[Openvas-commits] r12112 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Nov 14 15:52:12 CET 2011


Author: antu123
Date: 2011-11-14 15:52:06 +0100 (Mon, 14 Nov 2011)
New Revision: 12112

Added:
   trunk/openvas-plugins/scripts/gb_fedora_2011_14963_ocsinventory_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15007_ocsinventory_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15071_cacti_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15110_cacti_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15469_phpMyAdmin_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15472_phpMyAdmin_fc14.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_170.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_173.nasl
   trunk/openvas-plugins/scripts/gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugin and auto generated plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/ChangeLog	2011-11-14 14:52:06 UTC (rev 12112)
@@ -1,5 +1,20 @@
 2011-11-11  Antu Sanadi <santu at secpod.com>
 
+	* scripts/gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl:
+	Added New plugin.
+
+	* scripts/gb_fedora_2011_14963_ocsinventory_fc14.nasl,
+	scripts/gb_fedora_2011_15071_cacti_fc15.nasl,
+	scripts/gb_fedora_2011_15469_phpMyAdmin_fc15.nasl,
+	scripts/gb_mandriva_MDVSA_2011_170.nasl,
+	scripts/gb_fedora_2011_15007_ocsinventory_fc15.nasl,
+	scripts/gb_fedora_2011_15110_cacti_fc14.nasl,
+	scripts/gb_fedora_2011_15472_phpMyAdmin_fc14.nasl,
+	scripts/gb_mandriva_MDVSA_2011_173.nasl:
+	Added new auto generated plugins.
+
+2011-11-11  Antu Sanadi <santu at secpod.com>
+
 	* scripts/gb_emo_realty_manager_sql_inj_vuln.nasl,
 	scripts/gb_labwiki_mult_xss_n_shell_upload_vuln.nasl,
 	scripts/gb_adobe_shockwave_player_mult_vuln_nov11_win.nasl,

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_14963_ocsinventory_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_14963_ocsinventory_fc14.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_14963_ocsinventory_fc14.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,93 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ocsinventory FEDORA-2011-14963
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863616);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:47:59 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-14963");
+  script_cve_id("CVE-2011-4024");
+  script_name("Fedora Update for ocsinventory FEDORA-2011-14963");
+  desc = "
+
+  Vulnerability Insight:
+  Open Computer and Software Inventory Next Generation is an application
+  designed to help a network or system administrator keep track of the
+  computers configuration and software that are installed on the network.
+
+  OCS Inventory is also able to detect all active devices on your network,
+  such as switch, router, network printer and unattended devices.
+
+  OCS Inventory NG includes package deployment feature on client computers.
+
+  ocsinventory is a metapackage that will install the communication server,
+  the administration console and the database server (MySQL).
+
+
+  Affected Software/OS:
+  ocsinventory on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069280.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of ocsinventory");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"ocsinventory", rpm:"ocsinventory~1.3.3~5.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_14963_ocsinventory_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15007_ocsinventory_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15007_ocsinventory_fc15.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15007_ocsinventory_fc15.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,93 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ocsinventory FEDORA-2011-15007
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863614);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:47:57 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-15007");
+  script_cve_id("CVE-2011-4024");
+  script_name("Fedora Update for ocsinventory FEDORA-2011-15007");
+  desc = "
+
+  Vulnerability Insight:
+  Open Computer and Software Inventory Next Generation is an application
+  designed to help a network or system administrator keep track of the
+  computers configuration and software that are installed on the network.
+
+  OCS Inventory is also able to detect all active devices on your network,
+  such as switch, router, network printer and unattended devices.
+
+  OCS Inventory NG includes package deployment feature on client computers.
+
+  ocsinventory is a metapackage that will install the communication server,
+  the administration console and the database server (MySQL).
+
+
+  Affected Software/OS:
+  ocsinventory on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069293.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of ocsinventory");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"ocsinventory", rpm:"ocsinventory~1.3.3~5.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15007_ocsinventory_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15071_cacti_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15071_cacti_fc15.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15071_cacti_fc15.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for cacti FEDORA-2011-15071
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863615);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:47:59 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15071");
+  script_name("Fedora Update for cacti FEDORA-2011-15071");
+  desc = "
+
+  Vulnerability Insight:
+  Cacti is a complete frontend to RRDTool. It stores all of the
+  necessary information to create graphs and populate them with
+  data in a MySQL database. The frontend is completely PHP
+  driven. Along with being able to maintain graphs, data
+  sources, and round robin archives in a database, Cacti also
+  handles the data gathering. There is SNMP support for those
+  used to creating traffic graphs with MRTG.
