[Openvas-commits] r12108 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Nov 11 15:46:12 CET 2011


Author: antu123
Date: 2011-11-11 15:45:59 +0100 (Fri, 11 Nov 2011)
New Revision: 12108

Added:
   trunk/openvas-plugins/scripts/gb_CESA-2011_1349_popt_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1360_xorg-x11_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1371_finch_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1377_postgresql_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1385_kdelibs_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1392_httpd_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1402_freetype_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1440_seamonkey_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos4_i386.nasl
   trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos5_i386.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1437-01_firefox.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1438-01_thunderbird.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1440-01_seamonkey.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1444-01_nss.nasl
   trunk/openvas-plugins/scripts/gb_absoluteftp_list_cmd_bof_vuln.nasl
   trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_macosx.nasl
   trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl
   trunk/openvas-plugins/scripts/gb_emo_realty_manager_sql_inj_vuln.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_14538_asterisk_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_14749_freetype_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15005_tomcat6_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15076_clamav_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15119_clamav_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15673_icedtea-web_fc15.nasl
   trunk/openvas-plugins/scripts/gb_investintech_prdts_detect.nasl
   trunk/openvas-plugins/scripts/gb_investintech_prdts_dos_vuln.nasl
   trunk/openvas-plugins/scripts/gb_labwiki_mult_xss_n_shell_upload_vuln.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_072.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_168.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_169.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1251_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1252_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1253_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1255_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1256_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1257_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1258_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1259_1.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl
Log:
Added new plugins and auto generated plugins, updated to detect shockwave player version 

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/ChangeLog	2011-11-11 14:45:59 UTC (rev 12108)
@@ -1,3 +1,54 @@
+2011-11-11  Antu Sanadi <santu at secpod.com>
+
+	* scripts/gb_emo_realty_manager_sql_inj_vuln.nasl,
+	scripts/gb_labwiki_mult_xss_n_shell_upload_vuln.nasl,
+	scripts/gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl,
+	scripts/gb_adobe_shockwave_player_mult_vuln_nov11_macosx.nasl,
+	scripts/gb_investintech_prdts_detect.nasl,
+	scripts/gb_investintech_prdts_dos_vuln.nasl,
+	scripts/gb_absoluteftp_list_cmd_bof_vuln.nasl:
+	Added new plugins.
+
+	* scripts/secpod_adobe_prdts_detect_macosx.nasl:
+	Updated to detect adobe shockwave player versions.
+
+	* scripts/gb_CESA-2011_1349_popt_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1438_thunderbird_centos4_i386.nasl,
+	scripts/gb_fedora_2011_15119_clamav_fc15.nasl,
+	scripts/gb_ubuntu_USN_1251_1.nasl,
+	scripts/gb_CESA-2011_1360_xorg-x11_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1438_thunderbird_centos5_i386.nasl,
+	scripts/gb_fedora_2011_15673_icedtea-web_fc15.nasl,
+	scripts/gb_ubuntu_USN_1252_1.nasl,
+	scripts/gb_CESA-2011_1371_finch_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1440_seamonkey_centos4_i386.nasl,
+	scripts/gb_mandriva_MDVA_2011_072.nasl,
+	scripts/gb_ubuntu_USN_1253_1.nasl,
+	scripts/gb_CESA-2011_1377_postgresql_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1444_nss_centos4_i386.nasl,
+	scripts/gb_mandriva_MDVSA_2011_168.nasl,
+	scripts/gb_ubuntu_USN_1255_1.nasl,
+	scripts/gb_CESA-2011_1385_kdelibs_centos4_i386.nasl,
+	scripts/gb_CESA-2011_1444_nss_centos5_i386.nasl,
+	scripts/gb_mandriva_MDVSA_2011_169.nasl,
+	scripts/gb_ubuntu_USN_1256_1.nasl,
+	scripts/gb_CESA-2011_1392_httpd_centos4_i386.nasl,
+	scripts/gb_fedora_2011_14538_asterisk_fc15.nasl,
+	scripts/gb_RHSA-2011_1437-01_firefox.nasl,
+	scripts/gb_ubuntu_USN_1257_1.nasl,
+	scripts/gb_CESA-2011_1402_freetype_centos4_i386.nasl,
+	scripts/gb_fedora_2011_14749_freetype_fc15.nasl,
+	scripts/gb_RHSA-2011_1438-01_thunderbird.nasl,
+	scripts/gb_ubuntu_USN_1258_1.nasl,
+	scripts/gb_CESA-2011_1437_firefox_centos4_i386.nasl,
+	scripts/gb_fedora_2011_15005_tomcat6_fc15.nasl,
+	scripts/gb_RHSA-2011_1440-01_seamonkey.nasl,
+	scripts/gb_ubuntu_USN_1259_1.nasl,
+	scripts/gb_CESA-2011_1437_firefox_centos5_i386.nasl,
+	scripts/gb_fedora_2011_15076_clamav_fc14.nasl,
+	scripts/gb_RHSA-2011_1444-01_nss.nasl:
+	Added auto generated plugins.
+
 2011-11-11  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_dell_kace_2000_backdoor.nasl,

