[Openvas-commits] r12134 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Nov 18 10:15:18 CET 2011


Author: antu123
Date: 2011-11-18 10:15:11 +0100 (Fri, 18 Nov 2011)
New Revision: 12134

Added:
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1455-01_freetype.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1458-01_bind.nasl
   trunk/openvas-plugins/scripts/gb_RHSA-2011_1459-01_bind97.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_14650_krb5_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_14673_krb5_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15233_squid_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15256_squid_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15328_wireshark_fc15.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15338_wireshark_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_15856_kernel_fc15.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_175.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176_1.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_win.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl
   trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1261_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1263_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1264_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1265_1.nasl
   trunk/openvas-plugins/scripts/gb_ubuntu_USN_1266_1.nasl
   trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_herberlin_bremsserver_dir_trav_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_wordpress_mult_plugins_sql_inj_vuln.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_detect.nasl
Log:
Added new plugins, Auto generated plugins, Updated detect

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/ChangeLog	2011-11-18 09:15:11 UTC (rev 12134)
@@ -1,3 +1,44 @@
+2011-11-18  Antu Sanadi <santu at secpod.com>
+
+	* scripts/gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl,
+	scripts/gb_mozilla_prdts_mult_vuln_nov11_win.nasl,
+	scripts/gb_mozilla_prdts_priv_esc_vuln_win.nasl,
+	scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl,
+	scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl,
+	scripts/gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl,
+	scripts/gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl,
+	scripts/gb_mozilla_prdts_priv_esc_vuln_macosx.nasl,
+	scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl,
+	scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl,
+	scripts/secpod_ocs_inventory_ng_xss_vuln.nasl,
+	scripts/secpod_wordpress_mult_plugins_sql_inj_vuln.nasl,
+	scripts/secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl,
+	scripts/secpod_herberlin_bremsserver_dir_trav_vuln.nasl:
+	Added new plugins.
+
+	* scripts/secpod_ocs_inventory_ng_detect.nasl:
+	Updated regex to detect new versions.
+
+	* scripts/gb_fedora_2011_14650_krb5_fc14.nasl,
+	scripts/gb_fedora_2011_15338_wireshark_fc14.nasl,
+	scripts/gb_RHSA-2011_1455-01_freetype.nasl,
+	scripts/gb_ubuntu_USN_1264_1.nasl,
+	scripts/gb_fedora_2011_14673_krb5_fc15.nasl,
+	scripts/gb_fedora_2011_15856_kernel_fc15.nasl,
+	scripts/gb_RHSA-2011_1458-01_bind.nasl,
+	scripts/gb_ubuntu_USN_1265_1.nasl,
+	scripts/gb_fedora_2011_15233_squid_fc15.nasl,
+	scripts/gb_mandriva_MDVSA_2011_175.nasl,
+	scripts/gb_RHSA-2011_1459-01_bind97.nasl,
+	scripts/gb_ubuntu_USN_1266_1.nasl,
+	scripts/gb_fedora_2011_15256_squid_fc14.nasl,
+	scripts/gb_mandriva_MDVSA_2011_176_1.nasl,
+	scripts/gb_ubuntu_USN_1261_1.nasl,
+	scripts/gb_fedora_2011_15328_wireshark_fc15.nasl,
+	scripts/gb_mandriva_MDVSA_2011_176.nasl,
+	scripts/gb_ubuntu_USN_1263_1.nasl:
+	Added new auto generated plugins.
+
 2011-11-17  Jan-Oliver Wagner <jan-oliver.wagner at greenbone.net>
 
 	* scripts/account_db2inst1_db2inst1.nasl, scripts/zope_zclass.nasl,

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1455-01_freetype.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1455-01_freetype.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1455-01_freetype.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,157 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for freetype RHSA-2011:1455-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870517);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:45:26 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "RHSA", value: "2011:1455-01");
+  script_cve_id("CVE-2011-3439");
+  script_name("RedHat Update for freetype RHSA-2011:1455-01");
+  desc = "
+
+  Vulnerability Insight:
+  FreeType is a free, high-quality, portable font engine that can open and
+  manage font files. It also loads, hints, and renders individual glyphs
+  efficiently. The freetype packages for Red Hat Enterprise Linux 4 provide
+  both the FreeType 1 and FreeType 2 font engines. The freetype packages for
+  Red Hat Enterprise Linux 5 and 6 provide only the FreeType 2 font engine.
+
+  Multiple input validation flaws were found in the way FreeType processed
+  CID-keyed fonts. If a specially-crafted font file was loaded by an
+  application linked against FreeType, it could cause the application to
+  crash or, potentially, execute arbitrary code with the privileges of the
+  user running the application. (CVE-2011-3439)
+
+  Note: These issues only affected the FreeType 2 font engine.
+
+  Users are advised to upgrade to these updated packages, which contain a
+  backported patch to correct these issues. The X server must be restarted
+  (log out, then log back in) for this update to take effect.
+
+
+  Affected Software/OS:
+  freetype on Red Hat Enterprise Linux (v. 5 server),
+  Red Hat Enterprise Linux AS version 4,
+  Red Hat Enterprise Linux ES version 4,
+  Red Hat Enterprise Linux WS version 4
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00013.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of freetype");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"freetype", rpm:"freetype~2.2.1~28.el5_7.2", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-debuginfo", rpm:"freetype-debuginfo~2.2.1~28.el5_7.2", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-demos", rpm:"freetype-demos~2.2.1~28.el5_7.2", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-devel", rpm:"freetype-devel~2.2.1~28.el5_7.2", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "RHENT_4")
+{
+
+  if(isrpmvuln(pkg:"freetype", rpm:"freetype~2.1.9~21.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-debuginfo", rpm:"freetype-debuginfo~2.1.9~21.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-demos", rpm:"freetype-demos~2.1.9~21.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-devel", rpm:"freetype-devel~2.1.9~21.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"freetype-utils", rpm:"freetype-utils~2.1.9~21.el4", rls:"RHENT_4"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1455-01_freetype.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1458-01_bind.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1458-01_bind.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1458-01_bind.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,142 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for bind RHSA-2011:1458-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870515);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:45:23 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1458-01");
+  script_cve_id("CVE-2011-4313");
+  script_name("RedHat Update for bind RHSA-2011:1458-01");
+  desc = "
+
+  Vulnerability Insight:
+  The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
+  Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
+  library (routines for applications to use when interfacing with DNS); and
+  tools for verifying that the DNS server is operating correctly.
+
+  A flaw was discovered in the way BIND handled certain DNS queries, which
+  caused it to cache an invalid record. A remote attacker could use this
+  flaw to send repeated queries for this invalid record, causing the
+  resolvers to exit unexpectedly due to a failed assertion. (CVE-2011-4313)
+
+  Users of bind are advised to upgrade to these updated packages, which
+  resolve this issue. After installing the update, the BIND daemon (named)
+  will be restarted automatically.
+
+
+  Affected Software/OS:
+  bind on Red Hat Enterprise Linux (v. 5 server)
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00015.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-chroot", rpm:"bind-chroot~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-debuginfo", rpm:"bind-debuginfo~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-libbind-devel", rpm:"bind-libbind-devel~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-libs", rpm:"bind-libs~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-sdb", rpm:"bind-sdb~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"caching-nameserver", rpm:"caching-nameserver~9.3.6~16.P1.el5_7.1", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1458-01_bind.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_RHSA-2011_1459-01_bind97.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_RHSA-2011_1459-01_bind97.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_RHSA-2011_1459-01_bind97.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,124 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for bind97 RHSA-2011:1459-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(870516);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:45:25 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "RHSA", value: "2011:1459-01");
+  script_cve_id("CVE-2011-4313");
+  script_name("RedHat Update for bind97 RHSA-2011:1459-01");
+  desc = "
+
+  Vulnerability Insight:
+  The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
+  Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
+  library (routines for applications to use when interfacing with DNS); and
+  tools for verifying that the DNS server is operating correctly.
