[Openvas-commits] r12204 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Nov 28 14:25:28 CET 2011


Author: antu123
Date: 2011-11-28 14:25:20 +0100 (Mon, 28 Nov 2011)
New Revision: 12204

Added:
   trunk/openvas-plugins/scripts/gb_fedora_2011_15586_nss_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_16002_bind_fc14.nasl
   trunk/openvas-plugins/scripts/gb_fedora_2011_16036_bind_fc15.nasl
   trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_178.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new auto generated plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-28 10:58:19 UTC (rev 12203)
+++ trunk/openvas-plugins/ChangeLog	2011-11-28 13:25:20 UTC (rev 12204)
@@ -1,5 +1,13 @@
 2011-11-28 Antu Sanadi <santu at secpod.com>
 
+	* scripts/gb_fedora_2011_15586_nss_fc14.nasl,
+	scripts/gb_fedora_2011_16002_bind_fc14.nasl,
+	scripts/gb_fedora_2011_16036_bind_fc15.nasl
+	scripts/gb_mandriva_MDVSA_2011_178.nasl:
+	Added new auto generated plugins.
+
+2011-11-28 Antu Sanadi <santu at secpod.com>
+
 	* scripts/gb_ms08-024.nasl:
 	 Fixed the FP.(when IE 8.x is installed with win2k3 (sp2)).
 

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_15586_nss_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_15586_nss_fc14.nasl	2011-11-28 10:58:19 UTC (rev 12203)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_15586_nss_fc14.nasl	2011-11-28 13:25:20 UTC (rev 12204)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for nss FEDORA-2011-15586
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863643);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-28 12:47:47 +0530 (Mon, 28 Nov 2011)");
+  script_tag(name:"risk_factor", value:"High");
+  script_xref(name: "FEDORA", value: "2011-15586");
+  script_name("Fedora Update for nss FEDORA-2011-15586");
+  desc = "
+
+  Vulnerability Insight:
+  Network Security Services (NSS) is a set of libraries designed to
+  support cross-platform development of security-enabled client and
+  server applications. Applications built with NSS can support SSL v2
+  and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509
+  v3 certificates, and other security standards.
+
+
+  Affected Software/OS:
+  nss on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/070056.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of nss");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"nss", rpm:"nss~3.12.10~7.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_15586_nss_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date Id

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_16002_bind_fc14.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_16002_bind_fc14.nasl	2011-11-28 10:58:19 UTC (rev 12203)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_16002_bind_fc14.nasl	2011-11-28 13:25:20 UTC (rev 12204)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for bind FEDORA-2011-16002
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863645);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-28 12:48:19 +0530 (Mon, 28 Nov 2011)");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-16002");
+  script_cve_id("CVE-2011-4313", "CVE-2011-1910", "CVE-2011-2464");
+  script_name("Fedora Update for bind FEDORA-2011-16002");
+  desc = "
+
+  Vulnerability Insight:
+  BIND (Berkeley Internet Name Domain) is an implementation of the DNS
+  (Domain Name System) protocols. BIND includes a DNS server (named),
+  which resolves host names to IP addresses; a resolver library
+  (routines for applications to use when interfacing with DNS); and
+  tools for verifying that the DNS server is operating properly.
+
+
+  Affected Software/OS:
+  bind on Fedora 14
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069970.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC14")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.7.4~2.P1.fc14", rls:"FC14"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_16002_bind_fc14.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date Id

Added: trunk/openvas-plugins/scripts/gb_fedora_2011_16036_bind_fc15.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_fedora_2011_16036_bind_fc15.nasl	2011-11-28 10:58:19 UTC (rev 12203)
+++ trunk/openvas-plugins/scripts/gb_fedora_2011_16036_bind_fc15.nasl	2011-11-28 13:25:20 UTC (rev 12204)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for bind FEDORA-2011-16036
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(863644);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-28 12:47:47 +0530 (Mon, 28 Nov 2011)");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_xref(name: "FEDORA", value: "2011-16036");
+  script_cve_id("CVE-2011-4313", "CVE-2011-1910");
+  script_name("Fedora Update for bind FEDORA-2011-16036");
+  desc = "
+
+  Vulnerability Insight:
+  BIND (Berkeley Internet Name Domain) is an implementation of the DNS
+  (Domain Name System) protocols. BIND includes a DNS server (named),
+  which resolves host names to IP addresses; a resolver library
+  (routines for applications to use when interfacing with DNS); and
+  tools for verifying that the DNS server is operating properly.
+
+
+  Affected Software/OS:
+  bind on Fedora 15
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069975.html
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of bind");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC15")
+{
+
+  if(isrpmvuln(pkg:"bind", rpm:"bind~9.8.1~3.P1.fc15", rls:"FC15"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_fedora_2011_16036_bind_fc15.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date Id