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1349_popt_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1349_popt_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1349_popt_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,129 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for popt CESA-2011:1349 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881031);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:13 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1349");
+  script_cve_id("CVE-2011-3378");
+  script_name("CentOS Update for popt CESA-2011:1349 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  The RPM Package Manager (RPM) is a command line driven package management
+  system capable of installing, uninstalling, verifying, querying, and
+  updating software packages.
+
+  Multiple flaws were found in the way the RPM library parsed package
+  headers. An attacker could create a specially-crafted RPM package that,
+  when queried or installed, would cause rpm to crash or, potentially,
+  execute arbitrary code. (CVE-2011-3378)
+
+  Note: Although an RPM package can, by design, execute arbitrary code when
+  installed, this issue would allow a specially-crafted RPM package to
+  execute arbitrary code before its digital signature has been verified.
+  Package downloads from the Red Hat Network remain secure due to certificate
+  checks performed on the secure connection.
+
+  All RPM users should upgrade to these updated packages, which contain a
+  backported patch to correct these issues. All running applications linked
+  against the RPM library must be restarted for this update to take effect.
+
+
+  Affected Software/OS:
+  popt on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018159.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of popt");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"popt", rpm:"popt~1.9.1~35_nonptl.el4_8", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rpm", rpm:"rpm~4.3.3~35_nonptl.el4_8", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rpm-build", rpm:"rpm-build~4.3.3~35_nonptl.el4_8", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rpm-devel", rpm:"rpm-devel~4.3.3~35_nonptl.el4_8", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rpm-libs", rpm:"rpm-libs~4.3.3~35_nonptl.el4_8", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rpm-python", rpm:"rpm-python~4.3.3~35_nonptl.el4_8", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1360_xorg-x11_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1360_xorg-x11_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1360_xorg-x11_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,200 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for xorg-x11 CESA-2011:1360 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881038);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:40 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1360");
+  script_cve_id("CVE-2010-4818", "CVE-2010-4819");
+  script_name("CentOS Update for xorg-x11 CESA-2011:1360 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  X.Org is an open source implementation of the X Window System. It provides
+  the basic low-level functionality that full-fledged graphical user
+  interfaces are designed upon.
+
+  Multiple input sanitization flaws were found in the X.Org GLX (OpenGL
+  extension to the X Window System) extension. A malicious, authorized client
+  could use these flaws to crash the X.Org server or, potentially, execute
+  arbitrary code with root privileges. (CVE-2010-4818)
+
+  An input sanitization flaw was found in the X.Org Render extension. A
+  malicious, authorized client could use this flaw to leak arbitrary memory
+  from the X.Org server process, or possibly crash the X.Org server.
+  (CVE-2010-4819)
+
+  Users of xorg-x11 should upgrade to these updated packages, which contain a
+  backported patch to resolve these issues. All running X.Org server
+  instances must be restarted for this update to take effect.
+
+
+  Affected Software/OS:
+  xorg-x11 on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018161.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of xorg-x11");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"xorg-x11", rpm:"xorg-x11~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-deprecated-libs", rpm:"xorg-x11-deprecated-libs~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-deprecated-libs-devel", rpm:"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-devel", rpm:"xorg-x11-devel~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-doc", rpm:"xorg-x11-doc~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-font-utils", rpm:"xorg-x11-font-utils~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-libs", rpm:"xorg-x11-libs~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-Mesa-libGL", rpm:"xorg-x11-Mesa-libGL~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-Mesa-libGLU", rpm:"xorg-x11-Mesa-libGLU~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-sdk", rpm:"xorg-x11-sdk~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-tools", rpm:"xorg-x11-tools~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-twm", rpm:"xorg-x11-twm~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-xauth", rpm:"xorg-x11-xauth~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-xdm", rpm:"xorg-x11-xdm~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-Xdmx", rpm:"xorg-x11-Xdmx~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-xfs", rpm:"xorg-x11-xfs~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-Xnest", rpm:"xorg-x11-Xnest~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xorg-x11-Xvfb", rpm:"xorg-x11-Xvfb~6.8.2~1.EL.70", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1371_finch_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1371_finch_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1371_finch_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,150 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for finch CESA-2011:1371 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881039);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:43 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "CESA", value: "2011:1371");
+  script_cve_id("CVE-2011-1091", "CVE-2011-3594");
+  script_name("CentOS Update for finch CESA-2011:1371 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Pidgin is an instant messaging program which can log in to multiple
+  accounts on multiple instant messaging networks simultaneously.
+
+  An input sanitization flaw was found in the way the Pidgin SILC (Secure
+  Internet Live Conferencing) protocol plug-in escaped certain UTF-8
+  characters. A remote attacker could use this flaw to crash Pidgin via a
+  specially-crafted SILC message. (CVE-2011-3594)
+
+  Multiple NULL pointer dereference flaws were found in the way the Pidgin
+  Yahoo! Messenger Protocol plug-in handled malformed YMSG packets. A remote
+  attacker could use these flaws to crash Pidgin via a specially-crafted
+  notification message. (CVE-2011-1091)
+
+  Red Hat would like to thank the Pidgin project for reporting CVE-2011-1091.
+  Upstream acknowledges Marius Wachtler as the original reporter of
+  CVE-2011-1091.
+
+  All Pidgin users should upgrade to these updated packages, which contain
+  backported patches to resolve these issues. Pidgin must be restarted for
+  this update to take effect.
+
+
+  Affected Software/OS:
+  finch on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018163.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of finch");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"finch", rpm:"finch~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"finch-devel", rpm:"finch-devel~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple", rpm:"libpurple~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple-devel", rpm:"libpurple-devel~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple-perl", rpm:"libpurple-perl~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpurple-tcl", rpm:"libpurple-tcl~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin", rpm:"pidgin~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-devel", rpm:"pidgin-devel~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"pidgin-perl", rpm:"pidgin-perl~2.6.6~7.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1377_postgresql_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1377_postgresql_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1377_postgresql_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,171 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for postgresql CESA-2011:1377 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881042);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:54 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "CESA", value: "2011:1377");
+  script_cve_id("CVE-2011-2483");
+  script_name("CentOS Update for postgresql CESA-2011:1377 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  PostgreSQL is an advanced object-relational database management system
+  (DBMS).
+
+  A signedness issue was found in the way the crypt() function in the
+  PostgreSQL pgcrypto module handled 8-bit characters in passwords when using
+  Blowfish hashing. Up to three characters immediately preceding a non-ASCII
+  character (one with the high bit set) had no effect on the hash result,
+  thus shortening the effective password length. This made brute-force
+  guessing more efficient as several different passwords were hashed to the
+  same value. (CVE-2011-2483)
+
+  Note: Due to the CVE-2011-2483 fix, after installing this update some users
+  may not be able to log in to applications that store user passwords, hashed
+  with Blowfish using the PostgreSQL crypt() function, in a back-end
+  PostgreSQL database. Unsafe processing can be re-enabled for specific
+  passwords (allowing affected users to log in) by changing their hash prefix
+  to &quot;$2x$&quot;.
+
+  For Red Hat Enterprise Linux 6, the updated postgresql packages upgrade
+  PostgreSQL to version 8.4.9. Refer to the PostgreSQL Release Notes for a
+  full list of changes:
+  http://www.postgresql.org/docs/8.4/static/release.html
+
+  For Red Hat Enterprise Linux 4 and 5, the updated postgresql packages
+  contain a backported patch.
+
+  All PostgreSQL users are advised to upgrade to these updated packages,
+  which correct this issue. If the postgresql service is running, it will be
+  automatically restarted after installing this update.
+
+
+  Affected Software/OS:
+  postgresql on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018165.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of postgresql");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"postgresql", rpm:"postgresql~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-contrib", rpm:"postgresql-contrib~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-devel", rpm:"postgresql-devel~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-docs", rpm:"postgresql-docs~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-jdbc", rpm:"postgresql-jdbc~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-libs", rpm:"postgresql-libs~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-pl", rpm:"postgresql-pl~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-python", rpm:"postgresql-python~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-server", rpm:"postgresql-server~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-tcl", rpm:"postgresql-tcl~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"postgresql-test", rpm:"postgresql-test~7.4.30~3.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1385_kdelibs_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1385_kdelibs_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1385_kdelibs_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for kdelibs CESA-2011:1385 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881040);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:47 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1385");
+  script_cve_id("CVE-2011-3365");
+  script_name("CentOS Update for kdelibs CESA-2011:1385 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  The kdelibs and kdelibs3 packages provide libraries for the K Desktop
+  Environment (KDE).
+
+  An input sanitization flaw was found in the KSSL (KDE SSL Wrapper) API. An
+  attacker could supply a specially-crafted SSL certificate (for example, via
+  a web page) to an application using KSSL, such as the Konqueror web
+  browser, causing misleading information to be presented to the user,
+  possibly tricking them into accepting the certificate as valid.
+  (CVE-2011-3365)
+
+  Users should upgrade to these updated packages, which contain a backported
+  patch to correct this issue. The desktop must be restarted (log out, then
+  log back in) for this update to take effect.
+
+
+  Affected Software/OS:
+  kdelibs on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018167.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of kdelibs");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"kdelibs", rpm:"kdelibs~3.3.1~18.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"kdelibs-devel", rpm:"kdelibs-devel~3.3.1~18.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1392_httpd_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1392_httpd_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1392_httpd_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,128 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for httpd CESA-2011:1392 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881032);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:14 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1392");
+  script_cve_id("CVE-2011-3368", "CVE-2011-3192");
+  script_name("CentOS Update for httpd CESA-2011:1392 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  The Apache HTTP Server is a popular web server.
+
+  It was discovered that the Apache HTTP Server did not properly validate the
+  request URI for proxied requests. In certain configurations, if a reverse
+  proxy used the ProxyPassMatch directive, or if it used the RewriteRule
+  directive with the proxy flag, a remote attacker could make the proxy
+  connect to an arbitrary server, possibly disclosing sensitive information
+  from internal web servers not directly accessible to the attacker.
+  (CVE-2011-3368)
+
+  Red Hat would like to thank Context Information Security for reporting this
+  issue.
+
+  This update also fixes the following bug:
+
+  * The fix for CVE-2011-3192 provided by the RHSA-2011:1245 update
+  introduced regressions in the way httpd handled certain Range HTTP header
+  values. This update corrects those regressions. (BZ#736593, BZ#736594)
+
+  All httpd users should upgrade to these updated packages, which contain
+  backported patches to correct these issues. After installing the updated
+  packages, the httpd daemon must be restarted for the update to take effect.
+
+
+  Affected Software/OS:
+  httpd on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018171.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of httpd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"httpd", rpm:"httpd~2.0.52~49.ent.centos4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"httpd-devel", rpm:"httpd-devel~2.0.52~49.ent.centos4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"httpd-manual", rpm:"httpd-manual~2.0.52~49.ent.centos4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"httpd-suexec", rpm:"httpd-suexec~2.0.52~49.ent.centos4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mod_ssl", rpm:"mod_ssl~2.0.52~49.ent.centos4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1402_freetype_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1402_freetype_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1402_freetype_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for freetype CESA-2011:1402 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881030);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:10 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "CESA", value: "2011:1402");
+  script_cve_id("CVE-2011-3256");
+  script_name("CentOS Update for freetype CESA-2011:1402 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  FreeType is a free, high-quality, portable font engine that can open and
+  manage font files. It also loads, hints, and renders individual glyphs
+  efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide
+  both the FreeType 1 and FreeType 2 font engines. The freetype packages for
+  Red Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.
+
+  Multiple input validation flaws were found in the way FreeType processed
+  bitmap font files. If a specially-crafted font file was loaded by an
+  application linked against FreeType, it could cause the application to
+  crash or, potentially, execute arbitrary code with the privileges of the
+  user running the application. (CVE-2011-3256)
+
+  Note: These issues only affected the FreeType 2 font engine.
+
+  Users are advised to upgrade to these updated packages, which contain a
+  backported patch to correct these issues. The X server must be restarted
+  (log out, then log back in) for this update to take effect.
+
+
+  Affected Software/OS:
+  freetype on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018174.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of freetype");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"freetype", rpm:"freetype~2.1.9~20.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-demos", rpm:"freetype-demos~2.1.9~20.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-devel", rpm:"freetype-devel~2.1.9~20.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-utils", rpm:"freetype-utils~2.1.9~20.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,107 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for firefox CESA-2011:1437 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881035);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:29 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "CESA", value: "2011:1437");
+  script_cve_id("CVE-2011-3647", "CVE-2011-3648", "CVE-2011-3650");
+  script_name("CentOS Update for firefox CESA-2011:1437 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Firefox is an open source web browser. XULRunner provides the XUL
+  Runtime environment for Mozilla Firefox.
+
+  A flaw was found in the way Firefox handled certain add-ons. A web page
+  containing malicious content could cause an add-on to grant itself full
+  browser privileges, which could lead to arbitrary code execution with the
+  privileges of the user running Firefox. (CVE-2011-3647)
+
+  A cross-site scripting (XSS) flaw was found in the way Firefox handled
+  certain multibyte character sets. A web page containing malicious content
+  could cause Firefox to run JavaScript code with the permissions of a
+  different website. (CVE-2011-3648)
+
+  A flaw was found in the way Firefox handled large JavaScript scripts. A web
+  page containing malicious JavaScript could cause Firefox to crash or,
+  potentially, execute arbitrary code with the privileges of the user running
+  Firefox. (CVE-2011-3650)
+
+  For technical details regarding these flaws, refer to the Mozilla security
+  advisories for Firefox 3.6.24. You can find a link to the Mozilla
+  advisories in the References section of this erratum.
+
+  All Firefox users should upgrade to these updated packages, which contain
+  Firefox version 3.6.24, which corrects these issues. After installing the
+  update, Firefox must be restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  firefox on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018179.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.24~3.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos5_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1437_firefox_centos5_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,119 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for firefox CESA-2011:1437 centos5 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881043);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:56 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "CESA", value: "2011:1437");
+  script_cve_id("CVE-2011-3647", "CVE-2011-3648", "CVE-2011-3650");
+  script_name("CentOS Update for firefox CESA-2011:1437 centos5 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Firefox is an open source web browser. XULRunner provides the XUL
+  Runtime environment for Mozilla Firefox.
+
+  A flaw was found in the way Firefox handled certain add-ons. A web page
+  containing malicious content could cause an add-on to grant itself full
+  browser privileges, which could lead to arbitrary code execution with the
+  privileges of the user running Firefox. (CVE-2011-3647)
+
+  A cross-site scripting (XSS) flaw was found in the way Firefox handled
+  certain multibyte character sets. A web page containing malicious content
+  could cause Firefox to run JavaScript code with the permissions of a
+  different website. (CVE-2011-3648)
+
+  A flaw was found in the way Firefox handled large JavaScript scripts. A web
+  page containing malicious JavaScript could cause Firefox to crash or,
+  potentially, execute arbitrary code with the privileges of the user running
+  Firefox. (CVE-2011-3650)
+
+  For technical details regarding these flaws, refer to the Mozilla security
+  advisories for Firefox 3.6.24. You can find a link to the Mozilla
+  advisories in the References section of this erratum.
+
+  All Firefox users should upgrade to these updated packages, which contain
+  Firefox version 3.6.24, which corrects these issues. After installing the
+  update, Firefox must be restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  firefox on CentOS 5
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018187.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS5")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.24~3.el5.centos", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.24~2.el5_7", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.2.24~2.el5_7", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for thunderbird CESA-2011:1438 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881041);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:50 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "CESA", value: "2011:1438");
+  script_cve_id("CVE-2011-3648");
+  script_name("CentOS Update for thunderbird CESA-2011:1438 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Thunderbird is a standalone mail and newsgroup client.
+
+  A cross-site scripting (XSS) flaw was found in the way Thunderbird handled
+  certain multibyte character sets. Malicious, remote content could cause
+  Thunderbird to run JavaScript code with the permissions of different remote
+  content. (CVE-2011-3648)
+
+  Note: This issue cannot be exploited by a specially-crafted HTML mail
+  message as JavaScript is disabled by default for mail messages. It could be
+  exploited another way in Thunderbird, for example, when viewing the full
+  remote content of an RSS feed.
+
+  All Thunderbird users should upgrade to this updated package, which
+  resolves this issue. All running instances of Thunderbird must be restarted
+  for the update to take effect.
+
+
+  Affected Software/OS:
+  thunderbird on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018183.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~1.5.0.12~45.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos5_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1438_thunderbird_centos5_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for thunderbird CESA-2011:1438 centos5 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881034);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:25 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "CESA", value: "2011:1438");
+  script_cve_id("CVE-2011-3648");
+  script_name("CentOS Update for thunderbird CESA-2011:1438 centos5 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Thunderbird is a standalone mail and newsgroup client.
+
+  A cross-site scripting (XSS) flaw was found in the way Thunderbird handled
+  certain multibyte character sets. Malicious, remote content could cause
+  Thunderbird to run JavaScript code with the permissions of different remote
+  content. (CVE-2011-3648)
+
+  Note: This issue cannot be exploited by a specially-crafted HTML mail
+  message as JavaScript is disabled by default for mail messages. It could be
+  exploited another way in Thunderbird, for example, when viewing the full
+  remote content of an RSS feed.
+
+  All Thunderbird users should upgrade to this updated package, which
+  resolves this issue. All running instances of Thunderbird must be restarted
+  for the update to take effect.
+
+
+  Affected Software/OS:
+  thunderbird on CentOS 5
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018189.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS5")
+{
+
+  if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~2.0.0.24~27.el5.centos", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1440_seamonkey_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1440_seamonkey_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1440_seamonkey_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for seamonkey CESA-2011:1440 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881033);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:21 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "CESA", value: "2011:1440");
+  script_cve_id("CVE-2011-3648");
+  script_name("CentOS Update for seamonkey CESA-2011:1440 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  SeaMonkey is an open source web browser, email and newsgroup client, IRC
+  chat client, and HTML editor.
+
+  A cross-site scripting (XSS) flaw was found in the way SeaMonkey handled
+  certain multibyte character sets. A web page containing malicious content
+  could cause SeaMonkey to run JavaScript code with the permissions of a
+  different website. (CVE-2011-3648)
+
+  All SeaMonkey users should upgrade to these updated packages, which correct
+  this issue. After installing the update, SeaMonkey must be restarted for
+  the changes to take effect.
+
+
+  Affected Software/OS:
+  seamonkey on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018181.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of seamonkey");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~77.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~77.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~77.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~77.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~77.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~77.el4.centos", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos4_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos4_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos4_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,125 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for nss CESA-2011:1444 centos4 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881037);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:39 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1444");
+  script_name("CentOS Update for nss CESA-2011:1444 centos4 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Network Security Services (NSS) is a set of libraries designed to support
+  the development of security-enabled client and server applications.
+
+  It was found that the Malaysia-based Digicert Sdn. Bhd. subordinate
+  Certificate Authority (CA) issued HTTPS certificates with weak keys. This
+  update renders any HTTPS certificates signed by that CA as untrusted. This
+  covers all uses of the certificates, including SSL, S/MIME, and code
+  signing. Note: Digicert Sdn. Bhd. is not the same company as found at
+  digicert.com. (BZ#751366)
+
+  Note: This fix only applies to applications using the NSS Builtin Object
+  Token. It does not render the certificates untrusted for applications that
+  use the NSS library, but do not use the NSS Builtin Object Token.
+
+  This update also fixes the following bug on Red Hat Enterprise Linux 5:
+
+  * When using mod_nss with the Apache HTTP Server, a bug in NSS on Red Hat
+  Enterprise Linux 5 resulted in file descriptors leaking each time the
+  Apache HTTP Server was restarted with the &quot;service httpd reload&quot; command.
+  This could have prevented the Apache HTTP Server from functioning properly
+  if all available file descriptors were consumed. (BZ#743508)
+
+  For Red Hat Enterprise Linux 6, these updated packages upgrade NSS to
+  version 3.12.10. As well, they upgrade NSPR (Netscape Portable Runtime) to
+  version 4.8.8 and nss-util to version 3.12.10 on Red Hat
+  Enterprise Linux 6, as required by the NSS update. (BZ#735972, BZ#736272,
+  BZ#735973)
+
+  All NSS users should upgrade to these updated packages, which correct this
+  issue. After installing the update, applications using NSS must be
+  restarted for the changes to take effect. In addition, on Red Hat
+  Enterprise Linux 6, applications using NSPR and nss-util must also be
+  restarted.
+
+
+  Affected Software/OS:
+  nss on CentOS 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018185.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of nss");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS4")
+{
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.10~6.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-devel", rpm:"nss-devel~3.12.10~6.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-tools", rpm:"nss-tools~3.12.10~6.el4", rls:"CentOS4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos5_i386.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos5_i386.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_CESA-2011_1444_nss_centos5_i386.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,131 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for nss CESA-2011:1444 centos5 i386
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(881036);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:54:38 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "CESA", value: "2011:1444");
+  script_name("CentOS Update for nss CESA-2011:1444 centos5 i386");
+  desc = "
+
+  Vulnerability Insight:
+  Network Security Services (NSS) is a set of libraries designed to support
+  the development of security-enabled client and server applications.
+
+  It was found that the Malaysia-based Digicert Sdn. Bhd. subordinate
+  Certificate Authority (CA) issued HTTPS certificates with weak keys. This
+  update renders any HTTPS certificates signed by that CA as untrusted. This
+  covers all uses of the certificates, including SSL, S/MIME, and code
+  signing. Note: Digicert Sdn. Bhd. is not the same company as found at
+  digicert.com. (BZ#751366)
+
+  Note: This fix only applies to applications using the NSS Builtin Object
+  Token. It does not render the certificates untrusted for applications that
+  use the NSS library, but do not use the NSS Builtin Object Token.
+
+  This update also fixes the following bug on Red Hat Enterprise Linux 5:
+
+  * When using mod_nss with the Apache HTTP Server, a bug in NSS on Red Hat
+  Enterprise Linux 5 resulted in file descriptors leaking each time the
+  Apache HTTP Server was restarted with the &quot;service httpd reload&quot; command.
+  This could have prevented the Apache HTTP Server from functioning properly
+  if all available file descriptors were consumed. (BZ#743508)
+
+  For Red Hat Enterprise Linux 6, these updated packages upgrade NSS to
+  version 3.12.10. As well, they upgrade NSPR (Netscape Portable Runtime) to
+  version 4.8.8 and nss-util to version 3.12.10 on Red Hat
+  Enterprise Linux 6, as required by the NSS update. (BZ#735972, BZ#736272,
+  BZ#735973)
+
+  All NSS users should upgrade to these updated packages, which correct this
+  issue. After installing the update, applications using NSS must be
+  restarted for the changes to take effect. In addition, on Red Hat
+  Enterprise Linux 6, applications using NSPR and nss-util must also be
+  restarted.
+
+
+  Affected Software/OS:
+  nss on CentOS 5
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.centos.org/pipermail/centos-announce/2011-November/018158.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of nss");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS5")
+{
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.10~7.el5_7", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-devel", rpm:"nss-devel~3.12.10~7.el5_7", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-pkcs11-devel", rpm:"nss-pkcs11-devel~3.12.10~7.el5_7", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-tools", rpm:"nss-tools~3.12.10~7.el5_7", rls:"CentOS5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1437-01_firefox.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1437-01_firefox.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1437-01_firefox.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,153 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for firefox RHSA-2011:1437-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870513);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:21 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "RHSA", value: "2011:1437-01");
+  script_cve_id("CVE-2011-3647", "CVE-2011-3648", "CVE-2011-3650");
+  script_name("RedHat Update for firefox RHSA-2011:1437-01");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Firefox is an open source web browser. XULRunner provides the XUL
+  Runtime environment for Mozilla Firefox.
+
+  A flaw was found in the way Firefox handled certain add-ons. A web page
+  containing malicious content could cause an add-on to grant itself full
+  browser privileges, which could lead to arbitrary code execution with the
+  privileges of the user running Firefox. (CVE-2011-3647)
+
+  A cross-site scripting (XSS) flaw was found in the way Firefox handled
+  certain multibyte character sets. A web page containing malicious content
+  could cause Firefox to run JavaScript code with the permissions of a
+  different website. (CVE-2011-3648)
+
+  A flaw was found in the way Firefox handled large JavaScript scripts. A web
+  page containing malicious JavaScript could cause Firefox to crash or,
+  potentially, execute arbitrary code with the privileges of the user running
+  Firefox. (CVE-2011-3650)
+
+  For technical details regarding these flaws, refer to the Mozilla security
+  advisories for Firefox 3.6.24. You can find a link to the Mozilla
+  advisories in the References section of this erratum.
+
+  All Firefox users should upgrade to these updated packages, which contain
+  Firefox version 3.6.24, which corrects these issues. After installing the
+  update, Firefox must be restarted for the changes to take effect.
+
+
+  Affected Software/OS:
+  firefox on Red Hat Enterprise Linux (v. 5 server),
+  Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00006.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.24~3.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.6.24~3.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.24~2.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner-debuginfo", rpm:"xulrunner-debuginfo~1.9.2.24~2.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner-devel", rpm:"xulrunner-devel~1.9.2.24~2.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.24~3.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-debuginfo", rpm:"firefox-debuginfo~3.6.24~3.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1438-01_thunderbird.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1438-01_thunderbird.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1438-01_thunderbird.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,105 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for thunderbird RHSA-2011:1438-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870514);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:30 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "RHSA", value: "2011:1438-01");
+  script_cve_id("CVE-2011-3648");
+  script_name("RedHat Update for thunderbird RHSA-2011:1438-01");
+  desc = "
+
+  Vulnerability Insight:
+  Mozilla Thunderbird is a standalone mail and newsgroup client.
+
+  A cross-site scripting (XSS) flaw was found in the way Thunderbird handled
+  certain multibyte character sets. Malicious, remote content could cause
+  Thunderbird to run JavaScript code with the permissions of different remote
+  content. (CVE-2011-3648)
+
+  Note: This issue cannot be exploited by a specially-crafted HTML mail
+  message as JavaScript is disabled by default for mail messages. It could be
+  exploited another way in Thunderbird, for example, when viewing the full
+  remote content of an RSS feed.
+
+  All Thunderbird users should upgrade to this updated package, which
+  resolves this issue. All running instances of Thunderbird must be restarted
+  for the update to take effect.
+
+
+  Affected Software/OS:
+  thunderbird on Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00007.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"thunderbird", rpm:"thunderbird~1.5.0.12~45.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"thunderbird-debuginfo", rpm:"thunderbird-debuginfo~1.5.0.12~45.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1440-01_seamonkey.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1440-01_seamonkey.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1440-01_seamonkey.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,131 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for seamonkey RHSA-2011:1440-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870512);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:18 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "RHSA", value: "2011:1440-01");
+  script_cve_id("CVE-2011-3648");
+  script_name("RedHat Update for seamonkey RHSA-2011:1440-01");
+  desc = "
+
+  Vulnerability Insight:
+  SeaMonkey is an open source web browser, email and newsgroup client, IRC
+  chat client, and HTML editor.
+
+  A cross-site scripting (XSS) flaw was found in the way SeaMonkey handled
+  certain multibyte character sets. A web page containing malicious content
+  could cause SeaMonkey to run JavaScript code with the permissions of a
+  different website. (CVE-2011-3648)
+
+  All SeaMonkey users should upgrade to these updated packages, which correct
+  this issue. After installing the update, SeaMonkey must be restarted for
+  the changes to take effect.
+
+
+  Affected Software/OS:
+  seamonkey on Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00009.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of seamonkey");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"seamonkey", rpm:"seamonkey~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-chat", rpm:"seamonkey-chat~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-debuginfo", rpm:"seamonkey-debuginfo~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-devel", rpm:"seamonkey-devel~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-dom-inspector", rpm:"seamonkey-dom-inspector~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-js-debugger", rpm:"seamonkey-js-debugger~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"seamonkey-mail", rpm:"seamonkey-mail~1.0.9~77.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1444-01_nss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1444-01_nss.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1444-01_nss.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,171 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for nss RHSA-2011:1444-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870511);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:18 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1444-01");
+  script_name("RedHat Update for nss RHSA-2011:1444-01");
+  desc = "
+
+  Vulnerability Insight:
+  Network Security Services (NSS) is a set of libraries designed to support
+  the development of security-enabled client and server applications.
+
+  It was found that the Malaysia-based Digicert Sdn. Bhd. subordinate
+  Certificate Authority (CA) issued HTTPS certificates with weak keys. This
+  update renders any HTTPS certificates signed by that CA as untrusted. This
+  covers all uses of the certificates, including SSL, S/MIME, and code
+  signing. Note: Digicert Sdn. Bhd. is not the same company as found at
+  digicert.com. (BZ#751366)
+
+  Note: This fix only applies to applications using the NSS Builtin Object
+  Token. It does not render the certificates untrusted for applications that
+  use the NSS library, but do not use the NSS Builtin Object Token.
+
+  This update also fixes the following bug on Red Hat Enterprise Linux 5:
+
+  * When using mod_nss with the Apache HTTP Server, a bug in NSS on Red Hat
+  Enterprise Linux 5 resulted in file descriptors leaking each time the
+  Apache HTTP Server was restarted with the &quot;service httpd reload&quot; command.
+  This could have prevented the Apache HTTP Server from functioning properly
+  if all available file descriptors were consumed. (BZ#743508)
+
+  For Red Hat Enterprise Linux 6, these updated packages upgrade NSS to
+  version 3.12.10. As well, they upgrade NSPR (Netscape Portable Runtime) to
+  version 4.8.8 and nss-util to version 3.12.10 on Red Hat
+  Enterprise Linux 6, as required by the NSS update. (BZ#735972, BZ#736272,
+  BZ#735973)
+
+  All NSS users should upgrade to these updated packages, which correct this
+  issue. After installing the update, applications using NSS must be
+  restarted for the changes to take effect. In addition, on Red Hat
+  Enterprise Linux 6, applications using NSPR and nss-util must also be
+  restarted.
+
+
+  Affected Software/OS:
+  nss on Red Hat Enterprise Linux (v. 5 server),
+  Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00011.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of nss");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.10~7.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-debuginfo", rpm:"nss-debuginfo~3.12.10~7.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-devel", rpm:"nss-devel~3.12.10~7.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-pkcs11-devel", rpm:"nss-pkcs11-devel~3.12.10~7.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-tools", rpm:"nss-tools~3.12.10~7.el5_7", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.10~6.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-debuginfo", rpm:"nss-debuginfo~3.12.10~6.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-devel", rpm:"nss-devel~3.12.10~6.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss-tools", rpm:"nss-tools~3.12.10~6.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_absoluteftp_list_cmd_bof_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_absoluteftp_list_cmd_bof_vuln.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_absoluteftp_list_cmd_bof_vuln.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,105 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_absoluteftp_list_cmd_bof_vuln.nasl 18441 2011-11-10 16:16:16Z nov $
+#
+# AbsoluteFTP 'LIST' Command Remote Buffer Overflow Vulnerability
+#
+# Authors:
+# Sooraj KS <kssooraj at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802271);
+  script_version("$Revision: 1.0$");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"creation_date", value:"2011-11-10 16:16:16 +0530 (Thu, 10 Nov 2011)");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_name("AbsoluteFTP 'LIST' Command Remote Buffer Overflow Vulnerability");
+  desc = "
+  Overview: This host is installed with AbsoluteFTP and is prone to buffer
+  overflow vulnerability.
+
+  Vulnerability Insight:
+  The flaw is caused due to a boundary error when processing an overly long
+  'LIST' command. This can be exploited to cause a stack-based buffer overflow
+  via a specially crafted FTP LIST command.
+
+  Impact:
+  Successful exploitation could allow remote attackers to execute arbitrary
+  code within the context of the application. Failed attacks may cause a
+  denial of service condition.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  AbsoluteFTP versions 1.9.6 through 2.2.10
+
+  Fix: No solution or patch is available as on 10th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://www.vandyke.com/products/absoluteftp/
+
+  References:
+  http://xforce.iss.net/xforce/xfdb/71210
+  http://www.exploit-db.com/exploits/18102
+  http://packetstormsecurity.org/files/106797/absoluteftp-overflow.txt ";
+
+  script_description(desc);
+  script_summary("Check for the version of AbsoluteFTP");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 Greenbone Networks GmbH");
+  script_family("Buffer overflow");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_keys("SMB/WindowsVersion");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("version_func.inc");
+include("secpod_smb_func.inc");
+
+## Confirm Windows
+if(!get_kb_item("SMB/WindowsVersion")){
+  exit(0);
+}
+
+## Confirm AbsoluteFTP
+key = "SOFTWARE\VanDyke\AbsoluteFTP\Install";
+if(!registry_key_exists(key:key)) {
+  exit(0);
+}
+
+## Get Installed Path
+path = registry_get_sz(key:key, item:"Main Directory");
+if(!path){
+  exit(0);
+}
+
+## Get Version from AbsoluteFTP.exe
+version = fetch_file_version(sysPath:path, file_name:"AbsoluteFTP.exe");
+if(version)
+{
+  ## Check for AbsoluteFTP versions
+  if(version_in_range(version:version, test_version:"1.9.6", test_version2:"2.2.10.252")){
+    security_hole(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_macosx.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_macosx.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_adobe_shockwave_player_mult_vuln_nov11_macosx.nasl 18446 2011-11-10 13:18:33Z nov $
+#
+# Adobe Shockwave Player Multiple Vulnerabilities (MAC OS X)- Nov 2011
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802507);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-2446", "CVE-2011-2447", "CVE-2011-2448", "CVE-2011-2449");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-10 13:18:33 +0530 (Thu, 10 Nov 2011)");
+  script_name("Adobe Shockwave Player Multiple Vulnerabilities (MAC OS X) - Nov 2011");
+  desc = "
+  Overview: This host is installed with Adobe Shockwave Player and is prone
+  to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  Multiple flaws are caused due to an error in,
+  - DIRAPI.dll and TextXtra.x32 when parsing Director file headers.
+  - DIRAPI.dll when parsing rcsl chunks within Director files.
+
+  Impact:
+  Successful exploitation will let the attackers to execute arbitrary code or
+  cause a denial of service.
+
+  Impact Level: Application/System
+
+  Affected Software/OS:
+  Adobe Shockwave Player Versions prior to 11.6.3.633 on Mac Os X
+
+  Fix: Upgrade to Adobe Shockwave Player version 11.6.3.633 or later,
+  For updates refer, http://get.adobe.com/shockwave/otherversions/
+
+  References:
+  http://secunia.com/advisories/46667/
+  http://www.adobe.com/support/security/bulletins/apsb11-27.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Adobe Shockwave Player");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("secpod_adobe_prdts_detect_macosx.nasl");
+  script_require_keys("Adobe/Shockwave/Player/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+shockVer = get_kb_item("Adobe/Shockwave/Player/MacOSX/Version");
+if(!shockVer){
+  exit(0);
+}
+
+## Check for Adobe Shockwave Player versions prior to 11.6.3.633
+if(version_is_less(version:shockVer, test_version:"11.6.3.633")){
+  security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl 18446 2011-11-10 12:17:59Z nov $
+#
+# Adobe Shockwave Player Multiple Vulnerabilities (Windows) - Nov 2011
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802508);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-2446", "CVE-2011-2447", "CVE-2011-2448", "CVE-2011-2449");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-10 12:17:59 +0530 (Thu, 10 Nov 2011)");
+  script_name("Adobe Shockwave Player Multiple Vulnerabilities (Windows) - Nov 2011");
+  desc = "
+  Overview: This host is installed with Adobe Shockwave Player and is prone
+  to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  Multiple flaws are caused due to an error in,
+  - DIRAPI.dll and TextXtra.x32 when parsing Director file headers.
+  - DIRAPI.dll when parsing rcsl chunks within Director files.
+
+  Impact:
+  Successful exploitation will let the attackers to execute arbitrary code or
+  to cause a denial of service.
+
+  Impact Level: Application/System
+
+  Affected Software/OS:
+  Adobe Shockwave Player Versions prior to 11.6.3.633 on Windows.
+
+  Fix: Upgrade to Adobe Shockwave Player version 11.6.3.633 or later,
+  For updates refer, http://get.adobe.com/shockwave/otherversions/
+
+  References:
+  http://secunia.com/advisories/46667/
+  http://www.adobe.com/support/security/bulletins/apsb11-27.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Adobe Shockwave Player");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("secpod_adobe_shockwave_player_detect.nasl");
+  script_require_keys("Adobe/ShockwavePlayer/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+shockVer = get_kb_item("Adobe/ShockwavePlayer/Ver");
+if(!shockVer){
+  exit(0);
+}
+
+## Check for Adobe Shockwave Player versions prior to 11.6.3.633
+if(version_is_less(version:shockVer, test_version:"11.6.3.633")){
+  security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/gb_emo_realty_manager_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_emo_realty_manager_sql_inj_vuln.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_emo_realty_manager_sql_inj_vuln.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_emo_realty_manager_sql_inj_vuln.nasl 18367 2011-11-09 17:14:14Z nov $
+#
+# EMO Realty Manager 'cat1' Parameter SQL Injection Vulnerability
+#
+# Authors:
+# Rachana Shetty <srachana at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802342);
+  script_version("$Revision: $");
+  script_bugtraq_id(40625);
+  script_cve_id("CVE-2010-5006");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 16:19:55 +0530 (Wed, 09 Nov 2011)");
+  script_name("EMO Realty Manager 'cat1' Parameter SQL Injection Vulnerability");
+  desc = "
+  Overview: The host is running EMO Realty Manager Software and is prone to
+  SQL injection vulnerability
+
+  Vulnerability Insight:
+  The flaw is caused due to improper validation of user-supplied input passed
+  via the 'cat1' parameter to 'googlemap/index.php', which allows attackers to
+  manipulate SQL queries by injecting arbitrary SQL code.
+
+  Impact:
+  Successful exploitation will let the attacker to perform SQL injection attack
+  and gain sensitive information.
+
+  Impact Level: Application
+
+  Affected Software/OS:
+  EMO Realty Manager Software.
+
+  Fix: No solution or patch is available as on 9th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://www.emophp.com/index.php
+
+  References:
+  http://osvdb.org/show/osvdb/76897
+  http://securityreason.com/securityalert/8505
+  http://packetstormsecurity.org/files/90411/emorealtymanager-sql.txt ";
+
+  script_description(desc);
+  script_summary("Check if EMO Realty Manager SQL Injection Vulnerability");
+  script_category(ACT_ATTACK);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Web application abuses");
+  script_dependencies("http_version.nasl");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+
+## Get HTTP Port
+port = get_http_port(default:80);
+if(!port){
+  exit(0);
+}
+
+## Check Host Supports PHP
+if(!can_host_php(port:port)){
+  exit(0);
+}
+
+foreach dir(make_list("/emo_virtual", "/emorealty", "", cgi_dirs()))
+{
+  ## Send and Receive the response
+  req = http_get(item: string (dir, "/index.php"), port:port);
+  res = http_keepalive_send_recv(port:port,data:req);
+
+  ## Confirm the application
+  if('<title>EMO Realty Manager' >< res)
+  {
+    ## Check for the SQL injection
+    url = string(dir, "/googlemap/index.php?cat1='");
+
+    ## Try attack and check the response to confirm vulnerability
+    if(http_vuln_check(port:port, url:url, pattern:'You have an error' +
+                      ' in your SQL syntax;', check_header: FALSE))
+    {
+      security_hole(port);
+      exit(0);
+    }
+  }
+}