+  
+  A flaw was discovered in the way BIND handled certain DNS queries, which
+  caused it to cache an invalid record. A remote attacker could use this
+  flaw to send repeated queries for this invalid record, causing the
+  resolvers to exit unexpectedly due to a failed assertion. (CVE-2011-4313)
+  
+  Users of bind97 are advised to upgrade to these updated packages, which
+  resolve this issue. After installing the update, the BIND daemon (named)
+  will be restarted automatically.
+
+
+  Affected Software/OS:
+  bind97 on Red Hat Enterprise Linux (v. 5 server)
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://www.redhat.com/archives/rhsa-announce/2011-November/msg00016.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind97");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_5")
+{
+
+  if(isrpmvuln(pkg:"bind97", rpm:"bind97~9.7.0~6.P2.el5_7.4", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind97-chroot", rpm:"bind97-chroot~9.7.0~6.P2.el5_7.4", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind97-debuginfo", rpm:"bind97-debuginfo~9.7.0~6.P2.el5_7.4", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind97-devel", rpm:"bind97-devel~9.7.0~6.P2.el5_7.4", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind97-libs", rpm:"bind97-libs~9.7.0~6.P2.el5_7.4", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind97-utils", rpm:"bind97-utils~9.7.0~6.P2.el5_7.4", rls:"RHENT_5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
\ No newline at end of file


Property changes on: trunk/openvas-plugins/scripts/gb_RHSA-2011_1459-01_bind97.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_14650_krb5_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_14650_krb5_fc14.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_14650_krb5_fc14.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for krb5 FEDORA-2011-14650
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863620);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:44:21 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "FEDORA", value: "2011-14650");
+  script_cve_id("CVE-2011-1527", "CVE-2011-1528", "CVE-2011-1529", "CVE-2010-1322",
+                "CVE-2011-0285", "CVE-2011-0284", "CVE-2010-4022", "CVE-2011-0281",
+                "CVE-2011-0282", "CVE-2010-1323", "CVE-2010-1324", "CVE-2010-4020",
+                "CVE-2011-41");
+  script_name("Fedora Update for krb5 FEDORA-2011-14650");
+  desc = "
+  Vulnerability Insight:
+  Kerberos V5 is a trusted-third-party network authentication system,
+  which can improve your network's security by eliminating the insecure
+  practice of cleartext passwords.
+
+
+  Affected Software/OS:
+  krb5 on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069381.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of krb5");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"krb5", rpm:"krb5~1.8.4~3.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_14650_krb5_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_14673_krb5_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_14673_krb5_fc15.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_14673_krb5_fc15.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for krb5 FEDORA-2011-14673
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863621);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:44:43 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "FEDORA", value: "2011-14673");
+  script_cve_id("CVE-2011-1527", "CVE-2011-1528", "CVE-2011-1529", "CVE-2010-4022",
+                "CVE-2011-0281", "CVE-2011-0282", "CVE-2011-0283", "CVE-2011-0284",
+                 "CVE-2011-0285", "CVE-2011-41");
+  script_name("Fedora Update for krb5 FEDORA-2011-14673");
+  desc = "
+  Vulnerability Insight:
+  Kerberos V5 is a trusted-third-party network authentication system,
+  which can improve your network's security by eliminating the insecure
+  practice of cleartext passwords.
+
+  Affected Software/OS:
+  krb5 on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069354.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of krb5");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"krb5", rpm:"krb5~1.9.1~14.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_14673_krb5_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15233_squid_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15233_squid_fc15.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15233_squid_fc15.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,89 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for squid FEDORA-2011-15233
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863626);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:45:12 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15233");
+  script_cve_id("CVE-2011-4096");
+  script_name("Fedora Update for squid FEDORA-2011-15233");
+  desc = "
+  Vulnerability Insight:
+  Squid is a high-performance proxy caching server for Web clients,
+  supporting FTP, gopher, and HTTP data objects. Unlike traditional
+  caching software, Squid handles all requests in a single,
+  non-blocking, I/O-driven process. Squid keeps meta data and especially
+  hot objects cached in RAM, caches DNS lookups, supports non-blocking
+  DNS lookups, and implements negative caching of failed requests.
+
+  Squid consists of a main server program squid, a Domain Name System
+  lookup program (dnsserver), a program for retrieving FTP data
+  (ftpget), and some management and client tools.
+
+  Affected Software/OS:
+  squid on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069405.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of squid");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"squid", rpm:"squid~3.1.16~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15233_squid_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15256_squid_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15256_squid_fc14.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15256_squid_fc14.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for squid FEDORA-2011-15256
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863624);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:44:59 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15256");
+  script_cve_id("CVE-2011-4096");
+  script_name("Fedora Update for squid FEDORA-2011-15256");
+  desc = "
+
+  Vulnerability Insight:
+  Squid is a high-performance proxy caching server for Web clients,
+  supporting FTP, gopher, and HTTP data objects. Unlike traditional
+  caching software, Squid handles all requests in a single,
+  non-blocking, I/O-driven process. Squid keeps meta data and especially
+  hot objects cached in RAM, caches DNS lookups, supports non-blocking
+  DNS lookups, and implements negative caching of failed requests.
+
+  Squid consists of a main server program squid, a Domain Name System
+  lookup program (dnsserver), a program for retrieving FTP data
+  (ftpget), and some management and client tools.
+
+  Affected Software/OS:
+  squid on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069398.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of squid");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"squid", rpm:"squid~3.1.16~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15256_squid_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15328_wireshark_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15328_wireshark_fc15.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15328_wireshark_fc15.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for wireshark FEDORA-2011-15328
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863622);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:44:58 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15328");
+  script_name("Fedora Update for wireshark FEDORA-2011-15328");
+  desc = "
+
+  Vulnerability Insight:
+  Wireshark is a network traffic analyzer for Unix-ish operating systems.
+
+  This package lays base for libpcap, a packet capture and filtering
+  library, contains command-line utilities, contains plugins and
+  documentation for wireshark. A graphical user interface is packaged
+  separately to GTK+ package.
+
+  Affected Software/OS:
+  wireshark on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069299.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of wireshark");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.4.10~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15328_wireshark_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15338_wireshark_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15338_wireshark_fc14.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15338_wireshark_fc14.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for wireshark FEDORA-2011-15338
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863623);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:44:59 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15338");
+  script_name("Fedora Update for wireshark FEDORA-2011-15338");
+  desc = "
+
+  Vulnerability Insight:
+  Wireshark is a network traffic analyzer for Unix-ish operating systems.
+
+  This package lays base for libpcap, a packet capture and filtering
+  library, contains command-line utilities, contains plugins and
+  documentation for wireshark. A graphical user interface is packaged
+  separately to GTK+ package.
