[Openvas-commits] r12059 - trunk/openvas-plugins/scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 9 13:51:21 CET 2011


Author: antu123
Date: 2011-11-09 13:51:19 +0100 (Wed, 09 Nov 2011)
New Revision: 12059

Added:
   trunk/openvas-plugins/scripts/secpod_ms11-083.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-084.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-085.nasl
   trunk/openvas-plugins/scripts/secpod_ms11-086.nasl
Log:
Added new microsoft bulletin plugins november 2011

Added: trunk/openvas-plugins/scripts/secpod_ms11-083.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-083.nasl	2011-11-09 07:03:57 UTC (rev 12058)
+++ trunk/openvas-plugins/scripts/secpod_ms11-083.nasl	2011-11-09 12:51:19 UTC (rev 12059)
@@ -0,0 +1,138 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_ms11-083.nasl 18426 2011-11-09 02:30:35Z nov $
+#
+# Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
+#
+# Authors:
+# Antu Sanadi <santu at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902484);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-2013");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 08:37:28 +0530 (Wed, 09 Nov 2011)");
+  script_name("Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)");
+  desc = "
+  Overview: This host has critical security update missing according to
+  Microsoft Bulletin MS11-083.
+
+  Vulnerability Insight:
+  The flaw is caused due to an integer overflow error in the TCP/IP
+  implementation when parsing UDP traffic and which can be exploited
+  via a continuous flow of specially crafted UDP datagrams sent to a
+  closed port.
+
+  Impact:
+  Successful exploitation could allow remote attacker to execute the arbitrary
+  code in kernel mode. An attacker could then install programs, view, change,
+  delete data or create new accounts with full user rights.
+
+  Impact Level: System
+
+  Affected Software/OS:
+  Microsoft Windows 7 Service Pack 1 and prior
+  Microsoft Windows Vista Service Pack 2 and prior
+  Microsoft Windows Server 2008 Service Pack 2 and prior
+
+  Fix:
+  Run Windows Update and update the listed hotfixes or download and
+  update mentioned hotfixes in the advisory from the below link,
+  http://www.microsoft.com/technet/security/bulletin/ms11-083.mspx
+
+  References:
+  http://secunia.com/advisories/46731
+  http://support.microsoft.com/kb/2588516
+  http://technet.microsoft.com/en-us/security/bulletin/ms11-083 ";
+
+  script_description(desc);
+  script_summary("Check for the vulnerable 'tcpip.sys' file version");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Windows : Microsoft Bulletins");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("secpod_reg.inc");
+include("version_func.inc");
+include("secpod_smb_func.inc");
+
+## Check for OS and Service Pack
+if(hotfix_check_sp(winVista:3, win2008:3, win7:2) <= 0){
+  exit(0);
+}
+
+## MS11-083 Hotfix (2588516)
+if(hotfix_missing(name:"2588516") == 0){
+  exit(0);
+}
+
+## Get System Path
+sysPath = smb_get_systemroot();
+if(!sysPath ){
+  exit(0);
+}
+
+## Get Version from tcpip.sys file
+sysVer = fetch_file_version(sysPath, file_name:"\system32\drivers\tcpip.sys");
+if(!sysVer){
+  exit(0);
+}
+
+## Windows Vista and Windows Server 2008
+if(hotfix_check_sp(winVista:3, win2008:3) > 0)
+{
+  SP = get_kb_item("SMB/WinVista/ServicePack");
+
+  if(!SP) {
+    SP = get_kb_item("SMB/Win2008/ServicePack");
+  }
+
+  if("Service Pack 2" >< SP)
+  {
+    ## Check for tcpip.sys version
+    if(version_in_range(version:sysVer, test_version:"6.0.6002.18000", test_version2:"6.0.6002.18518")||
+       version_in_range(version:sysVer, test_version:"6.0.6002.22000", test_version2:"6.0.6002.22718")){
+      security_hole(0);
+    }
+    exit(0);
+  }
+  security_hole(0);
+}
+
+## Windows 7
+else if(hotfix_check_sp(win7:2) > 0)
+{
+  ## Check for tcpip.sys version
+  if(version_in_range(version:sysVer, test_version:"6.1.7600.16000", test_version2:"6.1.7600.16888")||
+     version_in_range(version:sysVer, test_version:"6.1.7600.20000", test_version2:"6.1.7600.21059")||
+     version_in_range(version:sysVer, test_version:"6.1.7601.17000", test_version2:"6.1.7601.17696")||
+     version_in_range(version:sysVer, test_version:"6.1.7601.21000", test_version2:"6.1.7601.21827")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-083.nasl
___________________________________________________________________
Name: svn:executable
   + *

Added: trunk/openvas-plugins/scripts/secpod_ms11-084.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-084.nasl	2011-11-09 07:03:57 UTC (rev 12058)
+++ trunk/openvas-plugins/scripts/secpod_ms11-084.nasl	2011-11-09 12:51:19 UTC (rev 12059)
@@ -0,0 +1,114 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_ms11-084.nasl 18429 2011-11-09 10:10:10Z nov $
+#
+# Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (2617657)
+#
+# Authors:
+# Antu Sanadi <santu at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902485);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-2004");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 09:06:04 +0530 (Wed, 09 Nov 2011)");
+  script_name("Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (2617657)");
+  desc = "
+  Overview: This host has moderate security update missing according to
+  Microsoft Bulletin MS11-084.