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_14538_asterisk_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_14538_asterisk_fc15.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_14538_asterisk_fc15.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for asterisk FEDORA-2011-14538
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863610);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:52:59 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"6.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-14538");
+  script_cve_id("CVE-2011-4063");
+  script_name("Fedora Update for asterisk FEDORA-2011-14538");
+  desc = "
+
+  Vulnerability Insight:
+  Asterisk is a complete PBX in software. It runs on Linux and provides
+  all of the features you would expect from a PBX and more. Asterisk
+  does voice over IP in three protocols, and can interoperate with
+  almost all standards-based telephony equipment using relatively
+  inexpensive hardware.
+
+
+  Affected Software/OS:
+  asterisk on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069054.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of asterisk");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"asterisk", rpm:"asterisk~1.8.7.1~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_14749_freetype_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_14749_freetype_fc15.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_14749_freetype_fc15.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for freetype FEDORA-2011-14749
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863611);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:00 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "FEDORA", value: "2011-14749");
+  script_cve_id("CVE-2011-3256", "CVE-2011-0226");
+  script_name("Fedora Update for freetype FEDORA-2011-14749");
+  desc = "
+
+  Vulnerability Insight:
+  The FreeType engine is a free and portable font rendering
+  engine, developed to provide advanced font support for a variety of
+  platforms and environments. FreeType is a library which can open and
+  manages font files as well as efficiently load, hint and render
+  individual glyphs. FreeType is not a font server or a complete
+  text-rendering library.
+
+
+  Affected Software/OS:
+  freetype on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069100.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of freetype");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"freetype", rpm:"freetype~2.4.4~6.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15005_tomcat6_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15005_tomcat6_fc15.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15005_tomcat6_fc15.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for tomcat6 FEDORA-2011-15005
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863609);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:52:51 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15005");
+  script_cve_id("CVE-2011-1184", "CVE-2011-3190", "CVE-2011-2526", "CVE-2011-2204");
+  script_name("Fedora Update for tomcat6 FEDORA-2011-15005");
+  desc = "
+
+  Vulnerability Insight:
+  Tomcat is the servlet container that is used in the official Reference
+  Implementation for the Java Servlet and JavaServer Pages technologies.
+  The Java Servlet and JavaServer Pages specifications are developed by
+  Sun under the Java Community Process.
+
+  Tomcat is developed in an open and participatory environment and
+  released under the Apache Software License version 2.0. Tomcat is intended
+  to be a collaboration of the best-of-breed developers from around the world.
+
+
+  Affected Software/OS:
+  tomcat6 on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069006.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of tomcat6");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"tomcat6", rpm:"tomcat6~6.0.32~10.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15076_clamav_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15076_clamav_fc14.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15076_clamav_fc14.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for clamav FEDORA-2011-15076
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863608);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:52:43 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15076");
+  script_cve_id("CVE-2011-3627", "CVE-2011-2721", "CVE-2010-4260", "CVE-2010-4261");
+  script_name("Fedora Update for clamav FEDORA-2011-15076");
+  desc = "
+
+  Vulnerability Insight:
+  Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
+  software is the integration with mail servers (attachment scanning). The
+  package provides a flexible and scalable multi-threaded daemon, a command
+  line scanner, and a tool for automatic updating via Internet. The programs
+  are based on a shared library distributed with the Clam AntiVirus package,
+  which you can use with your own software. The virus database is based on
+  the virus database from OpenAntiVirus, but contains additional signatures
+  (including signatures for popular polymorphic viruses, too) and is KEPT UP
+  TO DATE.
+
+
+  Affected Software/OS:
+  clamav on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068940.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of clamav");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.97.3~1400.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15119_clamav_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15119_clamav_fc15.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15119_clamav_fc15.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for clamav FEDORA-2011-15119
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863613);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:05 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-15119");
+  script_cve_id("CVE-2011-3627", "CVE-2011-2721");
+  script_name("Fedora Update for clamav FEDORA-2011-15119");
+  desc = "
+
+  Vulnerability Insight:
+  Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this
+  software is the integration with mail servers (attachment scanning). The
+  package provides a flexible and scalable multi-threaded daemon, a command
+  line scanner, and a tool for automatic updating via Internet. The programs
+  are based on a shared library distributed with the Clam AntiVirus package,
+  which you can use with your own software. The virus database is based on
+  the virus database from OpenAntiVirus, but contains additional signatures
+  (including signatures for popular polymorphic viruses, too) and is KEPT UP
+  TO DATE.
+
+
+  Affected Software/OS:
+  clamav on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/068941.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of clamav");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"clamav", rpm:"clamav~0.97.3~1500.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15673_icedtea-web_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15673_icedtea-web_fc15.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15673_icedtea-web_fc15.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for icedtea-web FEDORA-2011-15673
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863612);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:53:04 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15673");
+  script_cve_id("CVE-2011-3377");
+  script_name("Fedora Update for icedtea-web FEDORA-2011-15673");
+  desc = "
+
+  Vulnerability Insight:
+  The IcedTea-Web project provides a Java web browser plugin, an implementation
+  of Java Web Start (originally based on the Netx project) and a settings tool
+  to manage deployment settings for the aforementioned plugin and Web Start
+  implementations.
+
+
+  Affected Software/OS:
+  icedtea-web on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069058.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of icedtea-web");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"icedtea-web", rpm:"icedtea-web~1.0.6~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_investintech_prdts_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_investintech_prdts_detect.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_investintech_prdts_detect.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,167 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_investintech_prdts_detect.nasl 18297 2011-11-09 17:25:24Z nov $
+#
+# Investintech Products Version Detection
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802501);
+  script_version("$Revision: $");
+  script_tag(name:"risk_factor", value:"None");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 17:25:24 +0530 (Wed, 09 Nov 2011)");
+  script_name("Investintech Products Version Detection");
+  desc ="
+  Overview : This script finds the installed version of Investintech
+  products and sets the result in KB. ";
+
+  script_description(desc);
+  script_summary("Set KB for the version of Investintech Products");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("secpod_reg_enum.nasl");
+  script_require_keys("SMB/WindowsVersion");
+  script_require_ports(139, 445);
+  exit(0);
+}
+
+include("cpe.inc");
+include("smb_nt.inc");
+include("version_func.inc");
+include("host_details.inc");
+include("secpod_smb_func.inc");
+
+## Constant values
+SCRIPT_OID  = "1.3.6.1.4.1.25623.1.0.802501";
+SCRIPT_DESC = "Investintech Products Version Detection";
+
+## functions for script
+function register_cpe(tmpVers, tmpExpr, tmpBase){
+
+   local_var cpe;
+   ## build cpe and store it as host_detail
+   cpe = build_cpe(value:tmpVers, exp:tmpExpr, base:tmpBase);
+   if(!isnull(cpe))
+      register_host_detail(name:"App", value:cpe, nvt:SCRIPT_OID, desc:SCRIPT_DESC);
+}
+
+if(!get_kb_item("SMB/WindowsVersion")){
+  exit(0);
+}
+
+key = "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\";
+if(!registry_key_exists(key:key)){
+  exit(0);
+}
+
+foreach item (registry_enum_keys(key:key))
+{
+  prdtName = registry_get_sz(key:key + item, item:"DisplayName");
+
+  ## Slim PDFReader
+  if("SlimPDF Reader" >< prdtName)
+  {
+    ## Get the installed location
+    pdfPath = registry_get_sz(key:key + item, item:"InstallLocation");
+    if(!isnull(pdfPath))
+    {
+      ## Get the Version
+      pdfVer = fetch_file_version(sysPath:pdfPath, file_name:"SlimPDF Reader.exe");
+      if(pdfVer != NULL)
+      {
+        set_kb_item(name:"SlimPDF/Reader/Ver", value:pdfVer);
+        security_note(data:"SlimPDF Reader version " + pdfVer +
+                                         " was detected on the host");
+        ## build cpe and store it as host_detail
+        register_cpe(tmpVers:pdfVer, tmpExpr:"^([0-9.]+)",
+                             tmpBase:"cpe:/a:investintech:slimpdf_reader:");
+      }
+    }
+  }
+
+  ## Able2Doc
+  else if("Able2Doc" >< prdtName)
+  {
+    ## Get the version
+    docVer = registry_get_sz(key:key + item, item:"DisplayVersion");
+    if(docVer != NULL)
+    {
+      set_kb_item(name:"Able2Doc/Ver", value:docVer);
+      security_note(data:"Able2Doc version " + docVer +
+                                  " was detected on the host");
+
+      ## build cpe and store it as host_detail
+      register_cpe(tmpVers:docVer, tmpExpr:"^([0-9.]+)",
+                             tmpBase:"cpe:/a:investintech:able2doc:");
+    }
+  }
+
+  ## Able2Doc Professional
+  else if("Able2Doc Professional" >< prdtName)
+  {
+    docVer = registry_get_sz(key:key + item, item:"DisplayVersion");
+    if(docVer != NULL)
+    {
+      set_kb_item(name:"Able2Doc/Pro/Ver", value:docVer);
+        security_note(data:"Able2Doc Professional version " + docVer +
+                                         " was detected on the host");
+
+      ## build cpe and store it as host_detail
+      register_cpe(tmpVers:docVer, tmpExpr:"^([0-9.]+)",
+                             tmpBase:"cpe:/a:investintech:able2doc:::professional:");
+    }
+  }
+
+  ## Able2Extract
+  else if(prdtName =~ "Able2Extract ([0-9.])+")
+  {
+    docVer = registry_get_sz(key:key + item, item:"DisplayVersion");
+    if(docVer != NULL)
+    {
+      set_kb_item(name:"Able2Extract/Ver", value:docVer);
+      security_note(data:"Able2Extract version " + docVer +
+                                         " was detected on the host");
+
+      ## build cpe and store it as host_detail
+      register_cpe(tmpVers:docVer, tmpExpr:"^([0-9.]+)",
+                             tmpBase:"cpe:/a:investintech:able2extract:");
+    }
+  }
+
+  else if("Able2Extract PDF Server" >< prdtName)
+  {
+    serVer = registry_get_sz(key:key + item, item:"DisplayVersion");
+    if(serVer != NULL)
+    {
+      set_kb_item(name:"Able2Extract/PDF/Server/Ver", value:serVer);
+      security_note(data:"Able2Extract PDF Server version " + serVer +
+                                         " was detected on the host");
+
+      ## build cpe and store it as host_detail
+      register_cpe(tmpVers:serVer, tmpExpr:"^([0-9.]+)",
+                             tmpBase:"cpe:/a:investintech:able2extract_server:");
+    }
+  }
+}

