description(desc);
+  script_summary("Check for the version of McAfee SaaS Endpoint Protection");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("General");
+  script_dependencies("secpod_mcafee_saas_endpoint_protection_detect.nasl");
+  script_require_keys("McAfee/SaaS/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+## Get version from KB
+version = get_kb_item("McAfee/SaaS/Win/Ver");
+if(version)
+{
+  ## Check for McAfee SaaS Endpoint Protection versions prior to 5.2.2
+  if(version_is_less(version:version, test_version:"5.2.2")) {
+    security_hole(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/secpod_realplayer_detect_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_detect_macosx.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_detect_macosx.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,76 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_realplayer_detect_macosx.nasl 16833 2011-08-31 16:50:50Z aug $
+#
+# RealNetworks RealPlayer Version Detection (Mac OS X)
+#
+# Authors:
+# Rachana Shetty <srachana at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902622);
+  script_version("$Revision: 1.0$");
+  script_tag(name:"risk_factor", value:"None");
+  script_name("RealNetworks RealPlayer Version Detection (Mac OS X)");
+  desc = "
+  Overview: This script finds the installed RealPlayer on Mac OS X and saves
+  the result in KB.";
+
+  script_description(desc);
+  script_summary("Set the version of RealPlayer in KB");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 SecPod");
+  script_dependencies("gather-package-list.nasl");
+  script_family("Service detection");
+  exit(0);
+}
+
+
+include("ssh_func.inc");
+include("version_func.inc");
+
+## Checking OS
+sock = ssh_login_or_reuse_connection();
+if(!sock){
+  exit(0);
+}
+
+## Checking for Mac OS X
+if (!get_kb_item("ssh/login/osx_name")){
+  exit(0);
+}
+
+## Get the version of RealPlayer
+realVer = chomp(ssh_cmd(socket:sock, cmd:"defaults read /Applications/" +
+               "RealPlayer.app/Contents/Info CFBundleShortVersionString"));
+
+## Close Socket
+close(sock);
+
+## Exit if version not found
+if(isnull(realVer) || "does not exist" >< realVer){
+  exit(0);
+}
+
+## Set the version in KB
+set_kb_item(name: "RealPlayer/MacOSX/Version", value:realVer);
+security_note(data:"RealNetworks RealPlayer version " + realVer +
+                  " was detected on this host");

Added: trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_macosx.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_realplayer_mult_vuln_macosx.nasl 16833 2011-08-26 13:41:11Z aug $
+#
+# RealNetworks RealPlayer Multiple Vulnerabilities (Mac OS X)
+#
+# Authors:
+# Rachana Shetty <srachana at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902623);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2948", "CVE-2011-2951");
+  script_bugtraq_id(49175, 49173);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("RealNetworks RealPlayer Multiple Vulnerabilities (Mac OS X)");
+  desc = "
+  Overview: This host is installed with RealPlayer which is prone to multiple
+  vulnerabilities
+
+  Vulnerability Insight:
+  Multiple flaws are due to,
+  - Improper handling of DEFINEFONT fields in SWF files which allows remote
+    attackers to execute arbitrary code via a crafted file.
+  - A buffer overflow error which allows remote attackers to execute arbitrary
+    code via a crafted raw_data_frame field in an AAC file.