+
+  Affected Software/OS:
+  wireshark on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069325.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of wireshark");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"wireshark", rpm:"wireshark~1.4.10~1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15338_wireshark_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15856_kernel_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15856_kernel_fc15.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15856_kernel_fc15.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for kernel FEDORA-2011-15856
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863625);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:45:00 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.9");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-15856");
+  script_cve_id("CVE-2011-4097", "CVE-2011-4077", "CVE-2011-3347", "CVE-2011-1083",
+                "CVE-2011-1161", "CVE-2011-1162", "CVE-2011-3191", "CVE-2011-2905");
+  script_name("Fedora Update for kernel FEDORA-2011-15856");
+  desc = "
+
+  Vulnerability Insight:
+  The kernel package contains the Linux kernel (vmlinuz), the core of any
+  Linux operating system.  The kernel handles the basic functions
+  of the operating system: memory allocation, process allocation, device
+  input and output, etc.
+
+
+  Affected Software/OS:
+  kernel on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069394.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of kernel");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"kernel", rpm:"kernel~2.6.41.1~1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15856_kernel_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_175.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_175.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_175.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,237 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for poppler MDVSA-2011:175 (poppler)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831494);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:47:30 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "MDVSA", value: "2011:175");
+  script_cve_id("CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180",
+                "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183", "CVE-2009-1187",
+                "CVE-2009-1188", "CVE-2009-3603", "CVE-2009-3604", "CVE-2009-0791",
+                "CVE-2009-3605", "CVE-2009-3606", "CVE-2009-3607", "CVE-2009-3608",
+                "CVE-2009-3609", "CVE-2009-3938");
+  script_name("Mandriva Update for poppler MDVSA-2011:175 (poppler)");
+  desc = "
+
+  Vulnerability Insight:
+
+  Multiple security vulnerabilities has been discovered and corrected
+  in poppler:
+
+  An out-of-bounds reading flaw in the JBIG2 decoder allows remote
+  attackers to cause a denial of service (crash) via a crafted PDF file
+  (CVE-2009-0799).
+
+  Multiple input validation flaws in the JBIG2 decoder allows
+  remote attackers to execute arbitrary code via a crafted PDF file
+  (CVE-2009-0800).
+
+  An integer overflow in the JBIG2 decoder allows remote attackers to
+  execute arbitrary code via a crafted PDF file (CVE-2009-1179).
+
+  A free of invalid data flaw in the JBIG2 decoder allows remote
+  attackers to execute arbitrary code via a crafted PDF (CVE-2009-1180).
+
+  A NULL pointer dereference flaw in the JBIG2 decoder allows remote
+  attackers to cause denial of service (crash) via a crafted PDF file
+  (CVE-2009-1181).
+
+  Multiple buffer overflows in the JBIG2 MMR decoder allows remote
+  attackers to cause denial of service or to execute arbitrary code
+  via a crafted PDF file (CVE-2009-1182, CVE-2009-1183).
+
+  An integer overflow in the JBIG2 decoding feature allows remote
+  attackers to cause a denial of service (crash) and possibly execute
+  arbitrary code via vectors related to CairoOutputDev (CVE-2009-1187).
+
+  An integer overflow in the JBIG2 decoding feature allows remote
+  attackers to execute arbitrary code or cause a denial of service
+  (application crash) via a crafted PDF document (CVE-2009-1188).
+
+  Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x
+  before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers
+  to execute arbitrary code via a crafted PDF document that triggers a
+  heap-based buffer overflow.  NOTE: some of these details are obtained
+  from third party information.  NOTE: this issue reportedly exists
+  because of an incomplete fix for CVE-2009-1188 (CVE-2009-3603).
+
+  The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x
+  before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF,
+  does not properly allocate memory, which allows remote attackers to
+  cause a denial of service (application crash) or possibly execute
+  arbitrary code via a crafted PDF document that triggers a NULL pointer
+  dereference or a heap-based buffer overflow (CVE-2009-3604).
+
+  Multiple integer overflows allow remote attackers to cause a denial
+  of service (application crash) or possibly execute arbitrary code
+  via a crafted PDF file, related to (1) glib/poppler-page.cc; (2)
+  ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5)
+  JBIG2Stream.cc, (6) PSO ...
+
+  Description truncated, for more information please check the Reference URL
+
+  Affected Software/OS:
+  poppler on Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00029.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of poppler");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"libpoppler3", rpm:"libpoppler3~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-devel", rpm:"libpoppler-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-glib3", rpm:"libpoppler-glib3~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-glib-devel", rpm:"libpoppler-glib-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-qt2", rpm:"libpoppler-qt2~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-qt4-3", rpm:"libpoppler-qt4-3~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-qt4-devel", rpm:"libpoppler-qt4-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"libpoppler-qt-devel", rpm:"libpoppler-qt-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"poppler", rpm:"poppler~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler3", rpm:"lib64poppler3~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-devel", rpm:"lib64poppler-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-glib3", rpm:"lib64poppler-glib3~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-glib-devel", rpm:"lib64poppler-glib-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-qt2", rpm:"lib64poppler-qt2~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-qt4-3", rpm:"lib64poppler-qt4-3~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-qt4-devel", rpm:"lib64poppler-qt4-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"lib64poppler-qt-devel", rpm:"lib64poppler-qt-devel~0.8.7~2.5mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_175.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,139 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for bind MDVSA-2011:176 (bind)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831495);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:48:13 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVSA", value: "2011:176");
+  script_cve_id("CVE-2011-4313");
+  script_name("Mandriva Update for bind MDVSA-2011:176 (bind)");
+  desc = "
+
+  Vulnerability Insight:
+  A vulnerability was discovered and corrected in bind:
+  Cache lookup could return RRSIG data associated with nonexistent
+  records, leading to an assertion failure. [ISC RT #26590]
+  (CVE-2011-4313).
+
+  The updated packages have been upgraded to bind 9.7.4-P1 and 9.8.1-P1
+  which is not vulnerable to this issue.
+
+  Affected Software/OS:
+  bind on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00030.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.7.4~0.0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.7.4~0.0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.7.4~0.0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.7.4~0.0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.7.4~0.0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.7.4~0.0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.7.4~0.0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.7.4~0.0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176_1.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176_1.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,146 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for bind MDVSA-2011:176-1 (bind)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831496);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:48:14 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "MDVSA", value: "2011:176-1");
+  script_cve_id("CVE-2011-4313");
+  script_name("Mandriva Update for bind MDVSA-2011:176-1 (bind)");
+  desc = "
+
+  Vulnerability Insight:
+  A vulnerability was discovered and corrected in bind:
+  Cache lookup could return RRSIG data associated with nonexistent
+  records, leading to an assertion failure. [ISC RT #26590]
+  (CVE-2011-4313).
+
+  The updated packages have been upgraded to bind 9.7.4-P1 and 9.8.1-P1
+  which is not vulnerable to this issue.
+
+  Update:
+  Packages provided for Mandriva Enterprise Server 5.2 and Mandriva
+  Linux 2010.2 with the MDVSA-2011:176 advisory had a faulty release
+  number effectively preventing installation without excessive force
+  due to a previous packaging mistake. This advisory provides corrected
+  packages to address the problem.
+
+  Affected Software/OS:
+  bind on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00031.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.7.4~0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.7.4~0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.7.4~0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.7.4~0.P1.1.1mdvmes5.2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.7.4~0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-devel", rpm:"bind-devel~9.7.4~0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-doc", rpm:"bind-doc~9.7.4~0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"bind-utils", rpm:"bind-utils~9.7.4~0.P1.1.1mdv2010.2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_176_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl 18467 2011-11-11 13:42:01Z nov $
+#
+# Mozilla Products Browser Engine Denial of Service Vulnerabilities (Windows)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802510);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3654", "CVE-2011-3652");
+  script_bugtraq_id(50602, 50600);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-11 13:42:01 +0530 (Fri, 11 Nov 2011)");
+  script_name("Mozilla Products Browser Engine Denial of Service Vulnerabilities (Windows)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to denial of service vulnerability.