Added: trunk/openvas-plugins/scripts/gb_investintech_prdts_dos_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_investintech_prdts_dos_vuln.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_investintech_prdts_dos_vuln.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,132 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_investintech_prdts_dos_vuln.nasl 18297 2011-11-09 17:35:24Z nov $
+#
+# Investintech Products Denial of Service Vulnerabilities
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802506);
+  script_version("$Revision: $");
+  script_cve_id("CVE-2011-4216", "CVE-2011-4218", "CVE-2011-4219", "CVE-2011-4220",
+                "CVE-2011-4217", "CVE-2011-4221", "CVE-2011-4222", "CVE-2011-4223");
+  script_bugtraq_id(49923);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-09 17:35:24 +0530 (Fri, 04 Nov 2011)");
+  script_name("Investintech Products Denial of Service Vulnerabilities");
+  desc = "
+  Overview: This host is installed with Investintech products and is prone to
+  denial of service vulnerability.
+
+  Vulnerability Insight:
+  The flaws are caused due to,
+  - Unspecified errors in Investintech Able2Extract, Able2Doc,
+    and Able2Doc Professional.
+  - Not properly restricting write operations in SlimPDF Reader, the arguments
+    to unspecified function calls and read operations during block data moves.
+  - Fails to prevent faulting-instruction data from affecting write operations
+    and faulting-address data from affecting branch selection in SlimPDF Reader.
+
+  Impact:
+  Successful exploitation will allow remote attackers to cause a denial of
+  service or possibly execute arbitrary code via a crafted PDF document.
+
+  Impact Level: Application.
+
+  Affected Software :
+  Able2Extract version 7.0 and prior
+  SlimPDF Reader version 1.0.0.1 and prior
+  Able2Extract PDF Server version 1.0.0 or prior
+  Able2Doc and Able2Doc Professional version 6.0 and prior
+
+  Fix: No solution or patch is available as on 9th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://www.investintech.com/
+
+  References:
+  http://www.kb.cert.org/vuls/id/275036
+  http://www.security-database.com/detail.php?alert=CVE-2011-4216 ";
+
+  script_description(desc);
+  script_summary("Check for the version of affected products");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Denial of Service");
+  script_dependencies("gb_investintech_prdts_detect.nasl");
+  script_require_keys("SlimPDF/Reader/Ver", "Able2Doc/Ver", "Able2Doc/Pro/Ver",
+                      "Able2Extract/Ver", "Able2Extract/PDF/Server/Ver");
+  exit(0);
+}
+
+include("version_func.inc");
+
+## Get the version for SlimPDF Reader
+slimVer = get_kb_item("SlimPDF/Reader/Ver");
+if(slimVer)
+{
+  ## Check the version for SlimPDF Reader
+  if(version_is_less_equal(version:slimVer, test_version:"1.0.0.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+}
+
+## Get the version for Able2Doc and Able2Doc Professional
+docVer = get_kb_item("Able2Doc/Ver");
+if(!docVer){
+  docVer = get_kb_item("Able2Doc/Pro/Ver");
+}
+
+if(docVer != NULL)
+{
+ ## Check the version for Able2Doc and Able2Doc Professional
+ if(version_is_less_equal(version:docVer, test_version:"6.0"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+}
+
+## Get the version for Able2Extract
+extractVer = get_kb_item("Able2Extract/Ver");
+if(extractVer)
+{
+  ## Check the version for Able2Extract
+  if(version_is_less_equal(version:extractVer, test_version:"7.0")){
+    security_hole(0);
+    exit(0);
+  }
+}
+
+## Get the version for Able2Extract PDF Server
+pdfVer = get_kb_item("Able2Extract/PDF/Server/Ver");
+if(pdfVer)
+{
+  ## Check the version for Able2Extract PDF Server
+  if(version_is_less_equal(version:pdfVer, test_version:"1.0.0")){
+    security_hole(0);
+  }
+}