+
+  Vulnerability Insight:
+  The flaw is caused due to an array-indexing error in 'Win32k.sys' when
+  parsing TrueType font files, which can be exploited by attackers to cause
+  a denial of service.
+
+  Impact:
+  Successful exploitation could allow local attackers to gain elevated
+  privileges or to run arbitrary code in kernel mode and take complete control
+  of an affected system. An attacker could then install programs view, change,
+  or delete data or create new accounts with full administrative rights.
+
+  Impact Level: System
+
+  Affected Software/OS:
+  Microsoft Windows 7 Service Pack 1 and prior
+
+  Fix:
+  Run Windows Update and update the listed hotfixes or download and
+  update mentioned hotfixes in the advisory from the below link,
+  http://technet.microsoft.com/en-us/security/bulletin/ms11-084
+
+  References:
+  http://secunia.com/advisories/46751
+  http://support.microsoft.com/kb/2617657
+  http://technet.microsoft.com/en-us/security/bulletin/ms11-084 ";
+
+  script_description(desc);
+  script_summary("Check for the vulnerable 'Win32k.sys' file version");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Windows : Microsoft Bulletins");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("secpod_reg.inc");
+include("version_func.inc");
+include("secpod_smb_func.inc");
+
+## Check for OS and Service Pack
+if(hotfix_check_sp(win7:2) <= 0){
+  exit(0);
+}
+
+## MS11-084 Hotfix (2617657)
+if(hotfix_missing(name:"2617657") == 0){
+  exit(0);
+}
+
+## Get System Path
+sysPath = smb_get_systemroot();
+if(!sysPath){
+  exit(0);
+}
+
+## Get Version from Win32k.sys file
+sysVer = fetch_file_version(sysPath, file_name:"system32\Win32k.sys");
+if(!sysVer){
+  exit(0);
+}
+
+if(hotfix_check_sp(win7:2) > 0)
+{
+  ## Check for Win32k.sys version
+  if(version_in_range(version:sysVer, test_version:"6.1.7600.16000", test_version2:"6.1.7600.16888")||
+     version_in_range(version:sysVer, test_version:"6.1.7600.20000", test_version2:"6.1.7600.21059")||
+     version_in_range(version:sysVer, test_version:"6.1.7601.17000", test_version2:"6.1.7601.17696")||
+     version_in_range(version:sysVer, test_version:"6.1.7601.21000", test_version2:"6.1.7601.21827")){
+    security_hole(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/secpod_ms11-085.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-085.nasl	2011-11-09 07:03:57 UTC (rev 12058)
+++ trunk/openvas-plugins/scripts/secpod_ms11-085.nasl	2011-11-09 12:51:19 UTC (rev 12059)
@@ -0,0 +1,138 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_ms11-085.nasl 18427 2011-11-09 03:30:35Z nov $
+#
+# Windows Mail and Windows Meeting Space Remote Code Execution Vulnerability (2620704)
+#
+# Authors:
+# Antu Sanadi <santu at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902486);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-2016");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 09:25:51 +0530 (Wed, 09 Nov 2011)");
+  script_name("Windows Mail and Windows Meeting Space Remote Code Execution Vulnerability (2620704)");
+  desc = "
+  Overview: This host has important security update missing according to
+  Microsoft Bulletin MS11-085.
+
+  Vulnerability Insight:
+  The flaw is caused due to Windows Mail and Windows Meeting Space loading
+  certain libraries in an insecure manner. This can be exploited to load
+  arbitrary libraries by tricking a user into opening an EML or WCINV file
+  located on a remote WebDAV or SMB share.
+
+  Impact:
+  Successful exploitation could allow remote attacker to execute the arbitrary
+  code or compromise a user's system.
