[Openvas-commits] r11641 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Sep 21 05:47:26 CEST 2011


Author: reinke
Date: 2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)
New Revision: 11641

Added:
   trunk/openvas-plugins/scripts/deb_2289_1.nasl
   trunk/openvas-plugins/scripts/deb_2290_1.nasl
   trunk/openvas-plugins/scripts/deb_2291_1.nasl
   trunk/openvas-plugins/scripts/deb_2293_1.nasl
   trunk/openvas-plugins/scripts/deb_2294_1.nasl
   trunk/openvas-plugins/scripts/deb_2295_1.nasl
   trunk/openvas-plugins/scripts/deb_2296_1.nasl
   trunk/openvas-plugins/scripts/deb_2297_1.nasl
   trunk/openvas-plugins/scripts/deb_2298_1.nasl
   trunk/openvas-plugins/scripts/deb_2298_2.nasl
   trunk/openvas-plugins/scripts/deb_2299_1.nasl
   trunk/openvas-plugins/scripts/deb_2300_2.nasl
   trunk/openvas-plugins/scripts/deb_2301_1.nasl
   trunk/openvas-plugins/scripts/deb_2302_1.nasl
   trunk/openvas-plugins/scripts/deb_2304_1.nasl
   trunk/openvas-plugins/scripts/deb_2306_1.nasl
   trunk/openvas-plugins/scripts/deb_2307_1.nasl
   trunk/openvas-plugins/scripts/deb_2308_1.nasl
   trunk/openvas-plugins/scripts/deb_2309_1.nasl
   trunk/openvas-plugins/scripts/freebsd_apache18.nasl
   trunk/openvas-plugins/scripts/freebsd_bugzilla13.nasl
   trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl
   trunk/openvas-plugins/scripts/freebsd_cfs.nasl
   trunk/openvas-plugins/scripts/freebsd_dovecot3.nasl
   trunk/openvas-plugins/scripts/freebsd_dtc.nasl
   trunk/openvas-plugins/scripts/freebsd_firefox58.nasl
   trunk/openvas-plugins/scripts/freebsd_freetype23.nasl
   trunk/openvas-plugins/scripts/freebsd_isc-dhcp31-server.nasl
   trunk/openvas-plugins/scripts/freebsd_libXfont.nasl
   trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl
   trunk/openvas-plugins/scripts/freebsd_linux-flashplugin18.nasl
   trunk/openvas-plugins/scripts/freebsd_mantis5.nasl
   trunk/openvas-plugins/scripts/freebsd_nss0.nasl
   trunk/openvas-plugins/scripts/freebsd_openssl4.nasl
   trunk/openvas-plugins/scripts/freebsd_otrs2.nasl
   trunk/openvas-plugins/scripts/freebsd_php512.nasl
   trunk/openvas-plugins/scripts/freebsd_php513.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin25.nasl
   trunk/openvas-plugins/scripts/freebsd_phpMyAdmin26.nasl
   trunk/openvas-plugins/scripts/freebsd_py23-django5.nasl
   trunk/openvas-plugins/scripts/freebsd_roundcube1.nasl
   trunk/openvas-plugins/scripts/freebsd_rubygem-rails3.nasl
   trunk/openvas-plugins/scripts/freebsd_samba340.nasl
   trunk/openvas-plugins/scripts/freebsd_stunnel.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
New scripts added

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/ChangeLog	2011-09-21 03:47:11 UTC (rev 11641)
@@ -1,5 +1,53 @@
 2011-09-20  Veerendra G.G <veerendragg at secpod.com>
 