Added: trunk/openvas-plugins/scripts/gb_labwiki_mult_xss_n_shell_upload_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_labwiki_mult_xss_n_shell_upload_vuln.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_labwiki_mult_xss_n_shell_upload_vuln.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,113 @@
+##############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_labwiki_mult_xss_n_shell_upload_vuln.nasl 18444 2011-11-10 12:20:29 nov $
+#
+# LabWiki Multiple Cross-site Scripting (XSS) and Shell Upload Vulnerabilities
+#
+# Authors:
+# Antu Sanadi <santu at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802402);
+  script_version("$Revision: $");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-10 12:48:30 +0530 (Thu, 10 Nov 2011)");
+  script_name("LabWiki Multiple Cross-site Scripting (XSS) and Shell Upload Vulnerabilities");
+  desc = "
+  Overview: This host is running LabWiki and is prone to multiple cross-site
+  scripting and shell upload vulnerabilities.
+
+  Vulnerability Insight:
+  The flaws are caused due to an,
+  - Input passed to the 'from' parameter in index.php is not properly sanitised
+    before being returned to the user.
+  - Input passed to the 'page_no' parameter in recentchanges.php is noti
+    properly sanitised before being returned to the user.
+  - Input passed to the 'userfile' POST parameter in edit.php is not properly
+    verified before being used to upload files.
+
+  Impact:
+  Successful exploitation will allow remote attackers to execute arbitrary HTML
+  and script code in a user's browser session in context of affected website
+  and to upload arbitrary PHP files with '.gif' extension.
+
+  Impact Level: Application
+
+  Affected Software:
+  LabWiki version 1.1 and prior.
+
+  Fix: No solution or patch is available as on 10th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://www.bioinformatics.org/phplabware/labwiki/index.php
+
+  References:
+  https://secunia.com/advisories/46762
+  http://www.exploit-db.com/exploits/18100/
+  http://www.securityfocus.com/archive/1/520441
+  http://archives.neohapsis.com/archives/fulldisclosure/current/0112.html ";
+
+  script_description(desc);
+  script_summary("Check if LabWiki is vulnerable to XSS");
+  script_category(ACT_ATTACK);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Web application abuses");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+
+## Get HTTP Port
+labPort = get_http_port(default:80);
+if(!get_port_state(labPort)){
+  exit(0);
+}
+
+## Check Host Supports PHP
+if(!can_host_php(port:labPort)){
+  exit(0);
+}
+
+## Iterate over the possible paths
+foreach dir (make_list("/LabWiki", "/labwiki/LabWiki", "", cgi_dirs()))
+{
+  sndReq = http_get(item:string(dir, "/index.php"), port:labPort);
+  rcvRes = http_keepalive_send_recv(port:labPort, data:sndReq);
+
+  ## Confirm the application
+  if('>My Lab</a' >< rcvRes && '>What is Wiki</' >< rcvRes)
+  {
+    url = string(dir, '/index.php?from="></><script>alert(document.cookie)' +
+                      '</script>&help=true&page=What_is_wiki');
+
+    ## Try attack and check the response to confirm vulnerability
+    if(http_vuln_check(port:labPort, url:url, pattern:"><script>alert" +
+                       "\(document.cookie\)</script>"))
+    {
+      security_warning(labPort);
+      exit(0);
+    }
+  }
+}