+
+  Impact Level: System
+
+  Affected Software/OS:
+  Microsoft Windows 7 Service Pack 1 and prior
+  Microsoft Windows Vista Service Pack 2 and prior
+  Microsoft Windows Server 2008 Service Pack 2 and prior
+
+  Fix:
+  Run Windows Update and update the listed hotfixes or download and
+  update mentioned hotfixes in the advisory from the below link,
+  http://www.microsoft.com/technet/security/bulletin/ms11-085.mspx
+
+  References:
+  http://secunia.com/advisories/46752
+  http://support.microsoft.com/kb/2620704
+  http://technet.microsoft.com/en-us/security/bulletin/ms11-085 ";
+
+  script_description(desc);
+  script_summary("Check for the vulnerable 'wab32.dll' file version");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Windows : Microsoft Bulletins");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("secpod_reg.inc");
+include("version_func.inc");
+include("secpod_smb_func.inc");
+
+## Check for OS and Service Pack
+if(hotfix_check_sp(winVista:3, win2008:3, win7:2) <= 0){
+  exit(0);
+}
+
+## MS11-085 Hotfix (2620704)
+if(hotfix_missing(name:"2620704") == 0){
+  exit(0);
+}
+
+## Get Program Files Dir Path and construct complete path
+sysPath = registry_get_sz(key:"SOFTWARE\Microsoft\Windows\CurrentVersion\",
+                           item:"CommonFilesDir");
+if(!sysPath){
+  exit(0);
+}
+
+## Get Version from wab32.dll file
+sysVer = fetch_file_version(sysPath, file_name:"\system\wab32.dll");
+if(!sysVer){
+  exit(0);
+}
+
+## Windows Vista and Windows Server 2008
+if(hotfix_check_sp(winVista:3, win2008:3) > 0)
+{
+  SP = get_kb_item("SMB/WinVista/ServicePack");
+
+  if(!SP) {
+    SP = get_kb_item("SMB/Win2008/ServicePack");
+  }
+
+  if("Service Pack 2" >< SP)
+  {
+    ## Check for wab32.dll version
+    if(version_in_range(version:sysVer, test_version:"6.0.6002.18000", test_version2:"6.0.6002.18520")||
+       version_in_range(version:sysVer, test_version:"6.0.6002.22000", test_version2:"6.0.6002.22721")){
+      security_hole(0);
+    }
+    exit(0);
+  }
+  security_hole(0);
+}
+
+## Windows 7
+else if(hotfix_check_sp(win7:2) > 0)
+{
+  ## Check for wab32.dll version
+  if(version_in_range(version:sysVer, test_version:"6.1.7600.16000", test_version2:"6.1.7600.16890")||
+     version_in_range(version:sysVer, test_version:"6.1.7600.20000", test_version2:"6.1.7600.21061")||
+     version_in_range(version:sysVer, test_version:"6.1.7601.17000", test_version2:"6.1.7601.17698")||
+     version_in_range(version:sysVer, test_version:"6.1.7601.21000", test_version2:"6.1.7601.21829")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/secpod_ms11-085.nasl
___________________________________________________________________
Name: svn:executable
   + *

Added: trunk/openvas-plugins/scripts/secpod_ms11-086.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ms11-086.nasl	2011-11-09 07:03:57 UTC (rev 12058)
+++ trunk/openvas-plugins/scripts/secpod_ms11-086.nasl	2011-11-09 12:51:19 UTC (rev 12059)
@@ -0,0 +1,193 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_ms11-086.nasl 18428 2011-11-09 12:52:09Z nov $
+#
+# Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902484);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-2014");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 12:52:09 +0530 (Wed, 09 Nov 2011)");
+  script_name("Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)");
+  desc = "
+  Overview: This host has critical security update missing according to
+  Microsoft Bulletin MS11-086.
+
+  Vulnerability Insight:
+  The flaw is caused due to an error in Active Directory when configured to
+  use LDAP over SSL. It fails to validate the revocation status of an SSL
+  certificate against the CRL (Certificate Revocation List) associated with
+  the domain account. This can be exploited to authenticate to the Active
+  Directory domain using a revoked certificate.
+
+  Impact:
+  Successful exploitation will allow the remote attackers to use revoked
+  certificate to authenticate to the Active Directory domain and gain
+  access to network resources or run code under the privileges of a
+  specific authorized user with which the certificate is associated.
+
+  Impact Level: System/Application.