+
+  Impact: Successful exploitation allows remote attackers to execute arbitrary
+  code or cause a denial of service.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  RealPlayer version 12.0.0.1569 and prior on Mac OS X
+
+  Fix: Upgrade to RealPlayer version 12.0.0.1701 or later,
+  For Updates Refer, http://www.real.com/player
+
+  References:
+  http://secunia.com/advisories/44014/
+  http://secunia.com/advisories/45668/
+  http://service.real.com/realplayer/security/08162011_player/en/ ";
+
+  script_description(desc);
+  script_summary("Check for the version of RealPlayer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 SecPod");
+  script_family("General");
+  script_dependencies("secpod_realplayer_detect_macosx.nasl");
+  script_require_keys("RealPlayer/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+rpVer = get_kb_item("RealPlayer/MacOSX/Version");
+if(isnull(rpVer)){
+  exit(0);
+}
+
+## Check for Realplayer version
+if(version_is_less(version:rpVer, test_version:"12.0.0.1569")){
+  security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_01_aug11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_01_aug11.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_01_aug11.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_realplayer_mult_vuln_win_01_aug11.nasl 16833 2011-08-26 13:41:11Z aug $
+#
+# RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Aug11
+#
+# Authors:
+# Rachana Shetty <srachana at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902621);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2945", "CVE-2011-2947", "CVE-2011-2950", "CVE-2011-2951",
+                "CVE-2011-2954");
+  script_bugtraq_id(49196, 49178, 49172, 49173, 49199);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Aug11");
+  desc = "
+  Overview: This host is installed with RealPlayer which is prone to multiple
+  vulnerabilities
+
+  Vulnerability Insight:
+  Multiple flaws are due to,
+  - A cross-zone scripting error in the ActiveX which allows remote attackers
+    to inject arbitrary web script in the Local Zone via a local HTML document.
+  - A buffer overflow error which allows remote attackers to execute arbitrary
+    code via a crafted raw_data_frame field in an AAC file and a crafted QCP
+    file.
+  - An use-after-free error in the AutoUpdate feature which allows remote
+    attackers to execute arbitrary code via unspecified vectors.
+
+  Impact: Successful exploitation allows remote attackers to execute arbitrary
+  code or cause a denial of service.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  RealPlayer versions 11.0 through 11.1
+  RealPlayer SP versions 1.0 through 1.1.5 (12.x)
+  RealPlayer versions 14.0.0 through 14.0.5
+
+  Fix: Upgrade to RealPlayer version 14.0.6 or later,
+  For Updates Refer, http://www.real.com/player
+
+  References:
+  http://secunia.com/advisories/44014/
+  http://service.real.com/realplayer/security/08162011_player/en/ ";
+
+  script_description(desc);
+  script_summary("Check for the version of RealPlayer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 SecPod");
+  script_family("General");
+  script_dependencies("gb_realplayer_detect_win.nasl");
+  script_require_keys("RealPlayer/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+rpVer = get_kb_item("RealPlayer/Win/Ver");
+if(isnull(rpVer)){
+  exit(0);
+}
+
+## Check for Realplayer version
+if(version_in_range(version:rpVer, test_version:"11.0.0", test_version2:"11.0.2.2315") ||
+   version_in_range(version:rpVer, test_version:"12.0.0", test_version2:"12.0.0.879") ||
+   version_in_range(version:rpVer, test_version:"12.0.1", test_version2:"12.0.1.660")){
+  security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_02_aug11.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_02_aug11.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_realplayer_mult_vuln_win_02_aug11.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,95 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_realplayer_mult_vuln_win_02_aug11.nasl 16833 2011-08-26 13:41:11Z aug $
+#
+# RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Aug11
+#
+# Authors:
+# Rachana Shetty <srachana at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902624);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2946", "CVE-2011-2948", "CVE-2011-2949", "CVE-2011-2952",
+                "CVE-2011-2953", "CVE-2011-2955");
+  script_bugtraq_id(49202, 49175, 49174, 49195, 49200, 49198);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("RealNetworks RealPlayer Multiple Vulnerabilities (Win) - Aug11");
+  desc = "
+  Overview: This host is installed with RealPlayer which is prone to multiple
+  vulnerabilities
+
+  Vulnerability Insight:
+  Multiple flaws are due to,
+  - Unspecified errors in an ActiveX control in the browser plugin.
+  - Improper handling of DEFINEFONT fields in SWF files which allows remote
+    attackers to execute arbitrary code via a crafted file.
+  - A buffer overflow error which allows remote attackers to execute arbitrary
+    code via a crafted raw_data_frame field in an AAC file and crafted ID3v2
+    tags in an MP3 file.
+  - An use-after-free error allows remote attackers to execute arbitrary code
+    via vectors related to a dialog box and a modal dialog box.