Added: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_178.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_178.nasl	2011-11-28 10:58:19 UTC (rev 12203)
+++ trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_178.nasl	2011-11-28 13:25:20 UTC (rev 12204)
@@ -0,0 +1,238 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Mandriva Update for glibc MDVSA-2011:178 (glibc)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(831500);
+  script_version("$Revision$");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2011-11-28 12:50:20 +0530 (Mon, 28 Nov 2011)");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_xref(name: "MDVSA", value: "2011:178");
+  script_cve_id("CVE-2010-3847", "CVE-2011-0536", "CVE-2010-2898", "CVE-2011-1071",
+                "CVE-2010-0296", "CVE-2011-1089", "CVE-2011-1095", "CVE-2011-1659",
+                "CVE-2011-2483");
+  script_name("Mandriva Update for glibc MDVSA-2011:178 (glibc)");
+  desc = "
+
+  Vulnerability Insight:
+
+  Multiple vulnerabilities was discovered and fixed in glibc:
+  Multiple untrusted search path vulnerabilities in elf/dl-object.c in
+  certain modified versions of the GNU C Library (aka glibc or libc6),
+  including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat
+  Enterprise Linux, allow local users to gain privileges via a crafted
+  dynamic shared object (DSO) in a subdirectory of the current working
+  directory during execution of a (1) setuid or (2) setgid program that
+  has  in (a) RPATH or (b) RUNPATH.  NOTE: this issue exists because
+  of an incorrect fix for CVE-2010-3847 (CVE-2011-0536).
+
+  The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC
+  (EGLIBC) allow context-dependent attackers to execute arbitrary code
+  or cause a denial of service (memory consumption) via a long UTF8
+  string that is used in an fnmatch call, aka a stack extension attack,
+  a related issue to CVE-2010-2898, as originally reported for use of
+  this library by Google Chrome (CVE-2011-1071).
+
+  The addmntent function in the GNU C Library (aka glibc or libc6) 2.13
+  and earlier does not report an error status for failed attempts to
+  write to the /etc/mtab file, which makes it easier for local users
+  to trigger corruption of this file, as demonstrated by writes from
+  a process with a small RLIMIT_FSIZE value, a different vulnerability
+  than CVE-2010-0296 (CVE-2011-1089).
+
+  locale/programs/locale.c in locale in the GNU C Library (aka glibc
+  or libc6) before 2.13 does not quote its output, which might allow
+  local users to gain privileges via a crafted localization environment
+  variable, in conjunction with a program that executes a script that
+  uses the eval function (CVE-2011-1095).
+
+  Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or
+  libc6) 2.13 and earlier allows context-dependent attackers to cause a
+  denial of service (application crash) via a long UTF8 string that is
+  used in an fnmatch call with a crafted pattern argument, a different
+  vulnerability than CVE-2011-1071 (CVE-2011-1659).
+
+  crypt_blowfish before 1.1, as used in glibc on certain platforms,
+  does not properly handle 8-bit characters, which makes it easier
+  for context-dependent attackers to determine a cleartext password by
+  leveraging knowledge of a password hash (CVE-2011-2483).
+
+  The updated packages have been patched to correct these issues.
+
+  Affected Software/OS:
+  glibc on Mandriva Linux 2010.1,
+  Mandriva Linux 2010.1/X86_64,
+  Mandriva Enterprise Server 5,
+  Mandriva Enterprise Server 5/X86_64
+
+  Fix: Please Install the Updated Packages.
+
+  References:
+  http://lists.mandriva.com/security-announce/2011-11/msg00037.php
+
+  ";
+
+  script_description(desc);
+  script_summary("Check for the Version of glibc");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
+  script_family("Mandrake Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_require_keys("ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+include("revisions-lib.inc");
+
+release = get_kb_item("ssh/login/release");
+
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "MNDK_mes5")
+{
+
+  if(isrpmvuln(pkg:"glibc", rpm:"glibc~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-devel", rpm:"glibc-devel~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-doc", rpm:"glibc-doc~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-doc-pdf", rpm:"glibc-doc-pdf~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-i18ndata", rpm:"glibc-i18ndata~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-profile", rpm:"glibc-profile~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-static-devel", rpm:"glibc-static-devel~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-utils", rpm:"glibc-utils~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nscd", rpm:"nscd~2.8~1.20080520.5.8mnb2", rls:"MNDK_mes5"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}
+
+
+if(release == "MNDK_2010.1")
+{
+
+  if(isrpmvuln(pkg:"glibc", rpm:"glibc~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-devel", rpm:"glibc-devel~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-doc", rpm:"glibc-doc~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-doc-pdf", rpm:"glibc-doc-pdf~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-i18ndata", rpm:"glibc-i18ndata~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-profile", rpm:"glibc-profile~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-static-devel", rpm:"glibc-static-devel~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"glibc-utils", rpm:"glibc-utils~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  if(isrpmvuln(pkg:"nscd", rpm:"nscd~2.11.1~8.3mnb2", rls:"MNDK_2010.1"))
+  {
+    security_hole(0);
+    exit(0);
+  }
+
+  exit(0);
+}


Property changes on: trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_178.nasl
___________________________________________________________________
Name: svn:keywords
   + Revision Date Id



More information about the Openvas-commits mailing list