+	* scripts/deb_2289_1.nasl,
+	scripts/deb_2290_1.nasl,
+	scripts/deb_2291_1.nasl,
+	scripts/deb_2293_1.nasl,
+	scripts/deb_2294_1.nasl,
+	scripts/deb_2295_1.nasl,
+	scripts/deb_2296_1.nasl,
+	scripts/deb_2297_1.nasl,
+	scripts/deb_2298_1.nasl,
+	scripts/deb_2298_2.nasl,
+	scripts/deb_2299_1.nasl,
+	scripts/deb_2300_2.nasl,
+	scripts/deb_2301_1.nasl,
+	scripts/deb_2302_1.nasl,
+	scripts/deb_2304_1.nasl,
+	scripts/deb_2306_1.nasl,
+	scripts/deb_2307_1.nasl,
+	scripts/deb_2308_1.nasl,
+	scripts/deb_2309_1.nasl,
+	scripts/freebsd_apache18.nasl,
+	scripts/freebsd_bugzilla13.nasl,
+	scripts/freebsd_ca_root_nss.nasl,
+	scripts/freebsd_cfs.nasl,
+	scripts/freebsd_dovecot3.nasl,
+	scripts/freebsd_dtc.nasl,
+	scripts/freebsd_firefox58.nasl,
+	scripts/freebsd_freetype23.nasl,
+	scripts/freebsd_isc-dhcp31-server.nasl,
+	scripts/freebsd_libXfont.nasl,
+	scripts/freebsd_libsndfile1.nasl,
+	scripts/freebsd_linux-flashplugin18.nasl,
+	scripts/freebsd_mantis5.nasl,
+	scripts/freebsd_nss0.nasl,
+	scripts/freebsd_openssl4.nasl,
+	scripts/freebsd_otrs2.nasl,
+	scripts/freebsd_php512.nasl,
+	scripts/freebsd_php513.nasl,
+	scripts/freebsd_phpMyAdmin25.nasl,
+	scripts/freebsd_phpMyAdmin26.nasl,
+	scripts/freebsd_py23-django5.nasl,
+	scripts/freebsd_roundcube1.nasl,
+	scripts/freebsd_rubygem-rails3.nasl,
+	scripts/freebsd_samba340.nasl,
+	scripts/freebsd_stunnel.nasl:
+	New scripts
+
+2011-09-20  Veerendra G.G <veerendragg at secpod.com>,
+
 	* scripts/gb_fedora_2011_11537_php_fc14.nasl,
 	scripts/gb_fedora_2011_12370_audacious-plugins_fc14.nasl,
 	scripts/gb_fedora_2011_12298_bcfg2_fc15.nasl,