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_072.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_072.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_072.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for timezone MDVA-2011:072 (timezone)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831488);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 10:00:51 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVA", value: "2011:072");
+  script_name("Mandriva Update for timezone MDVA-2011:072 (timezone)");
+  desc = "
+
+  Vulnerability Insight:
+
+  Timezone is a package that contains data files with rules for various
+  timezones around the world. This update addresses the following
+  changes:
+
+  - Fiji adopts DST for 2011 (effective Oct 23rd, 2011)
+  - West Bank changes date for DST end in 2011 to Sep 30th
+  - Fix DST for: Pridnestrovian Moldavian Republic, Ukraine, Bahia
+  and Brazil.
+
+  Affected Software/OS:
+  timezone on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00013.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of timezone");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"timezone-2011m", rpm:"timezone-2011m~1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"timezone-java-2011m", rpm:"timezone-java-2011m~1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"timezone-2011m", rpm:"timezone-2011m~1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"timezone-java-2011m", rpm:"timezone-java-2011m~1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_168.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_168.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_168.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,398 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for apache MDVSA-2011:168 (apache)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831491);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 10:03:14 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVSA", value: "2011:168");
+  script_cve_id("CVE-2011-3348", "CVE-2011-3192");
+  script_name("Mandriva Update for apache MDVSA-2011:168 (apache)");
+  desc = "
+
+  Vulnerability Insight:
+
+  A vulnerability has been discovered and corrected in apache:
+
+  The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21,
+  when used with mod_proxy_balancer in certain configurations, allows
+  remote attackers to cause a denial of service (temporary error state
+  in the backend server) via a malformed HTTP request (CVE-2011-3348).
+
+  The fix for CVE-2011-3192 provided by the MDVSA-2011:130 advisory
+  introduced regressions in the way httpd handled certain Range HTTP
+  header values.
+
+  The updated packages have been patched to correct these issues.
+
+  Affected Software/OS:
+  apache on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00009.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of apache");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"apache-base", rpm:"apache-base~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-devel", rpm:"apache-devel~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-htcacheclean", rpm:"apache-htcacheclean~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_authn_dbd", rpm:"apache-mod_authn_dbd~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_cache", rpm:"apache-mod_cache~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_dav", rpm:"apache-mod_dav~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_dbd", rpm:"apache-mod_dbd~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_deflate", rpm:"apache-mod_deflate~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_disk_cache", rpm:"apache-mod_disk_cache~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_file_cache", rpm:"apache-mod_file_cache~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_ldap", rpm:"apache-mod_ldap~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_mem_cache", rpm:"apache-mod_mem_cache~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_proxy", rpm:"apache-mod_proxy~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_proxy_ajp", rpm:"apache-mod_proxy_ajp~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_ssl", rpm:"apache-mod_ssl~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-modules", rpm:"apache-modules~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_userdir", rpm:"apache-mod_userdir~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-event", rpm:"apache-mpm-event~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-itk", rpm:"apache-mpm-itk~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-peruser", rpm:"apache-mpm-peruser~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-prefork", rpm:"apache-mpm-prefork~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-worker", rpm:"apache-mpm-worker~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-source", rpm:"apache-source~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache", rpm:"apache~2.2.9~12.14mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"apache-base", rpm:"apache-base~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-devel", rpm:"apache-devel~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-htcacheclean", rpm:"apache-htcacheclean~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_authn_dbd", rpm:"apache-mod_authn_dbd~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_cache", rpm:"apache-mod_cache~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_dav", rpm:"apache-mod_dav~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_dbd", rpm:"apache-mod_dbd~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_deflate", rpm:"apache-mod_deflate~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_disk_cache", rpm:"apache-mod_disk_cache~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_file_cache", rpm:"apache-mod_file_cache~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_ldap", rpm:"apache-mod_ldap~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_mem_cache", rpm:"apache-mod_mem_cache~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_proxy", rpm:"apache-mod_proxy~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_proxy_ajp", rpm:"apache-mod_proxy_ajp~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_proxy_scgi", rpm:"apache-mod_proxy_scgi~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_reqtimeout", rpm:"apache-mod_reqtimeout~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_ssl", rpm:"apache-mod_ssl~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-modules", rpm:"apache-modules~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mod_userdir", rpm:"apache-mod_userdir~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-event", rpm:"apache-mpm-event~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-itk", rpm:"apache-mpm-itk~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-peruser", rpm:"apache-mpm-peruser~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-prefork", rpm:"apache-mpm-prefork~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-mpm-worker", rpm:"apache-mpm-worker~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache-source", rpm:"apache-source~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"apache", rpm:"apache~2.2.15~3.5mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_169.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_169.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_169.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,1758 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for mozilla MDVSA-2011:169 (mozilla)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831490);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 10:00:56 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "MDVSA", value: "2011:169");
+  script_cve_id("CVE-2011-3640", "CVE-2011-3648", "CVE-2011-3650", "CVE-2011-3651",
+                "CVE-2011-3652", "CVE-2011-3654", "CVE-2011-3655", "CVE-2011-3004",
+                "CVE-2011-3647");
+  script_name("Mandriva Update for mozilla MDVSA-2011:169 (mozilla)");
+  desc = "
+
+  Vulnerability Insight:
+  Security issues were identified and fixed in mozilla NSS, firefox
+  and thunderbird:
+
+  22 weak 512-bit certificates issued by the DigiCert Sdn. Bhd
+  certificate authority has been revoked from the root CA storage. This
+  was fixed with rootcerts-20111103.00 and nss-3.13. DigiCert
+  Sdn. Bhd is a Malaysian subordinate CA under Entrust and Verizon
+  (GTE CyberTrust). It bears no affiliation whatsoever with the
+  US-based corporation DigiCert, Inc., which is a member of Mozilla&amp;#039;s
+  root program.
+
+  Untrusted search path vulnerability in Mozilla Network Security
+  Services (NSS) might allow local users to gain privileges via a Trojan
+  horse pkcs11.txt file in a top-level directory (CVE-2011-3640).
+
+  Cross-site scripting (XSS) vulnerability in Mozilla Firefox before
+  3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0
+  through 7.0 allows remote attackers to inject arbitrary web script
+  or HTML via crafted text with Shift JIS encoding (CVE-2011-3648).
+
+  Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird
+  before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript
+  files that contain many functions, which allows user-assisted
+  remote attackers to cause a denial of service (memory corruption and
+  application crash) or possibly have unspecified other impact via a
+  crafted file that is accessed by debugging APIs, as demonstrated by
+  Firebug (CVE-2011-3650).
+
+  The following vulnerabilities affetst Mandriva Linux 2011 only:
+
+  Multiple unspecified vulnerabilities in the browser engine in
+  Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to
+  cause a denial of service (memory corruption and application crash)
+  or possibly execute arbitrary code via unknown vectors (CVE-2011-3651).
+
+  The browser engine in Mozilla Firefox before 8.0 and Thunderbird before
+  8.0 does not properly allocate memory, which allows remote attackers
+  to cause a denial of service (memory corruption and application
+  crash) or possibly execute arbitrary code via unspecified vectors
+  (CVE-2011-3652).
+
+  The browser engine in Mozilla Firefox before 8.0 and Thunderbird
+  before 8.0 does not properly handle links from SVG mpath elements to
+  non-SVG elements, which allows remote attackers to cause a denial of
+  service (memory corruption and application crash) or possibly execute
+  arbitrary code via unspecified vectors (CVE-2011-3654).
+
+  Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform
+  access control without ...
+
+  Description truncated, for more information please check the Reference URL
+
+  Affected Software/OS:
+  mozilla on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00011.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of mozilla");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-devel", rpm:"firefox-devel~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.19.1~20.33mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss3", rpm:"libnss3~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-devel", rpm:"libnss-devel~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-static-devel", rpm:"libnss-static-devel~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner1.9.2.24", rpm:"libxulrunner1.9.2.24~1.9.2.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.2.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts", rpm:"rootcerts~20111103.00~1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts-java", rpm:"rootcerts-java~20111103.00~1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.24.0~3.34mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-l10n", rpm:"firefox-l10n~3.6.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss3", rpm:"lib64nss3~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-devel", rpm:"lib64nss-devel~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-static-devel", rpm:"lib64nss-static-devel~3.13.1~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner1.9.2.24", rpm:"lib64xulrunner1.9.2.24~1.9.2.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.2.24~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"beagle", rpm:"beagle~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-crawl-system", rpm:"beagle-crawl-system~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-doc", rpm:"beagle-doc~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-evolution", rpm:"beagle-evolution~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-gui", rpm:"beagle-gui~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-gui-qt", rpm:"beagle-gui-qt~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"beagle-libs", rpm:"beagle-libs~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox", rpm:"firefox~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-af", rpm:"firefox-af~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ar", rpm:"firefox-ar~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-be", rpm:"firefox-be~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bg", rpm:"firefox-bg~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-bn", rpm:"firefox-bn~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ca", rpm:"firefox-ca~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cs", rpm:"firefox-cs~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-cy", rpm:"firefox-cy~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-da", rpm:"firefox-da~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-de", rpm:"firefox-de~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-devel", rpm:"firefox-devel~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-el", rpm:"firefox-el~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-en_GB", rpm:"firefox-en_GB~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eo", rpm:"firefox-eo~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_AR", rpm:"firefox-es_AR~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-es_ES", rpm:"firefox-es_ES~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-et", rpm:"firefox-et~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-eu", rpm:"firefox-eu~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-beagle", rpm:"firefox-ext-beagle~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-blogrovr", rpm:"firefox-ext-blogrovr~1.1.804~13.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-mozvoikko", rpm:"firefox-ext-mozvoikko~1.0.1~2.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-r-kiosk", rpm:"firefox-ext-r-kiosk~0.8.1~2.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-scribefire", rpm:"firefox-ext-scribefire~3.5.2~2.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-weave-sync", rpm:"firefox-ext-weave-sync~1.1~5.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ext-xmarks", rpm:"firefox-ext-xmarks~3.6.14~2.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fi", rpm:"firefox-fi~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fr", rpm:"firefox-fr~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-fy", rpm:"firefox-fy~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ga_IE", rpm:"firefox-ga_IE~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gl", rpm:"firefox-gl~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-gu_IN", rpm:"firefox-gu_IN~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-he", rpm:"firefox-he~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hi", rpm:"firefox-hi~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-hu", rpm:"firefox-hu~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-id", rpm:"firefox-id~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-is", rpm:"firefox-is~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-it", rpm:"firefox-it~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ja", rpm:"firefox-ja~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ka", rpm:"firefox-ka~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-kn", rpm:"firefox-kn~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ko", rpm:"firefox-ko~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ku", rpm:"firefox-ku~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lt", rpm:"firefox-lt~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-lv", rpm:"firefox-lv~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mk", rpm:"firefox-mk~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-mr", rpm:"firefox-mr~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nb_NO", rpm:"firefox-nb_NO~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nl", rpm:"firefox-nl~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-nn_NO", rpm:"firefox-nn_NO~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-oc", rpm:"firefox-oc~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pa_IN", rpm:"firefox-pa_IN~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pl", rpm:"firefox-pl~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_BR", rpm:"firefox-pt_BR~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-pt_PT", rpm:"firefox-pt_PT~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ro", rpm:"firefox-ro~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-ru", rpm:"firefox-ru~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-si", rpm:"firefox-si~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sk", rpm:"firefox-sk~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sl", rpm:"firefox-sl~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sq", rpm:"firefox-sq~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sr", rpm:"firefox-sr~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-sv_SE", rpm:"firefox-sv_SE~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-te", rpm:"firefox-te~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-th", rpm:"firefox-th~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-tr", rpm:"firefox-tr~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-uk", rpm:"firefox-uk~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_CN", rpm:"firefox-zh_CN~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-zh_TW", rpm:"firefox-zh_TW~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gjs", rpm:"gjs~0.6~4.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-extras", rpm:"gnome-python-extras~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda", rpm:"gnome-python-gda~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gda-devel", rpm:"gnome-python-gda-devel~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gdl", rpm:"gnome-python-gdl~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkhtml2", rpm:"gnome-python-gtkhtml2~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkmozembed", rpm:"gnome-python-gtkmozembed~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"gnome-python-gtkspell", rpm:"gnome-python-gtkspell~2.25.3~18.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libgjs0", rpm:"libgjs0~0.6~4.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libgjs-devel", rpm:"libgjs-devel~0.6~4.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss3", rpm:"libnss3~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-devel", rpm:"libnss-devel~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libnss-static-devel", rpm:"libnss-static-devel~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner1.9.2.24", rpm:"libxulrunner1.9.2.24~1.9.2.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libxulrunner-devel", rpm:"libxulrunner-devel~1.9.2.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird", rpm:"mozilla-thunderbird~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-af", rpm:"mozilla-thunderbird-af~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ar", rpm:"mozilla-thunderbird-ar~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-be", rpm:"mozilla-thunderbird-be~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-beagle", rpm:"mozilla-thunderbird-beagle~0.3.9~40.21mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-bg", rpm:"mozilla-thunderbird-bg~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-bn_BD", rpm:"mozilla-thunderbird-bn_BD~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ca", rpm:"mozilla-thunderbird-ca~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-cs", rpm:"mozilla-thunderbird-cs~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-da", rpm:"mozilla-thunderbird-da~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-de", rpm:"mozilla-thunderbird-de~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-el", rpm:"mozilla-thunderbird-el~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-en_GB", rpm:"mozilla-thunderbird-en_GB~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail", rpm:"mozilla-thunderbird-enigmail~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ar", rpm:"mozilla-thunderbird-enigmail-ar~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ca", rpm:"mozilla-thunderbird-enigmail-ca~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-cs", rpm:"mozilla-thunderbird-enigmail-cs~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-de", rpm:"mozilla-thunderbird-enigmail-de~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-el", rpm:"mozilla-thunderbird-enigmail-el~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-es", rpm:"mozilla-thunderbird-enigmail-es~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-fi", rpm:"mozilla-thunderbird-enigmail-fi~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-fr", rpm:"mozilla-thunderbird-enigmail-fr~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-hu", rpm:"mozilla-thunderbird-enigmail-hu~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-it", rpm:"mozilla-thunderbird-enigmail-it~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ja", rpm:"mozilla-thunderbird-enigmail-ja~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ko", rpm:"mozilla-thunderbird-enigmail-ko~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-nb", rpm:"mozilla-thunderbird-enigmail-nb~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-nl", rpm:"mozilla-thunderbird-enigmail-nl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pl", rpm:"mozilla-thunderbird-enigmail-pl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pt", rpm:"mozilla-thunderbird-enigmail-pt~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-pt_BR", rpm:"mozilla-thunderbird-enigmail-pt_BR~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-ru", rpm:"mozilla-thunderbird-enigmail-ru~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-sl", rpm:"mozilla-thunderbird-enigmail-sl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-sv", rpm:"mozilla-thunderbird-enigmail-sv~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-tr", rpm:"mozilla-thunderbird-enigmail-tr~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-vi", rpm:"mozilla-thunderbird-enigmail-vi~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-zh_CN", rpm:"mozilla-thunderbird-enigmail-zh_CN~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-enigmail-zh_TW", rpm:"mozilla-thunderbird-enigmail-zh_TW~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-es_AR", rpm:"mozilla-thunderbird-es_AR~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-es_ES", rpm:"mozilla-thunderbird-es_ES~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-et", rpm:"mozilla-thunderbird-et~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-et_EE", rpm:"mozilla-thunderbird-et_EE~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-eu", rpm:"mozilla-thunderbird-eu~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fi", rpm:"mozilla-thunderbird-fi~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fr", rpm:"mozilla-thunderbird-fr~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-fy", rpm:"mozilla-thunderbird-fy~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ga", rpm:"mozilla-thunderbird-ga~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-gd", rpm:"mozilla-thunderbird-gd~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-gl", rpm:"mozilla-thunderbird-gl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-he", rpm:"mozilla-thunderbird-he~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-hu", rpm:"mozilla-thunderbird-hu~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-id", rpm:"mozilla-thunderbird-id~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-is", rpm:"mozilla-thunderbird-is~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-it", rpm:"mozilla-thunderbird-it~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ja", rpm:"mozilla-thunderbird-ja~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ka", rpm:"mozilla-thunderbird-ka~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ko", rpm:"mozilla-thunderbird-ko~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-lightning", rpm:"mozilla-thunderbird-lightning~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-lt", rpm:"mozilla-thunderbird-lt~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nb_NO", rpm:"mozilla-thunderbird-nb_NO~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nl", rpm:"mozilla-thunderbird-nl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-nn_NO", rpm:"mozilla-thunderbird-nn_NO~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pa_IN", rpm:"mozilla-thunderbird-pa_IN~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pl", rpm:"mozilla-thunderbird-pl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pt_BR", rpm:"mozilla-thunderbird-pt_BR~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-pt_PT", rpm:"mozilla-thunderbird-pt_PT~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ro", rpm:"mozilla-thunderbird-ro~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-ru", rpm:"mozilla-thunderbird-ru~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-si", rpm:"mozilla-thunderbird-si~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sk", rpm:"mozilla-thunderbird-sk~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sl", rpm:"mozilla-thunderbird-sl~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sq", rpm:"mozilla-thunderbird-sq~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sr", rpm:"mozilla-thunderbird-sr~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-sv_SE", rpm:"mozilla-thunderbird-sv_SE~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-tr", rpm:"mozilla-thunderbird-tr~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-uk", rpm:"mozilla-thunderbird-uk~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-vi", rpm:"mozilla-thunderbird-vi~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-zh_CN", rpm:"mozilla-thunderbird-zh_CN~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-zh_TW", rpm:"mozilla-thunderbird-zh_TW~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nsinstall", rpm:"nsinstall~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts", rpm:"rootcerts~20111103.00~1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"rootcerts-java", rpm:"rootcerts-java~20111103.00~1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"xulrunner", rpm:"xulrunner~1.9.2.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"yelp", rpm:"yelp~2.30.1~4.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"firefox-l10n", rpm:"firefox-l10n~3.6.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"mozilla-thunderbird-l10n", rpm:"mozilla-thunderbird-l10n~3.1.16~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64gjs0", rpm:"lib64gjs0~0.6~4.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64gjs-devel", rpm:"lib64gjs-devel~0.6~4.17mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss3", rpm:"lib64nss3~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-devel", rpm:"lib64nss-devel~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64nss-static-devel", rpm:"lib64nss-static-devel~3.13.1~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner1.9.2.24", rpm:"lib64xulrunner1.9.2.24~1.9.2.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64xulrunner-devel", rpm:"lib64xulrunner-devel~1.9.2.24~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1251_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1251_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1251_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,122 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for firefox USN-1251-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840801);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:55:39 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "USN", value: "1251-1");
+  script_cve_id("CVE-2011-3004", "CVE-2011-3647", "CVE-2011-3648", "CVE-2011-3650");
+  script_name("Ubuntu Update for firefox USN-1251-1");
+  desc = "
+
+  Vulnerability Insight:
+
+  It was discovered that CVE-2011-3004, which addressed possible privilege
+  escalation in addons, also affected Firefox 3.6. An attacker could
+  potentially exploit Firefox when an add-on was installed that used
+  loadSubscript in vulnerable ways. (CVE-2011-3647)
+  
+  Yosuke Hasegawa discovered that the Mozilla browser engine mishandled
+  invalid sequences in the Shift-JIS encoding. A malicious website could
+  possibly use this flaw this to steal data or inject malicious scripts into
+  web content. (CVE-2011-3648)
+  
+  Marc Schoenefeld discovered that using Firebug to profile a JavaScript file
+  with many functions would cause Firefox to crash. An attacker might be able
+  to exploit this without using the debugging APIs which would potentially
+  allow an attacker to remotely crash the browser. (CVE-2011-3650)
+
+  Affected Software/OS:
+  firefox on Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001476.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of firefox");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"firefox", ver:"3.6.24+build2+nobinonly-0ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"xulrunner-1.9.2", ver:"1.9.2.24+build2+nobinonly-0ubuntu0.10.04.1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"firefox", ver:"3.6.24+build2+nobinonly-0ubuntu0.10.10.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"xulrunner-1.9.2", ver:"1.9.2.24+build2+nobinonly-0ubuntu0.10.10.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1252_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1252_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1252_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,128 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for tomcat6 USN-1252-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840803);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:59:15 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1252-1");
+  script_cve_id("CVE-2011-1184", "CVE-2011-2204", "CVE-2011-2526", "CVE-2011-3190");
+  script_name("Ubuntu Update for tomcat6 USN-1252-1");
+  desc = "
+
+  Vulnerability Insight:
+
+  It was discovered that Tomcat incorrectly implemented HTTP DIGEST
+  authentication. An attacker could use this flaw to perform a variety of
+  authentication attacks. (CVE-2011-1184)
+  
+  Polina Genova discovered that Tomcat incorrectly created log entries with
+  passwords when encountering errors during JMX user creation. A local
+  attacker could possibly use this flaw to obtain sensitive information. This
+  issue only affected Ubuntu 10.04 LTS, 10.10 and 11.04. (CVE-2011-2204)
+  
+  It was discovered that Tomcat incorrectly validated certain request
+  attributes when sendfile is enabled. A local attacker could bypass intended
+  restrictions, or cause the JVM to crash, resulting in a denial of service.
+  (CVE-2011-2526)
+  
+  It was discovered that Tomcat incorrectly handled certain AJP requests. A
+  remote attacker could use this flaw to spoof requests, bypass
+  authentication, and obtain sensitive information. This issue only affected
+  Ubuntu 10.04 LTS, 10.10 and 11.04. (CVE-2011-3190)
+
+  Affected Software/OS:
+  tomcat6 on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001470.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of tomcat6");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"libtomcat6-java", ver:"6.0.28-2ubuntu1.5", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"libtomcat6-java", ver:"6.0.24-2ubuntu1.9", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"libtomcat6-java", ver:"6.0.28-10ubuntu2.2", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1253_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1253_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1253_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,211 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for linux USN-1253-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840804);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:59:23 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"8.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "USN", value: "1253-1");
+  script_cve_id("CVE-2011-1576", "CVE-2011-1833", "CVE-2011-2494", "CVE-2011-2495",
+                "CVE-2011-2497", "CVE-2011-2695", "CVE-2011-2699", "CVE-2011-2905",
+                "CVE-2011-2928", "CVE-2011-3188", "CVE-2011-3191");
+  script_name("Ubuntu Update for linux USN-1253-1");
+  desc = "
+
+  Vulnerability Insight:
+  Ryan Sweat discovered that the kernel incorrectly handled certain VLAN
+  packets. On some systems, a remote attacker could send specially crafted
+  traffic to crash the system, leading to a denial of service.
+  (CVE-2011-1576)
+
+  Vasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not
+  correctly check the origin of mount points. A local attacker could exploit
+  this to trick the system into unmounting arbitrary mount points, leading to
+  a denial of service. (CVE-2011-1833)
+
+  Vasiliy Kulikov discovered that taskstats did not enforce access
+  restrictions. A local attacker could exploit this to read certain
+  information, leading to a loss of privacy. (CVE-2011-2494)
+
+  Vasiliy Kulikov discovered that /proc/PID/io did not enforce access
+  restrictions. A local attacker could exploit this to read certain
+  information, leading to a loss of privacy. (CVE-2011-2495)
+
+  Dan Rosenberg discovered that the Bluetooth stack incorrectly handled
+  certain L2CAP requests. If a system was using Bluetooth, a remote attacker
+  could send specially crafted traffic to crash the system or gain root
+  privileges. (CVE-2011-2497)
+
+  It was discovered that the EXT4 filesystem contained multiple off-by-one
+  flaws. A local attacker could exploit this to crash the system, leading to
+  a denial of service. (CVE-2011-2695)
+
+  Fernando Gont discovered that the IPv6 stack used predictable fragment
+  identification numbers. A remote attacker could exploit this to exhaust
+  network resources, leading to a denial of service. (CVE-2011-2699)
+
+  Christian Ohm discovered that the perf command looks for configuration
+  files in the current directory. If a privileged user were tricked into
+  running perf in a directory containing a malicious configuration file, an
+  attacker could run arbitrary commands and possibly gain privileges.
+  (CVE-2011-2905)
+
+  Time Warns discovered that long symlinks were incorrectly handled on Be
+  filesystems. A local attacker could exploit this with a malformed Be
+  filesystem and crash the system, leading to a denial of service.
+  (CVE-2011-2928)
+
+  Dan Kaminsky discovered that the kernel incorrectly handled random sequence
+  number generation. An attacker could use this flaw to possibly predict
+  sequence numbers and inject packets. (CVE-2011-3188)
+
+  Darren Lavender discovered that the CIFS client incorrectly handled certain
+  large values. A remote attacker with a malicious server could exploit this
+  to crash the system or possibly execute arbitrary code as the root user.
+  (CVE-2011-3191)
+
+  Affected Software/OS:
+  linux on Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001471.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of linux");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-386", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-generic", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-generic-pae", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-ia64", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-lpia", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-powerpc", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-powerpc-smp", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-powerpc64-smp", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-preempt", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-server", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-sparc64", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-sparc64-smp", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-versatile", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.32-35-virtual", ver:"2.6.32-35.78", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1255_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1255_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1255_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,120 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for libmodplug USN-1255-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840800);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:55:33 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1255-1");
+  script_cve_id("CVE-2011-2911", "CVE-2011-2912", "CVE-2011-2913", "CVE-2011-2914", "CVE-2011-2915");
+  script_name("Ubuntu Update for libmodplug USN-1255-1");
+  desc = "
+
+  Vulnerability Insight:
+
+  Hossein Lotfi discovered that libmodplug did not correctly handle certain
+  malformed media files. If a user or automated system were tricked into
+  opening a crafted media file, an attacker could cause a denial of service
+  or possibly execute arbitrary code with privileges of the user invoking the
+  program. (CVE-2011-2911, CVE-2011-2912, CVE-2011-2913)
+  
+  It was discovered that libmodplug did not correctly handle certain
+  malformed media files. If a user or automated system were tricked into
+  opening a crafted media file, an attacker could cause a denial of service
+  or possibly execute arbitrary code with privileges of the user invoking the
+  program. (CVE-2011-2914, CVE-2011-2915)
+
+  Affected Software/OS:
+  libmodplug on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001472.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of libmodplug");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"libmodplug1", ver:"1:0.8.8.1-1ubuntu1.3", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"libmodplug0c2", ver:"1:0.8.7-1ubuntu0.3", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"libmodplug1", ver:"1:0.8.8.1-2ubuntu0.3", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1256_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1256_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1256_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,163 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for linux-lts-backport-natty USN-1256-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840802);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:55:49 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"8.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "USN", value: "1256-1");
+  script_cve_id("CVE-2011-1020", "CVE-2011-1078", "CVE-2011-1079", "CVE-2011-1080",
+                "CVE-2011-1093", "CVE-2011-1160", "CVE-2011-1180", "CVE-2011-1478",
+                "CVE-2010-4250", "CVE-2011-1479", "CVE-2011-1493", "CVE-2011-1573",
+                "CVE-2011-1576", "CVE-2011-1577", "CVE-2011-1581", "CVE-2011-1585",
+                "CVE-2011-1767", "CVE-2011-1768", "CVE-2011-1771", "CVE-2011-1776",
+                "CVE-2011-1833", "CVE-2011-2183", "CVE-2011-2213", "CVE-2011-2479",
+                "CVE-2011-2484", "CVE-2011-2491", "CVE-2011-2492", "CVE-2011-2493",
+                "CVE-2011-2494", "CVE-2011-2495", "CVE-2011-2496", "CVE-2011-2497",
+                "CVE-2011-2517", "CVE-2011-2525", "CVE-2011-2689", "CVE-2011-2695",
+                "CVE-2011-2699", "CVE-2011-2700", "CVE-2011-2723", "CVE-2011-2905",
+                "CVE-2011-2909", "CVE-2011-2918", "CVE-2011-2928", "CVE-2011-2942",
+                "CVE-2011-3188", "CVE-2011-3191", "CVE-2011-3209", "CVE-2011-3363");
+  script_name("Ubuntu Update for linux-lts-backport-natty USN-1256-1");
+  desc = "
+
+  Vulnerability Insight:
+  It was discovered that the /proc filesystem did not correctly handle
+  permission changes when programs executed. A local attacker could hold open
+  files to examine details about programs running with higher privileges,
+  potentially increasing the chances of exploiting additional
+  vulnerabilities. (CVE-2011-1020)
+
+  Vasiliy Kulikov discovered that the Bluetooth stack did not correctly clear
+  memory. A local attacker could exploit this to read kernel stack memory,
+  leading to a loss of privacy. (CVE-2011-1078)
+
+  Vasiliy Kulikov discovered that the Bluetooth stack did not correctly check
+  that device name strings were NULL terminated. A local attacker could
+  exploit this to crash the system, leading to a denial of service, or leak
+  contents of kernel stack memory, leading to a loss of privacy.
+  (CVE-2011-1079)
+
+  Vasiliy Kulikov discovered that bridge network filtering did not check that
+  name fields were NULL terminated. A local attacker could exploit this to
+  leak contents of kernel stack memory, leading to a loss of privacy.
+  (CVE-2011-1080)
+
+  Johan Hovold discovered that the DCCP network stack did not correctly
+  handle certain packet combinations. A remote attacker could send specially
+  crafted network traffic that would crash the system, leading to a denial of
+  service. (CVE-2011-1093)
+
+  Peter Huewe discovered that the TPM device did not correctly initialize
+  memory. A local attacker could exploit this to read kernel heap memory
+  contents, leading to a loss of privacy. (CVE-2011-1160)
+
+  Dan Rosenberg discovered that the IRDA subsystem did not correctly check
+  certain field sizes. If a system was using IRDA, a remote attacker could
+  send specially crafted traffic to crash the system or gain root privileges.
+  (CVE-2011-1180)
+
+  Ryan Sweat discovered that the GRO code did not correctly validate memory.
+  In some configurations on systems using VLANs, a remote attacker could send
+  specially crafted traffic to crash the system, leading to a denial of
+  service. (CVE-2011-1478)
+
+  It was discovered that the security fix for CVE-2010-4250 introduced a
+  regression. A remote attacker could exploit this to crash the system,
+  leading to a denial of service. (CVE-2011-1479)
+
+  Dan Rosenberg discovered that the X.25 Rose network stack did not correctly
+  handle certain fields. If a system was running with Rose enabled, a remote
+  attacker could send specially crafted traffic to gain root privileges.
+  (CVE-2011-1493)
+
+  It was discovered that the Stream Control Transmission Protocol (SCTP)
+  implementation incorrectly calculated length ...
+
+  Description truncated, for more information please check the Reference URL
+
+  Affected Software/OS:
+  linux-lts-backport-natty on Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001473.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of linux-lts-backport-natty");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.38-12-generic", ver:"2.6.38-12.51~lucid1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.38-12-generic-pae", ver:"2.6.38-12.51~lucid1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.38-12-server", ver:"2.6.38-12.51~lucid1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"linux-image-2.6.38-12-virtual", ver:"2.6.38-12.51~lucid1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1257_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1257_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1257_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,129 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for radvd USN-1257-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840799);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:55:29 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1257-1");
+  script_cve_id("CVE-2011-3601", "CVE-2011-3602", "CVE-2011-3604", "CVE-2011-3605");
+  script_name("Ubuntu Update for radvd USN-1257-1");
+  desc = "
+
+  Vulnerability Insight:
+
+  Vasiliy Kulikov discovered that radvd incorrectly parsed the
+  ND_OPT_DNSSL_INFORMATION option. A remote attacker could exploit this with
+  a specially-crafted request and cause the radvd daemon to crash, or
+  possibly execute arbitrary code. The default compiler options for affected
+  releases should reduce the vulnerability to a denial of service. This issue
+  only affected Ubuntu 11.04 and 11.10. (CVE-2011-3601)
+
+  Vasiliy Kulikov discovered that radvd incorrectly filtered interface names
+  when creating certain files. A local attacker could exploit this to
+  overwrite certain files on the system, bypassing intended permissions.
+  (CVE-2011-3602)
+
+  Vasiliy Kulikov discovered that radvd incorrectly handled certain lengths.
+  A remote attacker could exploit this to cause the radvd daemon to crash,
+  resulting in a denial of service. (CVE-2011-3604)
+
+  Vasiliy Kulikov discovered that radvd incorrectly handled delays when used
+  in unicast mode, which is not the default in Ubuntu. If used in unicast
+  mode, a remote attacker could cause radvd outages, resulting in a denial of
+  service. (CVE-2011-3605)
+
+  Affected Software/OS:
+  radvd on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001474.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of radvd");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"radvd", ver:"1:1.6-1ubuntu0.1", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"radvd", ver:"1:1.3-1.1ubuntu0.1", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"radvd", ver:"1:1.7-1ubuntu0.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1258_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1258_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1258_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,112 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for clamav USN-1258-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840797);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:55:22 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1258-1");
+  script_cve_id("CVE-2011-3627");
+  script_name("Ubuntu Update for clamav USN-1258-1");
+  desc = "
+
+  Vulnerability Insight:
+  Stephane Chazelas discovered the bytecode engine of ClamAV improperly
+  handled recursion under certain circumstances. This could allow a remote
+  attacker to craft a file that could cause ClamAV to crash, resulting in a
+  denial of service.
+
+  Affected Software/OS:
+  clamav on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001475.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of clamav");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"libclamav6", ver:"0.96.5+dfsg-1ubuntu1.10.10.3", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"libclamav6", ver:"0.96.5+dfsg-1ubuntu1.10.04.3", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"libclamav6", ver:"0.97.3+dfsg-1ubuntu0.11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1259_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1259_1.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1259_1.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -0,0 +1,166 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for apache2 USN-1259-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840798);
+  script_version("$Revision: $");
+  script_tag(name:"last_modification", value:"$Date: $");
+  script_tag(name:"creation_date", value:"2011-11-11 09:55:23 +0530 (Fri, 11 Nov 2011)");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "USN", value: "1259-1");
+  script_cve_id("CVE-2011-3368", "CVE-2011-3348", "CVE-2011-1176");
+  script_name("Ubuntu Update for apache2 USN-1259-1");
+  desc = "
+
+  Vulnerability Insight:
+  It was discovered that the mod_proxy module in Apache did not properly
+  interact with the RewriteRule and ProxyPassMatch pattern matches
+  in the configuration of a reverse proxy. This could allow remote
+  attackers to contact internal webservers behind the proxy that were
+  not intended for external exposure. (CVE-2011-3368)
+
+  Stefano Nichele discovered that the mod_proxy_ajp module in Apache when
+  used with mod_proxy_balancer in certain configurations could allow
+  remote attackers to cause a denial of service via a malformed HTTP
+  request. (CVE-2011-3348)
+
+  Samuel Montosa discovered that the ITK Multi-Processing Module for
+  Apache did not properly handle certain configuration sections that
+  specify NiceValue but not AssignUserID, preventing Apache from dropping
+  privileges correctly. This issue only affected Ubuntu 10.04 LTS, Ubuntu
+  10.10 and Ubuntu 11.04. (CVE-2011-1176)
+
+  USN 1199-1 fixed a vulnerability in the byterange filter of Apache. The
+  upstream patch introduced a regression in Apache when handling specific
+  byte range requests. This update fixes the issue.
+
+  Original advisory details:
+
+  A flaw was discovered in the byterange filter in Apache. A remote attacker
+  could exploit this to cause a denial of service via resource exhaustion.
+
+  Affected Software/OS:
+  apache2 on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS ,
+  Ubuntu 8.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001477.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of apache2");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"apache2-mpm-itk", ver:"2.2.16-1ubuntu3.4", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"apache2.2-bin", ver:"2.2.16-1ubuntu3.4", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"apache2-mpm-itk", ver:"2.2.14-5ubuntu8.7", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"apache2.2-bin", ver:"2.2.14-5ubuntu8.7", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"apache2-mpm-itk", ver:"2.2.17-1ubuntu1.4", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"apache2.2-bin", ver:"2.2.17-1ubuntu1.4", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU8.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"apache2.2-common", ver:"2.2.8-1ubuntu0.22", rls:"UBUNTU8.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}

