[Openvas-commits] r11593 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Sep 9 13:52:46 CEST 2011


Author: mime
Date: 2011-09-09 13:52:42 +0200 (Fri, 09 Sep 2011)
New Revision: 11593

Added:
   trunk/openvas-plugins/scripts/gb_openssh_49473.nasl
   trunk/openvas-plugins/scripts/gb_tomcat_48667.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/os_fingerprint.nasl
Log:
Added new plugins. Make sure array is not empty before iterate through it.

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-08 13:23:37 UTC (rev 11592)
+++ trunk/openvas-plugins/ChangeLog	2011-09-09 11:52:42 UTC (rev 11593)
@@ -1,3 +1,12 @@
+2011-09-09  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_tomcat_48667.nasl,
+	scripts/gb_openssh_49473.nasl:
+	Added new plugins.
+
+	* scripts/os_fingerprint.nasl:
+	Make sure array is not empty before iterate through it.
+
 2011-09-08  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_blue_coat_reporter_detect.nasl,

Added: trunk/openvas-plugins/scripts/gb_openssh_49473.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_openssh_49473.nasl	2011-09-08 13:23:37 UTC (rev 11592)
+++ trunk/openvas-plugins/scripts/gb_openssh_49473.nasl	2011-09-09 11:52:42 UTC (rev 11593)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# OpenSSH Ciphersuite Specification Information Disclosure Weakness
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103247);
+ script_bugtraq_id(49473);
+ script_version ("1.0-$Revision$");
+
+ script_name("OpenSSH Ciphersuite Specification Information Disclosure Weakness");
+
+desc = "Overview:
+OpenSSH is prone to a security weakness that may allow attackers to
+downgrade the ciphersuite.
+
+Successfully exploiting this issue in conjunction with other latent
+vulnerabilities may allow attackers to gain access to sensitive
+information that may aid in further attacks.
+
+Releases prior to OpenSSH 2.9p2 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49473
+http://www.openssh.com
+http://www.kb.cert.org/vuls/id/596827";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed OpenSSH version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("General");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("ssh_detect.nasl");
+ script_require_ports("Services/ssh", 22);
+ exit(0);
+}
+
+include("version_func.inc");
+include("global_settings.inc");
+
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+
+port = get_kb_item("Services/ssh");
+if(!port) port = 22;
+
+if(!get_port_state(port))exit(0);
+
+banner = get_kb_item("SSH/banner/" + port);
+if ( ! banner ) exit(0);
+
+version = eregmatch(pattern:"ssh-.*openssh[_-]{1}([0-9.]+[p0-9]*)", string: banner,icase:TRUE);
+if(isnull(version[1]))exit(0);
+
+if(version_is_less(version: version[1], test_version: "2.9p2")) {
+ security_warning(port);
+ exit(0);
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_openssh_49473.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_tomcat_48667.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tomcat_48667.nasl	2011-09-08 13:23:37 UTC (rev 11592)
+++ trunk/openvas-plugins/scripts/gb_tomcat_48667.nasl	2011-09-09 11:52:42 UTC (rev 11593)
@@ -0,0 +1,95 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103248);
+ script_bugtraq_id(48667);
+ script_cve_id("CVE-2011-2526");
+ script_tag(name:"cvss_base", value:"4.4");
+ script_version ("1.0-$Revision$");
+
+ script_name("Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability");
+
+desc = "Overview:
+Apache Tomcat is prone to a remote information-disclosure
+vulnerability.
+
+Remote attackers can exploit this issue to obtain sensitive
+information that will aid in further attacks. Attackers may also
+crash the JVM.
+
+The following versions are affected:
+
+Tomcat 5.5.0 through 5.5.33 Tomcat 6.0.0 through 6.0.32 Tomcat 7.0.0
+through 7.0.18
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/48667
+http://tomcat.apache.org/security-5.html
+http://tomcat.apache.org/security-6.html
+http://tomcat.apache.org/security-7.html
+http://tomcat.apache.org/
+http://www.ibm.com/support/docview.wss?uid=swg21507512
+http://support.avaya.com/css/P8/documents/100147767";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Tomcat version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_apache_tomcat_detect.nasl");
+ script_require_ports("Services/www", 8080);
+ exit(0);
+}
+
+include("http_func.inc"); 
+include("version_func.inc");
+include("global_settings.inc");
+
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+
+port = get_http_port(default:8080);
+if(!get_port_state(port))exit(0);
+
+if(!vers = get_kb_item(string("www/", port, "/ApacheTomcat")))exit(0);
+
+if(!isnull(vers)) {
+
+  if(version_in_range(version:vers, test_version:"7.0",  test_version2:"7.0.18") ||
+     version_in_range(version:vers, test_version:"6.0",  test_version2:"6.0.32") ||
+     version_in_range(version:vers, test_version:"5.5",    test_version2:"5.5.33")) {
+
+      security_warning(port:port);
+      exit(0);
+
+  }
+
+}


Property changes on: trunk/openvas-plugins/scripts/gb_tomcat_48667.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/os_fingerprint.nasl
===================================================================
--- trunk/openvas-plugins/scripts/os_fingerprint.nasl	2011-09-08 13:23:37 UTC (rev 11592)
+++ trunk/openvas-plugins/scripts/os_fingerprint.nasl	2011-09-09 11:52:42 UTC (rev 11593)
@@ -904,14 +904,17 @@
 ostitle = '';
 report = string('ICMP based OS fingerprint results: (', best_score, '% confidence)\n');
 
-foreach ostitle (keys(best_os)) {
-    register_host_detail(name:"OS", value:ostitle, nvt:"1.3.6.1.4.1.25623.1.0.102002",
-        desc:"Detects remote operating system version");
+if( max_index( best_os ) > 0 ) {
 
-    register_host_detail(name:"OS", value:best_os[ostitle], nvt:"1.3.6.1.4.1.25623.1.0.102002",
-        desc:"Detects remote operating system version");
+  foreach ostitle (keys(best_os)) {
+      register_host_detail(name:"OS", value:ostitle, nvt:"1.3.6.1.4.1.25623.1.0.102002",
+          desc:"Detects remote operating system version");
 
-    report = report + '\n' + ostitle;
+      register_host_detail(name:"OS", value:best_os[ostitle], nvt:"1.3.6.1.4.1.25623.1.0.102002",
+          desc:"Detects remote operating system version");
+
+      report = report + '\n' + ostitle;
+  }
 }
 
 set_kb_item(name:"Host/OS/ICMP", value:ostitle);



More information about the Openvas-commits mailing list