+
+  Vulnerability Insight:
+  The flaws are caused due to error in browser engine
+  - Fails to properly handle links from SVG mpath elements to non-SVG elements.
+  - Fails to properly allocate memory.
+
+  Impact:
+  Successful exploitation will let attackers to cause a denial of service and
+  execute arbitrary code via unspecified vectors.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version prior to 8.0
+  Mozilla Firefox version prior to 8.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-48.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Denial of Service");
+  script_dependencies("gb_firefox_detect_win.nasl",
+                      "gb_thunderbird_detect_win.nasl");
+  script_require_keys("Firefox/Win/Ver", "Thunderbird/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Firefox/Win/Ver");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_less(version:ffVer, test_version:"8.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("Thunderbird/Win/Ver");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_less(version:tbVer, test_version:"8.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_browser_engine_dos_vuln_win.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,98 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl 18467 2011-11-14 13:12:46Z nov $
+#
+# Mozilla Products Multiple Unspecified Vulnerabilities (MAC OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802515);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3651");
+  script_bugtraq_id(50597);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 13:12:46 +0530 (Mon, 14 Nov 2011)");
+  script_name("Mozilla Products Multiple Unspecified Vulnerabilities (MAC OS X");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  The flaws are caused due to unspecified errors in the browser engine.
+
+  Impact:
+  Successful exploitation will let attackers to cause denial of service and
+  execute arbitrary code via unspecified vectors.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version 7.0
+  Mozilla Firefox version 7.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-48.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
+  script_require_keys("ThunderBird/MacOSX/Version",
+                        "Mozilla/Firefox/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Mozilla/Firefox/MacOSX/Version");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_equal(version:ffVer, test_version:"7.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("ThunderBird/MacOSX/Version");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_equal(version:tbVer, test_version:"7.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_unspecified_vuln_macosx.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,103 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl 18467 2011-11-14 12:41:48Z nov $
+#
+# Mozilla Products Multiple Vulnerabilities (MAC OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802514);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3654", "CVE-2011-3653", "CVE-2011-3652");
+  script_bugtraq_id(50602, 50592, 50600);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 12:41:48 +0530 (Mon, 14 Nov 2011)");
+  script_name("Mozilla Products Multiple Vulnerabilities (MAC OS X)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  The flaws are caused due to
+  - Error in browser engine, which fails to properly handle links from SVG
+    mpath elements to non-SVG elements.
+  - Error in browser engine, which fails to properly allocate memory.
+  - Not properly interacting with the GPU memory behavior of a certain driver
+    for Intel integrated GPUs.
+
+  Impact:
+  Successful exploitation will let attackers to cause a denial of service and
+  execute arbitrary code via unspecified vectors.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version prior to 8.0
+  Mozilla Firefox version prior to 8.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-48.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
+  script_require_keys("Mozilla/Firefox/MacOSX/Version",
+                  "ThunderBird/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Mozilla/Firefox/MacOSX/Version");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_less(version:ffVer, test_version:"8.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("ThunderBird/MacOSX/Version");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_less(version:tbVer, test_version:"8.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_macosx.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_win.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_win.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,101 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_mult_vuln_nov11_win.nasl 18467 2011-11-11 15:10:19Z nov $
+#
+# Mozilla Products Multiple Vulnerabilities (Windows)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802511);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3651", "CVE-2011-3649");
+  script_bugtraq_id(50597, 50591);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-11 15:10:19 +0530 (Fri, 11 Nov 2011)");
+  script_name("Mozilla Products Multiple Vulnerabilities (Windows)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to multiple vulnerabilities.
+
+  Vulnerability Insight:
+  The flaws are caused due to,
+  - unspecified erros in the browser engine.
+  - Direct2D (aka D2D) API is used in conjunction with the Azure graphics
+    back-end on windows.
+
+  Impact:
+  Successful exploitation will let attackers to cause denial of service and
+  execute arbitrary code via unspecified vectors.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version 7.0
+  Mozilla Firefox version 7.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-50.html
+  http://www.mozilla.org/security/announce/2011/mfsa2011-48.html ";
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("gb_firefox_detect_win.nasl",
+                      "gb_thunderbird_detect_win.nasl");
+  script_require_keys("Firefox/Win/Ver", "Thunderbird/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Firefox/Win/Ver");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_equal(version:ffVer, test_version:"7.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("Thunderbird/Win/Ver");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_equal(version:tbVer, test_version:"7.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_nov11_win.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_macosx.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_macosx.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_priv_esc_vuln_macosx.nasl 18467 2011-11-14 11:44:10Z nov $
+#
+# Mozilla Products Privilege Escalation Vulnerability (MAC OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802512);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3647");
+  script_bugtraq_id(50589);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"$2011-11-14 11:44:10 +0530 (Mon, 14 Nov 2011)$");
+  script_name("Mozilla Products Privilege Escalation Vulnerabily (MAC OS X)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to privilege escalation vulnerability.
+
+  Vulnerability Insight:
+  The flaws are caused due to,
+  - Error in JSSubScriptLoader, which fails to handle XPCNativeWrappers during
+    calls to the loadSubScript method in an add-on.
+
+  Impact:
+  Successful exploitation will let attackers to gain privileges via a crafted
+  web site that leverages certain unwrapping behavior.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version prior to 3.1.16
+  Mozilla Firefox version prior to 3.6.24
+
+  Fix: Upgrade to Mozilla Firefox version 3.6.24 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 3.1.16 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-46.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Privilege escalation");
+  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
+  script_require_keys("Mozilla/Firefox/MacOSX/Version",
+                                "ThunderBird/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Mozilla/Firefox/MacOSX/Version");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_less(version:ffVer, test_version:"3.6.24"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("ThunderBird/MacOSX/Version");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_less(version:tbVer, test_version:"3.1.16")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_macosx.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_win.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_win.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_priv_esc_vuln_win.nasl 18467 2011-11-11 15:30:20Z nov $
+#
+# Mozilla Products Privilege Escalation Vulnerability (Windows)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802517);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3647");
+  script_bugtraq_id(50589);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-11 15:30:20 +0530 (Fri, 11 Nov 2011)");
+  script_name("Mozilla Products Privilege Escalation Vulnerabily (Windows)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to privilege escalation vulnerability.
+
+  Vulnerability Insight:
+  The flaws are caused due to,
+  - Error in JSSubScriptLoader, which fails to handle XPCNativeWrappers during
+    calls to the loadSubScript method in an add-on.
+
+  Impact:
+  Successful exploitation will let attackers to gain privileges via a crafted
+  web site that leverages certain unwrapping behavior.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version prior to 3.1.16
+  Mozilla Firefox version prior to 3.6.24
+
+  Fix: Upgrade to Mozilla Firefox version 3.6.24 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 3.1.16 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-46.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Privilege escalation");
+  script_dependencies("gb_firefox_detect_win.nasl",
+                      "gb_thunderbird_detect_win.nasl");
+  script_require_keys("Firefox/Win/Ver", "Thunderbird/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Firefox/Win/Ver");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_less(version:ffVer, test_version:"3.6.24"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("Thunderbird/Win/Ver");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_less(version:tbVer, test_version:"3.1.16")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_priv_esc_vuln_win.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl 18467 2011-11-14 12:22:15Z nov $
+#
+# Mozilla Products 'NoWaiverWrapper' Privilege Escalation Vulnerability (MAC OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802513);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3655");
+  script_bugtraq_id(50594);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 12:22:15 +0530 (Mon, 14 Nov 2011)");
+  script_name("Mozilla Products 'NoWaiverWrapper' Privilege Escalation Vulnerability (Windows)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to privilege escalation vulnerability.