+
+  Impact: Successful exploitation allows remote attackers to execute arbitrary
+  code or cause a denial of service.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  RealPlayer versions 11.0 through 11.1
+  RealPlayer SP versions 1.0 through 1.1.5 (12.x)
+  RealPlayer versions 14.0.0 through 14.0.5
+  RealPlayer Enterprise versions 2.0 through 2.1.5
+
+  Fix: Upgrade to RealPlayer version 14.0.6 or later,
+  For Updates Refer, http://www.real.com/player
+
+  References:
+  http://secunia.com/advisories/45608/
+  http://secunia.com/advisories/44014/
+  http://service.real.com/realplayer/security/08162011_player/en/ ";
+
+  script_description(desc);
+  script_summary("Check for the version of RealPlayer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 SecPod");
+  script_family("General");
+  script_dependencies("gb_realplayer_detect_win.nasl");
+  script_require_keys("RealPlayer/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+rpVer = get_kb_item("RealPlayer/Win/Ver");
+if(isnull(rpVer)){
+  exit(0);
+}
+
+## Check for Realplayer version
+if(version_in_range(version:rpVer, test_version:"11.0.0", test_version2:"11.0.2.2315") ||
+   version_in_range(version:rpVer, test_version:"12.0.0", test_version2:"12.0.0.879") ||
+   version_in_range(version:rpVer, test_version:"12.0.1", test_version2:"12.0.1.660") ||
+   version_in_range(version:rpVer, test_version:"6.0.12.1748", test_version2:"6.0.12.1830")){
+  security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl	2011-08-30 18:20:11 UTC (rev 11522)
+++ trunk/openvas-plugins/scripts/secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl	2011-08-31 08:37:30 UTC (rev 11523)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_uusee_uuplayer_activex_mult_code_exec_vuln.nasl 16650 2011-08-30 12:12:12Z aug $
+#
+# UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities
+#
+# Authors:
+# Sooraj KS <kssooraj at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902563);
+  script_version("$Revision: 1.0$");
+  script_cve_id("CVE-2011-2589", "CVE-2011-2590");
+  script_bugtraq_id(48975);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("UUSee UUPlayer ActiveX Control Multiple Remote Code Execution Vulnerabilities");
+  desc = "
+  Overview: This host is installed with UUSee UUPlayer and is prone to multiple
+  remote code execution vulnerabilities.
+
+  Vulnerability Insight:
+  - A boundary error in the UUPlayer ActiveX control when handling the
+   'SendLogAction()' method can be exploited to cause a heap-based buffer
+   overflow via an overly long argument.
+  - An input validation error in the UUPlayer ActiveX control when handling
+    the 'Play()' method can be exploited to execute an arbitrary program via
+    a UNC path passed in the 'MPlayerPath' parameter.
+
+  Impact:
+  Successful exploitation allows remote attackers to execute arbitrary code in
+  the context of the application using the ActiveX control. Failed exploit
+  attempts will likely result in denial-of-service conditions.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  UUSee UUPlayer 2010 6.11.0609.2
+
+  Fix: No solution or patch is available as on 30th August, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://download.uusee.com/
+
+  References:
+  http://osvdb.org/74216
+  http://osvdb.org/74217
+  http://secunia.com/advisories/44885
+  http://xforce.iss.net/xforce/xfdb/68974
+  http://xforce.iss.net/xforce/xfdb/68975 ";
+
+  script_description(desc);
+  script_summary("Check for the version of UUSee UUPlayer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("General");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_keys("SMB/WindowsVersion");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("version_func.inc");
+include("secpod_smb_func.inc");
+
+## Confirm Windows
+if(!get_kb_item("SMB/WindowsVersion")){
+  exit(0);
+}
+
+## Confirm Application
+key = "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\UUSEE";
+if(!registry_key_exists(key:key)) {
+  exit(0);
+}
+
+## Get Version
+version = registry_get_sz(key:key, item:"DisplayVersion");
+if(version)
+{
+  ## Check for UUSee UUPlayer 6.11.0609.2
+  if(version_is_equal(version:version, test_version:"6.11.0609.2")) {
+    security_hole(0);
+  }
+}



More information about the Openvas-commits mailing list