+
+
+  Affected Software/OS:
+  cacti on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069141.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of cacti");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"cacti", rpm:"cacti~0.8.7h~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15071_cacti_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15110_cacti_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15110_cacti_fc14.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15110_cacti_fc14.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for cacti FEDORA-2011-15110
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863618);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:48:03 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15110");
+  script_name("Fedora Update for cacti FEDORA-2011-15110");
+  desc = "
+
+  Vulnerability Insight:
+  Cacti is a complete frontend to RRDTool. It stores all of the
+  necessary information to create graphs and populate them with
+  data in a MySQL database. The frontend is completely PHP
+  driven. Along with being able to maintain graphs, data
+  sources, and round robin archives in a database, Cacti also
+  handles the data gathering. There is SNMP support for those
+  used to creating traffic graphs with MRTG.
+
+
+  Affected Software/OS:
+  cacti on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069137.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of cacti");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"cacti", rpm:"cacti~0.8.7h~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15110_cacti_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15469_phpMyAdmin_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15469_phpMyAdmin_fc15.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15469_phpMyAdmin_fc15.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for phpMyAdmin FEDORA-2011-15469
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863617);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:48:00 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-15469");
+  script_cve_id("CVE-2011-3646", "CVE-2011-4064");
+  script_name("Fedora Update for phpMyAdmin FEDORA-2011-15469");
+  desc = "
+
+  Vulnerability Insight:
+  phpMyAdmin is a tool written in PHP intended to handle the administration of
+  MySQL over the World Wide Web. Most frequently used operations are supported
+  by the user interface (managing databases, tables, fields, relations, indexes,
+  users, permissions), while you still have the ability to directly execute any
+  SQL statement.
+
+  Features include an intuitive web interface, support for most MySQL features
+  (browse and drop databases, tables, views, fields and indexes, create, copy,
+  drop, rename and alter databases, tables, fields and indexes, maintenance
+  server, databases and tables, with proposals on server configuration, execute,
+  edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
+  and privileges, manage stored procedures and triggers), import data from CSV
+  and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
+  and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
+  creating PDF graphics of your database layout, creating complex queries using
+  Query-by-example (QBE), searching globally in a database or a subset of it,
+  transforming stored data into any format using a set of predefined functions,
+  like displaying BLOB-data as image or download-link and much more...
+
+
+  Affected Software/OS:
+  phpMyAdmin on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069237.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of phpMyAdmin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"phpMyAdmin", rpm:"phpMyAdmin~3.4.7~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15469_phpMyAdmin_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15472_phpMyAdmin_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15472_phpMyAdmin_fc14.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15472_phpMyAdmin_fc14.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for phpMyAdmin FEDORA-2011-15472
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863619);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:48:03 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-15472");
+  script_cve_id("CVE-2011-3646", "CVE-2011-4064");
+  script_name("Fedora Update for phpMyAdmin FEDORA-2011-15472");
+  desc = "
+
+  Vulnerability Insight:
+  phpMyAdmin is a tool written in PHP intended to handle the administration of
+  MySQL over the World Wide Web. Most frequently used operations are supported
+  by the user interface (managing databases, tables, fields, relations, indexes,
+  users, permissions), while you still have the ability to directly execute any
+  SQL statement.
+
+  Features include an intuitive web interface, support for most MySQL features
+  (browse and drop databases, tables, views, fields and indexes, create, copy,
+  drop, rename and alter databases, tables, fields and indexes, maintenance
+  server, databases and tables, with proposals on server configuration, execute,
+  edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
+  and privileges, manage stored procedures and triggers), import data from CSV
+  and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
+  and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
+  creating PDF graphics of your database layout, creating complex queries usi=
+  ng Query-by-example (QBE), searching globally in a database or a subset of it,
+  transforming stored data into any format using a set of predefined functions,
+  like displaying BLOB-data as image or download-link and much more...