+
+  Vulnerability Insight:
+  The flaw is caused due to, performing access control without checking for
+  use of the NoWaiverWrapper wrapper, which allows remote attackers to gain
+  privileges via a crafted web site.
+
+  Impact:
+  Successful exploitation will let attackers to gain privileges via a crafted
+  web site.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version 5.0 through 7.0
+  Mozilla Firefox version 4.x through 7.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-52.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Privilege escalation");
+  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
+  script_require_keys("Mozilla/Firefox/MacOSX/Version",
+                     "ThunderBird/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Mozilla/Firefox/MacOSX/Version");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_in_range(version:ffVer, test_version:"4.0", test_version2:"7.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("ThunderBird/MacOSX/Version");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_in_range(version:tbVer, test_version:"5.0", test_version2:"7.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_macosx.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl 18467 2011-11-11 13:42:01Z nov $
+#
+# Mozilla Products 'NoWaiverWrapper' Privilege Escalation Vulnerability (Windows)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802509);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3655");
+  script_bugtraq_id(50594);
+  script_tag(name:"cvss_base", value:"9.3");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-11 13:42:01 +0530 (Fri, 11 Nov 2011)");
+  script_name("Mozilla Products 'NoWaiverWrapper' Privilege Escalation Vulnerability (Windows)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to privilege escalation vulnerability.
+
+  Vulnerability Insight:
+  The flaw is caused due to, performing access control without checking for
+  use of the NoWaiverWrapper wrapper, which allows remote attackers to gain
+  privileges via a crafted web site.
+
+  Impact:
+  Successful exploitation will let attackers to gain privileges via a crafted
+  web site.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version 5.0 through 7.0
+  Mozilla Firefox version 4.x through 7.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-52.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Privilege escalation");
+  script_dependencies("gb_firefox_detect_win.nasl",
+                      "gb_thunderbird_detect_win.nasl");
+  script_require_keys("Firefox/Win/Ver", "Thunderbird/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Firefox/Win/Ver");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_in_range(version:ffVer, test_version:"4.0", test_version2:"7.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("Thunderbird/Win/Ver");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_in_range(version:tbVer, test_version:"5.0", test_version2:"7.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_wrapper_priv_esc_vuln_win.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl 18467 2011-11-14 13:23:08Z nov $
+#
+# Mozilla Products XSS and Memory Corruption Vulnerabilities (MAC OS X)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802516);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3650", "CVE-2011-3648");
+  script_bugtraq_id(50595, 50593);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 13:23:08 +0530 (Mon, 14 Nov 2011)");
+  script_name("Mozilla Products XSS and Memory Corruption Vulnerabilities (MAC OS X)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to cross site scripting and memory corruption vulnerabilities.
+
+  Vulnerability Insight:
+  The flaws are caused due to
+  - Error, while handling invalid sequences in the Shift-JIS encoding.
+  - Crash, when using Firebug to profile a JavaScript file with many functions.
+
+  Impact:
+  Successful exploitation will let attackers to inject arbitrary web script
+  or HTML via crafted text with Shift JIS encoding and cause a denial of
+  service.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version prior to 3.1.16, 5.0 through 7.0
+  Mozilla Firefox version prior to 3.6.24, 4.x through 7.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or 3.6.24 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or 3.1.16 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-49.html
+  http://www.mozilla.org/security/announce/2011/mfsa2011-47.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("gb_mozilla_prdts_detect_macosx.nasl");
+  script_require_keys("Mozilla/Firefox/MacOSX/Version",
+                          "ThunderBird/MacOSX/Version");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Mozilla/Firefox/MacOSX/Version");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_less(version:ffVer, test_version:"3.6.24") ||
+     version_in_range(version:ffVer, test_version:"4.0", test_version2:"7.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("ThunderBird/MacOSX/Version");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_less(version:tbVer, test_version:"3.1.16") ||
+     version_in_range(version:ffVer, test_version:"4.0", test_version2:"7.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_macosx.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl 18467 2011-11-14 13:23:08Z nov $
+#
+# Mozilla Products XSS and Memory Corruption Vulnerabilities (Windows)
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(802518);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-3650", "CVE-2011-3648");
+  script_bugtraq_id(50595, 50593);
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-14 13:23:08 +0530 (Mon, 14 Nov 2011)");
+  script_name("Mozilla Products XSS and Memory Corruption Vulnerabilities (Windows)");
+  desc = "
+  Overview: The host is installed with Mozilla firefox/thunderbird and is prone
+  to cross site scripting and memory corruption vulnerabilities.
+
+  Vulnerability Insight:
+  The flaws are caused due to
+  - Error, while handling invalid sequences in the Shift-JIS encoding.
+  - Crash, when using Firebug to profile a JavaScript file with many functions.
+
+  Impact:
+  Successful exploitation will let attackers to inject arbitrary web script
+  or HTML via crafted text with Shift JIS encoding and cause a denial of
+  service.
+
+  Impact Level: System/Application
+
+  Affected Software/OS:
+  Thunderbird version prior to 3.1.16, 5.0 through 7.0
+  Mozilla Firefox version prior to 3.6.24, 4.x through 7.0
+
+  Fix: Upgrade to Mozilla Firefox version 8.0 or 3.6.24 or later,
+  For updates refer, http://www.mozilla.com/en-US/firefox/all.html
+
+  Upgrade to Thunderbird version to 8.0 or 3.1.16 or later
+  http://www.mozilla.org/en-US/thunderbird/
+
+  References:
+  http://www.mozilla.org/security/announce/2011/mfsa2011-49.html
+  http://www.mozilla.org/security/announce/2011/mfsa2011-47.html ";
+
+  script_description(desc);
+  script_summary("Check for the version of Mozilla Firefox/Thunderbird");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("General");
+  script_dependencies("gb_firefox_detect_win.nasl",
+                           "gb_thunderbird_detect_win.nasl");
+  script_require_keys("Firefox/Win/Ver", "Thunderbird/Win/Ver");
+  exit(0);
+}
+
+
+include("version_func.inc");
+
+# Firefox Check
+ffVer = get_kb_item("Firefox/Win/Ver");
+if(ffVer)
+{
+  # Grep for Firefox version
+  if(version_is_less(version:ffVer, test_version:"3.6.24") ||
+     version_in_range(version:ffVer, test_version:"4.0", test_version2:"7.0"))
+  {
+     security_hole(0);
+     exit(0);
+  }
+}
+
+# Thunderbird Check
+tbVer = get_kb_item("Thunderbird/Win/Ver");
+if(tbVer != NULL)
+{
+  # Grep for Thunderbird version
+  if(version_is_less(version:tbVer, test_version:"3.1.16") ||
+     version_in_range(version:ffVer, test_version:"4.0", test_version2:"7.0")){
+    security_hole(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mozilla_prdts_xss_n_mem_crptn_vuln_win.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1261_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1261_1.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1261_1.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,133 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for quagga USN-1261-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840806);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:47:01 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1261-1");
+  script_cve_id("CVE-2011-3323", "CVE-2011-3324", "CVE-2011-3325", "CVE-2011-3326", "CVE-2011-3327");
+  script_name("Ubuntu Update for quagga USN-1261-1");
+  desc = "
+
+  Vulnerability Insight:
+  Riku Hietam&#228;ki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
+  incorrectly handled Link State Update messages with invalid lengths. A
+  remote attacker could use this flaw to cause Quagga to crash, resulting in
+  a denial of service. (CVE-2011-3323)
+
+  Riku Hietam&#228;ki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
+  incorrectly handled certain IPv6 Database Description messages. A remote
+  attacker could use this flaw to cause Quagga to crash, resulting in a
+  denial of service. (CVE-2011-3324)
+
+  Riku Hietam&#228;ki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
+  incorrectly handled certain IPv4 packets. A remote attacker could use this
+  flaw to cause Quagga to crash, resulting in a denial of service.