Modified: trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl	2011-11-11 13:36:11 UTC (rev 12107)
+++ trunk/openvas-plugins/scripts/secpod_adobe_prdts_detect_macosx.nasl	2011-11-11 14:45:59 UTC (rev 12108)
@@ -10,6 +10,9 @@
 # - Updated By : Madhuri D <dmadhuri at secpod.com> on 20-09-2011
 #      - Updated to detect Adobe reader and acrobat versions
 #
+# - Updated By : Madhuri D <dmadhuri at secpod.com> on 10-11-2011
+#      - Updated to detect Adobe Shockwave Player versions
+#
 # Copyright:
 # Copyright (c) 2011 SecPod, http://www.secpod.com
 #
@@ -30,9 +33,7 @@
 if(description)
 {
   script_id(902711);
-  script_version("$Revision$");
-  script_tag(name:"last_modification", value:"$Date$");
-  script_tag(name:"creation_date", value:"2011-08-31 10:37:30 +0200 (Wed, 31 Aug 2011)");
+  script_version("$Revision: 1.0$");
   script_tag(name:"risk_factor", value:"None");
   script_name("Adobe Products Version Detection (Mac OS X)");
   desc = "
@@ -65,8 +66,7 @@
    ## build cpe and store it as host_detail
    cpe = build_cpe(value:tmpVers, exp:tmpExpr, base:tmpBase);
    if(!isnull(cpe))
-      register_host_detail(name:"App", value:cpe, nvt:SCRIPT_OID,
-                                                  desc:SCRIPT_DESC);
+      register_host_detail(name:"App", value:cpe, nvt:SCRIPT_OID, desc:SCRIPT_DESC);
 }
 