+
+
+  Affected Software/OS:
+  phpMyAdmin on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069234.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of phpMyAdmin");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"phpMyAdmin", rpm:"phpMyAdmin~3.4.7~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15472_phpMyAdmin_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_170.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_170.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_170.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,215 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for java-1.6.0-openjdk MDVSA-2011:170 (java-1.6.0-openjdk)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831493);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:49:09 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "MDVSA", value: "2011:170");
+  script_cve_id("CVE-2011-3547", "CVE-2011-3548", "CVE-2011-3551", "CVE-2011-3552",
+                "CVE-2011-3553", "CVE-2011-3544", "CVE-2011-3521", "CVE-2011-3554",
+                "CVE-2011-3389", "CVE-2011-3558", "CVE-2011-3556", "CVE-2011-3557",
+                "CVE-2011-3560", "CVE-2011-3377");
+  script_name("Mandriva Update for java-1.6.0-openjdk MDVSA-2011:170 (java-1.6.0-openjdk)");
+  desc = "
+
+  Vulnerability Insight:
+
+  Security issues were identified and fixed in openjdk (icedtea6)
+  and icedtea-web:
+
+  IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start
+  applications and untrusted Java applets to affect confidentiality
+  via unknown vectors related to Networking (CVE-2011-3547).
+
+  IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start
+  applications and untrusted Java applets to affect confidentiality,
+  integrity, and availability, related to AWT (CVE-2011-3548).
+
+  IcedTea6 prior to 1.10.4 allows remote attackers to affect
+  confidentiality, integrity, and availability via unknown vectors
+  related to 2D (CVE-2011-3551).
+
+  IcedTea6 prior to 1.10.4 allows remote attackers to affect integrity
+  via unknown vectors related to Networking (CVE-2011-3552).
+
+  IcedTea6 prior to 1.10.4 allows remote authenticated users to affect
+  confidentiality, related to JAXWS (CVE-2011-3553).
+
+  IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start
+  applications and untrusted Java applets to affect confidentiality,
+  integrity, and availability via unknown vectors related to Scripting
+  (CVE-2011-3544).
+
+  IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start
+  applications and untrusted Java applets to affect confidentiality,
+  integrity, and availability via unknown vectors related to
+  Deserialization (CVE-2011-3521).
+
+  IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start
+  applications and untrusted Java applets to affect confidentiality,
+  integrity, and availability via unknown vectors (CVE-2011-3554).
+
+  A flaw was found in the way the SSL 3 and TLS 1.0 protocols used
+  block ciphers in cipher-block chaining (CBC) mode. An attacker able
+  to perform a chosen plain text attack against a connection mixing
+  trusted and untrusted data could use this flaw to recover portions
+  of the trusted data sent over the connection (CVE-2011-3389).
+
+  Note: This update mitigates the CVE-2011-3389 issue by splitting
+  the first application data record byte to a separate SSL/TLS
+  protocol record. This mitigation may cause compatibility issues
+  with some SSL/TLS implementations and can be disabled using the
+  jsse.enableCBCProtection boolean property. This can be done on the
+  command line by appending the flag -Djsse.enableCBCProtection=false
+  to the java command.
+
+  IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start
+  applications and untrusted Java applets to affect confidentiality
+  via unknown vectors related to Hot ...