+  (CVE-2011-3325)
+
+  Riku Hietam&#228;ki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
+  incorrectly handled invalid Link State Advertisement (LSA) types. A remote
+  attacker could use this flaw to cause Quagga to crash, resulting in a
+  denial of service. (CVE-2011-3326)
+
+  Riku Hietam&#228;ki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
+  incorrectly handled certain BGP UPDATE messages. A remote attacker could
+  use this flaw to cause Quagga to crash, or possibly execute arbitrary
+  code. (CVE-2011-3327)
+
+  Affected Software/OS:
+  quagga on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001479.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of quagga");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"quagga", ver:"0.99.17-1ubuntu0.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"quagga", ver:"0.99.15-1ubuntu0.3", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"quagga", ver:"0.99.17-4ubuntu1.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1261_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1263_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1263_1.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1263_1.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,279 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for icedtea-web USN-1263-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840805);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:46:15 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "USN", value: "1263-1");
+  script_cve_id("CVE-2011-3377", "CVE-2011-3389", "CVE-2011-3521", "CVE-2011-3544",
+                "CVE-2011-3547", "CVE-2011-3548", "CVE-2011-3551", "CVE-2011-3552",
+                "CVE-2011-3553", "CVE-2011-3554", "CVE-2011-3556", "CVE-2011-3557",
+                "CVE-2011-3558", "CVE-2011-3560");
+  script_name("Ubuntu Update for icedtea-web USN-1263-1");
+  desc = "
+
+  Vulnerability Insight:
+  Deepak Bhole discovered a flaw in the Same Origin Policy (SOP)
+  implementation in the IcedTea web browser plugin. This could allow a
+  remote attacker to open connections to certain hosts that should
+  not be permitted. (CVE-2011-3377)
+
+  Juliano Rizzo and Thai Duong discovered that the block-wise AES
+  encryption algorithm block-wise as used in TLS/SSL was vulnerable to
+  a chosen-plaintext attack. This could allow a remote attacker to view
+  confidential data. (CVE-2011-3389)
+
+  It was discovered that a type confusion flaw existed in the in
+  the Internet Inter-Orb Protocol (IIOP) deserialization code. A
+  remote attacker could use this to cause an untrusted application
+  or applet to execute arbitrary code by deserializing malicious
+  input. (CVE-2011-3521)
+
+  It was discovered that the Java scripting engine did not perform
+  SecurityManager checks. This could allow a remote attacker to cause
+  an untrusted application or applet to execute arbitrary code with
+  the full privileges of the JVM. (CVE-2011-3544)
+
+  It was discovered that the InputStream class used a global buffer to
+  store input bytes skipped. An attacker could possibly use this to gain
+  access to sensitive information. (CVE-2011-3547)
+
+  It was discovered that a vulnerability existed in the AWTKeyStroke
+  class. A remote attacker could cause an untrusted application or applet
+  to execute arbitrary code. (CVE-2011-3548)
+
+  It was discovered that an integer overflow vulnerability existed
+  in the TransformHelper class in the Java2D implementation. A remote
+  attacker could use this cause a denial of service via an application
+  or applet crash or possibly execute arbitrary code. (CVE-2011-3551)
+
+  It was discovered that the default number of available UDP sockets for
+  applications running under SecurityManager restrictions was set too
+  high. A remote attacker could use this with a malicious application or
+  applet exhaust the number of available UDP sockets to cause a denial
+  of service for other applets or applications running within the same
+  JVM. (CVE-2011-3552)
+
+  It was discovered that Java API for XML Web Services (JAX-WS) could
+  incorrectly expose a stack trace. A remote attacker could potentially
+  use this to gain access to sensitive information. (CVE-2011-3553)
+
+  It was discovered that the unpacker for pack200 JAR files did not
+  sufficiently check for errors. An attacker could cause a denial of
+  service or possibly execute arbitrary code through a specially crafted
+  pack200 JAR file. (CVE-2011-3554)
+
+  It was discovered that the RMI registratio ...
+
+  Description truncated, for more information please check the Reference URL
+
+  Affected Software/OS:
+  icedtea-web on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001481.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of icedtea-web");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"icedtea-6-jre-cacao", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-demo", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jdk", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-headless", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-lib", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-zero", ver:"6b20-1.9.10-0ubuntu1~10.10.2", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"icedtea-6-jre-cacao", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"icedtea6-plugin", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-demo", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-headless", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-lib", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-zero", ver:"6b20-1.9.10-0ubuntu1~10.04.2", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"icedtea-6-jre-cacao", ver:"6b22-1.10.4-0ubuntu1~11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"icedtea-6-jre-jamvm", ver:"6b22-1.10.4-0ubuntu1~11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"icedtea-netx", ver:"1.1.1-0ubuntu1~11.04.2", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"icedtea-plugin", ver:"1.1.1-0ubuntu1~11.04.2", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre", ver:"6b22-1.10.4-0ubuntu1~11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-headless", ver:"6b22-1.10.4-0ubuntu1~11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-lib", ver:"6b22-1.10.4-0ubuntu1~11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isdpkgvuln(pkg:"openjdk-6-jre-zero", ver:"6b22-1.10.4-0ubuntu1~11.04.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1263_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1264_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1264_1.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1264_1.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,125 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for bind9 USN-1264-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840809);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:47:13 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1264-1");
+  script_cve_id("CVE-2011-4313");
+  script_name("Ubuntu Update for bind9 USN-1264-1");
+  desc = "
+
+  Vulnerability Insight:
+  It was discovered that Bind incorrectly handled certain specially crafted
+  packets. A remote attacker could use this flaw to cause Bind to crash,
+  resulting in a denial of service.
+
+  Affected Software/OS:
+  bind9 on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS ,
+  Ubuntu 8.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001482.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind9");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"libdns66", ver:"1:9.7.1.dfsg.P2-2ubuntu0.5", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"libdns64", ver:"1:9.7.0.dfsg.P1-1ubuntu0.4", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"libdns69", ver:"1:9.7.3.dfsg-1ubuntu2.3", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU8.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"libdns36", ver:"1:9.4.2.dfsg.P2-2ubuntu0.9", rls:"UBUNTU8.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1264_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1265_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1265_1.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1265_1.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for system-config-printer USN-1265-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840807);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:47:10 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "USN", value: "1265-1");
+  script_cve_id("CVE-2011-4405");
+  script_name("Ubuntu Update for system-config-printer USN-1265-1");
+  desc = "
+
+  Vulnerability Insight:
+  Marc Deslauriers discovered that system-config-printer's cupshelpers
+  scripts used by the Ubuntu automatic printer driver download service
+  queried the OpenPrinting database using an insecure connection. If a remote
+  attacker were able to perform a man-in-the-middle attack, this flaw could
+  be exploited to install altered packages and repositories.