 ## start script
@@ -83,21 +83,39 @@
 
 ## Trying to get Adobe Flash Player version from packages
 buffer = get_kb_item("ssh/login/osx_pkgs");
-if(buffer != NULL && "com.adobe.pkg.FlashPlayer" >< buffer)
+if(buffer != NULL)
 {
-  ## Grep for the version
-  version = eregmatch(pattern:"FlashPlayer[^\n]([0-9.]+)", string:buffer);
-  if(version[1] != NULL)
+  if("com.adobe.pkg.FlashPlayer" >< buffer)
   {
-   ## Set the version in KB
-   set_kb_item(name: "Adobe/Flash/Player/MacOSX/Version", value:version[1]);
-   security_note(data:"Adobe Flash Player version " + version[1] +
+    ## Grep for the version
+    version = eregmatch(pattern:"FlashPlayer[^\n]([0-9.]+)", string:buffer);
+    if(version[1] != NULL)
+    {
+      ## Set the version in KB
+      set_kb_item(name: "Adobe/Flash/Player/MacOSX/Version", value:version[1]);
+      security_note(data:"Adobe Flash Player version " + version[1] +
         " was detected on this host");
 
-   ## build cpe and store it as host_detail
-   register_cpe(tmpVers:version[1], tmpExpr:"^([0-9.]+)",
-                                    tmpBase:"cpe:/a:adobe:flash_player:");
+      ## build cpe and store it as host_detail
+      register_cpe(tmpVers:version[1], tmpExpr:"^([0-9.]+)", tmpBase:"cpe:/a:adobe:flash_player:");
+    }
   }
+
+  if("com.adobe.shockwave" >< buffer)
+  {
+    ## Grep for the version
+    version = eregmatch(pattern:"shockwave[^\n]([0-9.]+)", string:buffer);
+    if(version[1] != NULL)
+    {
+      ## Set the version in KB
+      set_kb_item(name: "Adobe/Shockwave/Player/MacOSX/Version", value:version[1]);
+      security_note(data:"Adobe Shockwave Player version " + version[1] +
+        " was detected on this host");
+
+      ## build cpe and store it as host_detail
+      register_cpe(tmpVers:version[1], tmpExpr:"^([0-9.]+)", tmpBase:"cpe:/a:adobe:shockwave_player:");
+    }
+  }
 }
 
 ## Get the version of Adobe Air
@@ -113,8 +131,7 @@
                   " was detected on this host");
 
   ## build cpe and store it as host_detail
-  register_cpe(tmpVers:airVer, tmpExpr:"^([0-9.]+)",
-                               tmpBase:"cpe:/a:adobe:adobe_air:");
+  register_cpe(tmpVers:airVer, tmpExpr:"^([0-9.]+)", tmpBase:"cpe:/a:adobe:adobe_air:");
 }
 
 ## Get the version of Adobe Reader
@@ -129,8 +146,7 @@
                      " was detected on this host");
 
   ## build cpe and store it as host_detail
-  register_cpe(tmpVers:readerVer, tmpExpr:"^([0-9.]+)",
-                                  tmpBase:"cpe:/a:adobe:acrobat_reader:");
+  register_cpe(tmpVers:readerVer, tmpExpr:"^([0-9.]+)", tmpBase:"cpe:/a:adobe:acrobat_reader:");
 }
 
 
@@ -141,7 +157,7 @@
                "Adobe\ Acrobat\ " + ver + "\ Pro/Adobe\ Acrobat\ Pro.app/" +
                "Contents/Info CFBundleShortVersionString"));
   if("does not exist" >!< acrobatVer){
-    break;
+       break;
   }
 }
 
@@ -159,5 +175,6 @@
                   " was detected on this host");
 
 ## build cpe and store it as host_detail
-register_cpe(tmpVers:acrobatVer, tmpExpr:"^([0-9.]+)",
-                                 tmpBase:"cpe:/a:adobe:acrobat:");
+register_cpe(tmpVers:acrobatVer, tmpExpr:"^([0-9.]+)", tmpBase:"cpe:/a:adobe:acrobat:");
+
+



More information about the Openvas-commits mailing list