+
+  Description truncated, for more information please check the Reference URL
+
+  Affected Software/OS:
+  java-1.6.0-openjdk on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00014.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of java-1.6.0-openjdk");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"icedtea-web", rpm:"icedtea-web~1.0.6~0.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-1.6.0.0", rpm:"java-1.6.0-openjdk-1.6.0.0~24.b22.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-demo", rpm:"java-1.6.0-openjdk-demo~1.6.0.0~24.b22.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-devel", rpm:"java-1.6.0-openjdk-devel~1.6.0.0~24.b22.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-javadoc", rpm:"java-1.6.0-openjdk-javadoc~1.6.0.0~24.b22.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-src", rpm:"java-1.6.0-openjdk-src~1.6.0.0~24.b22.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"icedtea-web", rpm:"icedtea-web~1.0.6~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk", rpm:"java-1.6.0-openjdk~1.6.0.0~24.b22.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-demo", rpm:"java-1.6.0-openjdk-demo~1.6.0.0~24.b22.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-devel", rpm:"java-1.6.0-openjdk-devel~1.6.0.0~24.b22.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-javadoc", rpm:"java-1.6.0-openjdk-javadoc~1.6.0.0~24.b22.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"java-1.6.0-openjdk-src", rpm:"java-1.6.0-openjdk-src~1.6.0.0~24.b22.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_170.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_173.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_173.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_173.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for openssl0.9.8 MDVSA-2011:173 (openssl0.9.8)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831492);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 10:49:09 +0530 (Mon, 14 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVSA", value: "2011:173");
+  script_name("Mandriva Update for openssl0.9.8 MDVSA-2011:173 (openssl0.9.8)");
+  desc = "
+
+  Vulnerability Insight:
+  On Mandriva Linux 2010.2 we provided the old openssl 0.9.8 library
+  but without a source RPM file. This could pose a security risk for
+  third party commercial applications that still uses the older OpenSSL
+  library, therefore the latest stable openssl 0.9.8r library is being
+  provided.
+
+  Affected Software/OS:
+  openssl0.9.8 on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00021.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of openssl0.9.8");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"libopenssl0.9.8", rpm:"libopenssl0.9.8~0.9.8r~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"openssl0.9.8", rpm:"openssl0.9.8~0.9.8r~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64openssl0.9.8", rpm:"lib64openssl0.9.8~0.9.8r~0.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_173.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl	2011-11-14 13:23:59 UTC (rev 12111)
+++ trunk/openvas-plugins/scripts/gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl	2011-11-14 14:52:06 UTC (rev 12112)
@@ -0,0 +1,93 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl 18472 2011-11-11 12:40:05Z nov $
+#
+# MS Windows Fraudulent Digital Certificates Spoofing Vulnerability (2641690)
+#
+# Authors:
+# Antu Sanadi <santu at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802403);
+  script_version("$Revision$");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-11 12:04:44 +0530 (Fri, 11 Nov 2011)");
+  script_name("MS Windows Fraudulent Digital Certificates Spoofing Vulnerability (2641690)");
+  desc = "
+  Overview: The host is installed with Microsoft Windows operating system and
+  is prone to spoofing vulnerability.
+
+  Vulnerability Insight:
+  The flaw is caused due to an error when handling the fraudulent digital
+  certificates issued by Entrust and GTE CyberTrust. It is not properly
+  validating its identity.
+
+  Impact:
+  Successful exploitation will allow remote attackers to spoof content, perform
+  phishing attacks or perform man-in-the-middle attacks against all Web browser
+  users including users of Internet Explorer.
+
+  Impact Level: System
+
+  Affected Software/OS:
+  Windows 7 Service Pack 1 and prior
+  Windows XP Service Pack 3 and prior
+  Windows Vista Service Pack 2 and prior
+  Windows Server 2003 Service Pack 2 and prior
+  Windows Server 2008 Service Pack 2 and prior
+
+  Fix: Apply the Patch from below link,
+  For updates refer, http://support.microsoft.com/kb/2641690
+
+  References:
+  http://support.microsoft.com/kb/2641690
+  http://support.microsoft.com/kb/294871
+  http://technet.microsoft.com/en-us/security/advisory/2641690 ";
+
+  script_description(desc);
+  script_summary("Check for the Microsoft Windows Patch");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Windows");
+  script_dependencies("secpod_reg_enum.nasl");
+  exit(0);
+}
+
+
+include("smb_nt.inc");
+include("secpod_reg.inc");
+
+## Confirm Windows
+if(!get_kb_item("SMB/WindowsVersion")){
+  exit(0);
+}
+
+## Check for OS and Service Pack
+if(hotfix_check_sp(xp:4, win2003:3, winVista:3, win2008:3, win7:2) <= 0){
+  exit(0);
+}
+
+## Check Hotfix 2641690
+if((hotfix_missing(name:"2641690") == 1)){
+  security_warning(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_ms_fraudulent_digital_cert_spoofing_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date



More information about the Openvas-commits mailing list