+
+  Affected Software/OS:
+  system-config-printer on Ubuntu 11.04
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001483.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of system-config-printer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"python-cupshelpers", ver:"1.3.1+20110222-0ubuntu16.5", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1265_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1266_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ubuntu_USN_1266_1.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/gb_ubuntu_USN_1266_1.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,112 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for openldap USN-1266-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(840808);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 09:47:11 +0530 (Fri, 18 Nov 2011)");
+  script_tag(name:"cvss_base", value:"4.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "USN", value: "1266-1");
+  script_cve_id("CVE-2011-4079");
+  script_name("Ubuntu Update for openldap USN-1266-1");
+  desc = "
+
+  Vulnerability Insight:
+  It was discovered that slapd contained an off-by-one error. An
+  authenticated attacker could potentially exploit this by sending a
+  crafted crafted LDIF entry containing an empty postalAddress.
+
+  Affected Software/OS:
+  openldap on Ubuntu 11.04 ,
+  Ubuntu 10.10 ,
+  Ubuntu 10.04 LTS
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  https://lists.ubuntu.com/archives/ubuntu-security-announce/2011-November/001484.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of openldap");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU10.10")
+{
+
+  if(isdpkgvuln(pkg:"slapd", ver:"2.4.23-0ubuntu3.7", rls:"UBUNTU10.10"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if(isdpkgvuln(pkg:"slapd", ver:"2.4.21-0ubuntu5.6", rls:"UBUNTU10.04 LTS"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "UBUNTU11.04")
+{
+
+  if(isdpkgvuln(pkg:"slapd", ver:"2.4.23-6ubuntu6.1", rls:"UBUNTU11.04"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_ubuntu_USN_1266_1.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,94 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl 18535 2011-11-17 10:10:10Z nov $
+#
+# Adobe ColdFusion Multiple Path Disclosure Vulnerabilities
+#
+# Authors:
+# Sooraj KS <kssooraj at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902586);
+  script_version("$Revision$");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-17 10:10:10 +0530 (Thu, 17 Nov 2011)");
+  script_name("Adobe ColdFusion Multiple Path Disclosure Vulnerabilities");
+  desc = "
+  Overview: The host is running Adobe ColdFusion and is prone to multiple path
+  disclosure vulnerabilities.
+
+  Vulnerability Insight:
+  The flaw is caused due to insufficient error checking, allows remote
+  attackers to obtain sensitive information via a direct request to a
+  .cfm file, which reveals the installation path in an error message.
+
+  Impact:
+  Successful exploitation will let the attacker to obtain sensitive information
+  that could aid in further attacks.
+
+  Impact Level: Application
+
+  Affected Software/OS:
+  Adobe ColdFusion version 9 and prior.
+
+  Fix: No solution or patch is available as on 17th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://www.adobe.com/products/coldfusion-family.html
+
+  References:
+  http://websecurity.com.ua/5377/
+  http://seclists.org/fulldisclosure/2011/Nov/250
+  http://packetstormsecurity.org/files/107017/adobecoldfusion-disclosedos.txt ";
+
+  script_description(desc);
+  script_summary("Determine if Adobe ColdFusion is vulnerable to Path Disclosure");
+  script_category(ACT_ATTACK);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Web application abuses");
+  script_dependencies("gb_coldfusion_detect.nasl");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+
+## Get HTTP Port
+port = get_http_port(default:80);
+if(!port){
+  exit(0);
+}
+
+## Confirm ColdFusion
+if(!get_kb_item(string("coldfusion/", port, "/installed"))){
+  exit(0);
+}
+
+## Try Attack and check the response to confirm vulnerability
+if(http_vuln_check(port:port,
+   url:"/CFIDE/adminapi/_datasource/formatjdbcurl.cfm",
+   pattern:".*\\wwwroot\\CFIDE\\adminapi\\_datasource\\formatjdbcurl.cfm",
+   extra_check:"Unable to display error's location in a CFML template.")) {
+  security_warning(port);
+}


Property changes on: trunk/openvas-plugins/scripts/secpod_adobe_coldfusion_multiple_path_disc_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/secpod_herberlin_bremsserver_dir_trav_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_herberlin_bremsserver_dir_trav_vuln.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/secpod_herberlin_bremsserver_dir_trav_vuln.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,102 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_herberlin_bremsserver_dir_trav_vuln.nasl 18559 2011-11-18 12:12:12Z nov $
+#
+# Herberlin Bremsserver Directory Traversal Vulnerability
+#
+# Authors:
+# Sooraj KS <kssooraj at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902587);
+  script_version("$Revision$");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-18 12:12:12 +0530 (Fri, 18 Nov 2011)");
+  script_name("Herberlin Bremsserver Directory Traversal Vulnerability");
+  desc = "
+  Overview: The host is running Herberlin Bremsserver and is prone to directory
+  traversal vulnerability.
+
+  Vulnerability Insight:
+  The flaw is caused due to improper validation of URI containing ../(dot dot)
+  sequences, which allows attackers to read arbitrary files via directory
+  traversal attacks.
+
+  Impact:
+  Successful exploitation will let the attacker to obtain sensitive information
+  that could aid in further attacks.
+
+  Impact Level: Application
+
+  Affected Software/OS:
+  Herberlin Bremsserver Version 3.0
+
+  Fix: No solution or patch is available as on 18th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://tools.herberlin.de/bremsserver/index.shtml
+
+  References:
+  http://tools.herberlin.de/bremsserver/index.shtml
+  http://packetstormsecurity.org/files/107070/HerberlinBremsserver3.0-233.py.txt
+  http://www.autosectools.com/Advisory/Herberlin-Bremsserver-3.0-Directory-Traversal-233 ";
+
+  script_description(desc);
+  script_summary("Determine if Herberlin Bremsserver is vulnerable to Directory Traversal Attack");
+  script_category(ACT_ATTACK);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Web Servers");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+
+## Get HTTP Port
+port = get_http_port(default:80);
+if(!port){
+  exit(0);
+}
+
+## Confirm the application before trying exploit
+banner = get_http_banner(port: port);
+if("Server: Herberlin Bremsserver" >!< banner) {
+  exit(0);
+}
+
+files = traversal_files();
+
+foreach file (keys(files))
+{
+  ## Construct Directory Traversal Attack
+  url = string(crap(data:"/..", length:49), files[file]);
+
+  ## Try exploit and check the response to confirm vulnerability
+  if(http_vuln_check(port:port, url:url, pattern:file))
+  {
+    security_warning(port);
+    exit(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/secpod_herberlin_bremsserver_dir_trav_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Modified: trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_detect.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_detect.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -1,12 +1,15 @@
 ###############################################################################
 # OpenVAS Vulnerability Test
-# $Id$
+# $Id: secpod_ocs_inventory_ng_detect.nasl 11944 2011-11-02 16:06:05Z hdoreau $
 #
 # OCS Inventory NG Version Detection
 #
 # Authors:
 # Madhuri D <dmadhuri at secpod.com>
 #
+# updated by Madhuri D <dmadhuri at secpod.com> on 2011-11-15
+#  - To detect the newer versions
+#
 # Copyright:
 # Copyright (c) 2010 SecPod, http://www.secpod.com
 #
@@ -67,7 +70,7 @@
   ## Confirm the application
   if(("OCS Inventory" >< rcvRes) && egrep(pattern:"^HTTP/.* 200 OK", string:rcvRes))
   {
-    ocsVer = eregmatch(pattern:"Ver.? ?(([0-9.]+).?(RC[0-9]+)?)", string:rcvRes);
+    ocsVer = eregmatch(pattern:"Ver. (<?.>)?([0-9.]+).?(RC[0-9]+)?", string:rcvRes);
     if(!isnull(ocsVer[2]))
     {
       if(!isnull(ocsVer[3])){
@@ -83,11 +86,11 @@
                value:tmp_version);
     security_note(port:ocsPort, data:"OCS Inventory NG version " + ocsVer +
                     " running at location " + dir + " was detected on the host");
-      
+
     ## build cpe and store it as host_detail
     cpe = build_cpe(value:tmp_version, exp:"^([0-9.]+)", base:"cpe:/a:ocsinventory-ng:ocs_inventory_ng:");
     if(!isnull(cpe))
        register_host_detail(name:"App", value:cpe, nvt:SCRIPT_OID, desc:SCRIPT_DESC);
 
- }
+  }
 }


Property changes on: trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_detect.nasl
___________________________________________________________________
Name: svn:keywords
   - Author Date Id Revision
   + Revision Date

Added: trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_xss_vuln.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_xss_vuln.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,92 @@
+##############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_ocs_inventory_ng_xss_vuln.nasl 18102 2011-11-15 16:35:51Z nov $
+#
+# OCS Inventory NG Persistent Cross-site Scripting Vulnerability
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902749);
+  script_version("$Revision$");
+  script_cve_id("CVE-2011-4024");
+  script_bugtraq_id(50011);
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-15 16:35:51 +0530 (Tue, 15 Nov 2011)");
+  script_name("OCS Inventory NG Persistent Cross-site Scripting Vulnerability");
+  desc = "
+  Overview: This host is running OCS Inventory NG and is prone to cross site
+  scripting vulnerability.