+
+  Affected Software/OS:
+  Microsoft Windows 7 Service Pack 1 and prior
+  Microsoft Windows XP Service Pack 3 and prior
+  Microsoft Windows Vista Service Pack 2 and prior
+  Microsoft Windows Server 2003 Service Pack 2 and prior
+  Microsoft Windows Server 2008 Service Pack 2 and prior
+
+  Fix:
+  Run Windows Update and update the listed hotfixes or download and
+  update mentioned hotfixes in the advisory from the below link,
+  http://www.microsoft.com/technet/security/bulletin/ms1-086.mspx
+
+  References:
+  http://secunia.com/advisories/46755/
+  http://support.microsoft.com/kb/2601626
+  http://support.microsoft.com/kb/2616310
+  http://technet.microsoft.com/en-us/security/bulletin/ms11-086 ";
+
+  script_description(desc);
+  script_summary("Check for the version of Adamdsa.dll and Ntdsa.dll file");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Windows : Microsoft Bulletins");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("secpod_reg.inc");
+include("version_func.inc");
+include("secpod_smb_func.inc");
+
+if(hotfix_check_sp(xp:4, win2003:3, winVista:3, win2008:3, win7:2) <= 0){
+  exit(0);
+}
+
+## Get System Path
+sysPath = smb_get_systemroot();
+if(!sysPath ){
+  exit(0);
+}
+
+# Active Directory
+if((hotfix_missing(name:"2601626") == 1) &&
+   registry_key_exists(key:"SYSTEM\CurrentControlSet\Services\NTDS\Performance"))
+{
+  ntdsaVer = fetch_file_version(sysPath, file_name:"system32\Ntdsa.dll");
+  if(ntdsaVer != NULL)
+  {
+    # Windows 2K3
+    if(hotfix_check_sp(win2003:3) > 0)
+    {
+      SP = get_kb_item("SMB/Win2003/ServicePack");
+      if("Service Pack 2" >< SP)
+      {
+        # Check for Ntdsa.dll version < 5.2.3790.4910
+        if(version_is_less(version:ntdsaVer, test_version:"5.2.3790.4910")){
+            security_hole(0);
+        }
+          exit(0);
+      }
+        security_hole(0);
+    }
+  }
+}
+
+# Active Directory Application Mode
+if((hotfix_missing(name:"2616310") == 1) &&
+   registry_key_exists(key:"SYSTEM\CurrentControlSet\Services\ADAM\Linkage"))
+{
+  # Get the version of Active Directory Application Mode
+  adamdsaVer = fetch_file_version(sysPath, file_name:"ADAM\Adamdsa.dll");
+  if(adamdsaVer != NULL)
+  {
+    # Windows XP/2K3
+    if(hotfix_check_sp(xp:4, win2003:3) > 0)
+    {
+      XPSP = get_kb_item("SMB/WinXP/ServicePack");
+      k3SP = get_kb_item("SMB/Win2003/ServicePack");
+      if(("Service Pack 3" >< XPSP) || ("Service Pack 2" >< k3SP))
+      {
+        # Check for Adamdsa.dll version < 1.1.3790.4905
+        if(version_is_less(version:adamdsaVer, test_version:"1.1.3790.4905")){
+           security_hole(0);
+        }
+        exit(0);
+      }
+        security_hole(0);
+    }
+  }
+}
+
+## Checking the Hotfix for Active Directory Lightweight Directory Service (AD LDS)
+if((hotfix_missing(name:"2601626") == 0)){
+  exit(0);
+}
+
+## AD LAS For Windows 7, vista and 2008 server
+## Get the version for Ntdsai.dll
+dllVer = fetch_file_version(sysPath, file_name:"system32\Ntdsai.dll");
+if(!dllVer){
+  exit(0);
+}
+
+## Windows Vista and Windows Server 2008
+else if(hotfix_check_sp(winVista:3, win2008:3) > 0)
+{
+  SP = get_kb_item("SMB/WinVista/ServicePack");
+
+  if(!SP) {
+    SP = get_kb_item("SMB/Win2008/ServicePack");
+  }
+
+  if("Service Pack 2" >< SP)
+  {
+    ## Check for Ntdsai.dll version
+    if(version_in_range(version:dllVer, test_version:"6.0.6002.18000", test_version2:"6.0.6002.18507")||
+       version_in_range(version:dllVer, test_version:"6.0.6002.22000", test_version2:"6.0.6002.22704")){
+      security_hole(0);
+    }
+    exit(0);
+  }
+  security_hole(0);
+}
+
+## Windows 7
+else if(hotfix_check_sp(win7:2) > 0)
+{
+  ## Grep for Ntdsai.dll version
+  if(version_is_less(version:dllVer, test_version:"6.1.7600.16871") ||
+     version_in_range(version:dllVer, test_version:"6.1.7600.21000", tes_version2:"6.1.7600.21034") ||
+     version_in_range(version:dllVer, test_version:"6.1.7601.17000", tes_version2:"6.1.7601.17675") ||
+     version_in_range(version:dllVer, test_version:"6.1.7601.21000", tes_version2:"6.1.7601.21801")){
+    security_hole(0);
+  }
+}



More information about the Openvas-commits mailing list