+
+  Vulnerability Insight:
+  The flaw exists due to certain system information passed via a 'POST' request
+  to '/ocsinventory' is not properly sanitised before being used.
+
+  Impact:
+  Successful exploitation will allow remote attackers to insert arbitrary HTML
+  and script code, which will be executed in a user's browser session in
+  context of an affected site when the malicious data is being viewed.
+
+  Impact Level: Application/System
+
+  Affected Software:
+  OCS Inventory NG version 2.0.1 and prior
+
+  Fix: Upgrade to OCS Inventory NG version 2.0.2 or later
+  For updates refer, http://www.ocsinventory-ng.org/fr/
+
+  References:
+  http://osvdb.org/76135
+  http://secunia.com/advisories/46311
+  http://xforce.iss.net/xforce/xfdb/70406
+  http://www.exploit-db.com/exploits/18005/ ";
+
+  script_description(desc);
+  script_summary("Check for the version of OCS Inventory NG");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Web application abuses");
+  script_dependencies("secpod_ocs_inventory_ng_detect.nasl");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+
+include("http_func.inc");
+include("version_func.inc");
+
+ocsPort = get_http_port(default:80);
+if(!get_port_state(ocsPort)){
+  exit(0);
+}
+
+## Get version from KB
+if(!ocsVer = get_version_from_kb(port:ocsPort,app:"OCS_Inventory_NG")){
+  exit(0);
+}
+
+## Check OCS Inventory NG version < 2.0.2
+if(version_is_less(version:ocsVer, test_version:"2.0.2")){
+  security_warning(ocsPort);
+}


Property changes on: trunk/openvas-plugins/scripts/secpod_ocs_inventory_ng_xss_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date

Added: trunk/openvas-plugins/scripts/secpod_wordpress_mult_plugins_sql_inj_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_wordpress_mult_plugins_sql_inj_vuln.nasl	2011-11-17 22:16:28 UTC (rev 12133)
+++ trunk/openvas-plugins/scripts/secpod_wordpress_mult_plugins_sql_inj_vuln.nasl	2011-11-18 09:15:11 UTC (rev 12134)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id: secpod_wordpress_mult_plugins_sql_inj_vuln.nasl 16931 2011-11-17 14:31:04Z nov $
+#
+# WordPress Multiple Plugins SQL Injection Vulnerabilities
+#
+# Authors:
+# Madhuri D <dmadhuri at secpod.com>
+#
+# Copyright:
+# Copyright (c) 2011 SecPod, http://www.secpod.com
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(902755);
+  script_version("$Revision$");
+  script_bugtraq_id(49382, 49381);
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-17 14:31:04 +0530 (Thu, 17 Nov 2011)");
+  script_name("WordPress Multiple Plugins SQL Injection Vulnerabilities");
+  desc = "
+  Overview:
+  This host is running WordPress with multiple plugins and is prone and is
+  prone to SQL injection vulnerabilities
+
+  Vulnerability Insight:
+  Refer the references, for information about vulnerability.
+
+  Impact:
+  Successful exploitation could allow remote attackers to conduct SQL injection
+  attacks.
+
+  Impact Level: Application
+
+  Affected Software/OS:
+  WordPress Yolink Search version 1.1.4
+  WordPress Crawl Rate Tracker Plugin version 2.0.2
+
+  Fix: No solution or patch is available as on 17th November, 2011. Information
+  regarding this issue will be updated once the solution details are available.
+  For updates refer, http://wordpress.org/extend/plugins/crawlrate-tracker/
+                     http://wordpress.org/extend/plugins/yolink-search/
+
+  References:
+  http://secunia.com/advisories/45801
+  http://xforce.iss.net/xforce/xfdb/69504
+  http://www.exploit-db.com/exploits/17757/
+  http://www.exploit-db.com/exploits/17755/
+  http://packetstormsecurity.org/files/view/104610/wpyolink-sql.txt
+  http://packetstormsecurity.org/files/view/104608/wpcrawlratetracker-sql.txt ";
+
+  script_description(desc);
+  script_summary("Check if WordPress plugins are prone to SQL injection vulnerability");
+  script_category(ACT_ATTACK);
+  script_copyright("Copyright (C) 2011 SecPod");
+  script_family("Web application abuses");
+  script_dependencies("secpod_wordpress_detect_900182.nasl");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+##
+## The script code starts here
+##
+
+include("http_func.inc");
+include("version_func.inc");
+include("http_keepalive.inc");
+
+## Get HTTP Port
+port = get_http_port(default:80);
+if(!port){
+  exit(0);
+}
+
+## Check Host Supports PHP
+if(!can_host_php(port:port)){
+  exit(0);
+}
+
+## Get WordPress Installed Location
+if(!dir = get_dir_from_kb(port:port, app:"WordPress")){
+  exit(0);
+}
+
+## Make list of vulnerable pages
+pages = make_list("/wp-content/plugins/crawlrate-tracker/sbtracking-chart-data.php?chart_data=1&page_url='",
+                  "/wp-content/plugins/yolink-search/includes/bulkcrawl.php?page='");
+
+foreach page (pages)
+{
+  if(http_vuln_check(port:port, url: dir + page, pattern: "<b>" +
+                 "Warning</b>:  Invalid argument supplied for foreach\(\)") ||
+  (http_vuln_check(port:port, url:dir + page, pattern:"You have an error in " +
+                        "your SQL syntax;")))
+  {
+    security_hole(port);
+    exit(0);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/secpod_wordpress_mult_plugins_sql_inj_vuln.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date



More information about the Openvas-commits mailing list