Added: trunk/openvas-plugins/scripts/deb_2289_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2289_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2289_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,111 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2289-1 (typo3-src)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70225);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2289-1 (typo3-src)");
+
+ desc = "The remote host is missing an update to typo3-src
+announced via advisory DSA 2289-1.
+
+Several remote vulnerabilities have been discovered in the TYPO3 web
+content management framework: cross-site scripting, information
+disclosure, authentication delay bypass, and arbitrary file deletion.
+More details can be found in the Typo3 security advisory:
+http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011
+- -001/
+
+For the oldstable distribution (lenny), these problems have been fixed in
+version 4.2.5-1+lenny8.
+
+For the stable distribution (squeeze), these problems have been fixed in
+version 4.3.9+dfsg1-1+squeeze1.
+
+For the testing distribution (wheezy) and the unstable distribution
+(sid), these problems have been fixed in version 4.5.4+dfsg1-1.
+
+We recommend that you upgrade your typo3-src packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202289-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2289-1 (typo3-src)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"typo3", ver:"4.2.5-1+lenny8", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3-src-4.2", ver:"4.2.5-1+lenny8", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3", ver:"4.3.9+dfsg1-1+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3-database", ver:"4.3.9+dfsg1-1+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3-src-4.3", ver:"4.3.9+dfsg1-1+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3", ver:"4.5.4+dfsg1-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3-database", ver:"4.5.4+dfsg1-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3-dummy", ver:"4.5.4+dfsg1-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"typo3-src-4.5", ver:"4.5.4+dfsg1-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2290_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2290_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2290_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,212 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2290-1 (samba)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70226);
+ script_tag(name:"cvss_base", value:"6.8");
+ script_cve_id("CVE-2011-2522", "CVE-2011-2694");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2290-1 (samba)");
+
+ desc = "The remote host is missing an update to samba
+announced via advisory DSA 2290-1.
+
+The Samba Web Administration Tool (SWAT) contains several cross-site
+request forgery (CSRF) vulnerabilities (CVE-2011-2522) and a
+cross-site scripting vulnerability (CVE-2011-2694).
+
+For the oldstable distribution (lenny), these problems have been fixed in
+version 2:3.2.5-4lenny15.
+
+For the stable distribution (squeeze), these problems have been fixed
+in version 2:3.5.6~dfsg-3squeeze5.
+
+For the testing distribution (wheezy) and the unstable distribution
+(sid), these problems have been fixed in version 2:3.5.10~dfsg-1.
+
+We recommend that you upgrade your samba packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202290-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2290-1 (samba)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libpam-smbpass", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient-dev", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libwbclient0", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-common", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-dbg", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc-pdf", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-tools", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smbclient", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smbfs", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"swat", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"winbind", ver:"2:3.2.5-4lenny15", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpam-smbpass", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient-dev", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libwbclient0", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-common", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-common-bin", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-dbg", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc-pdf", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-tools", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smbclient", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"swat", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"winbind", ver:"2:3.5.6~dfsg-3squeeze5", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpam-smbpass", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libsmbclient-dev", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libwbclient-dev", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libwbclient0", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-common", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-common-bin", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-dbg", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-doc-pdf", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"samba-tools", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"smbclient", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"swat", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"winbind", ver:"2:3.5.11~dfsg-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2291_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2291_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2291_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,106 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2291-1 (squirrelmail)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70227);
+ script_tag(name:"cvss_base", value:"6.8");
+ script_cve_id("CVE-2010-4554", "CVE-2010-4555", "CVE-2011-2023", "CVE-2011-2752", "CVE-2011-2753");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2291-1 (squirrelmail)");
+
+ desc = "The remote host is missing an update to squirrelmail
+announced via advisory DSA 2291-1.
+
+Various vulnerabilities have been found in SquirrelMail, a webmail
+application. The Common Vulnerabilities and Exposures project
+identifies the following vulnerabilities:
+
+CVE-2010-4554
+
+SquirrelMail did not prevent page rendering inside a third-party
+HTML frame, which makes it easier for remote attackers to conduct
+clickjacking attacks via a crafted web site.
+
+CVE-2010-4555, CVE-2011-2752, CVE-2011-2753
+
+Multiple small bugs in SquirrelMail allowed an attacker to inject
+malicious script into various pages or alter the contents of user
+preferences.
+
+CVE-2011-2023
+
+It was possible to inject arbitrary web script or HTML via a
+crafted STYLE element in an HTML part of an e-mail message.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 1.4.15-4+lenny5.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 1.4.21-2.
+
+For the testing (wheezy) and unstable distribution (sid), these problems
+have been fixed in version 1.4.22-1.
+
+We recommend that you upgrade your squirrelmail packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202291-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2291-1 (squirrelmail)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"squirrelmail", ver:"2:1.4.15-4+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squirrelmail", ver:"2:1.4.21-2", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2293_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2293_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2293_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,104 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2293-1 (libxfont)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70229);
+ script_tag(name:"cvss_base", value:"9.3");
+ script_cve_id("CVE-2011-2895");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2293-1 (libxfont)");
+
+ desc = "The remote host is missing an update to libxfont
+announced via advisory DSA 2293-1.
+
+Tomas Hoger found a buffer overflow in the X.Org libXfont library,
+which may allow for a local privilege escalation through crafted
+font files.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 1.3.3-2.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 1.4.1-3.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.4.4-1.
+
+We recommend that you upgrade your libxfont packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202293-1
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2293-1 (libxfont)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libxfont-dev", ver:"1:1.3.3-2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libxfont1", ver:"1:1.3.3-2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libxfont1-dbg", ver:"1:1.3.3-2", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libxfont-dev", ver:"1:1.4.1-3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libxfont1", ver:"1:1.4.1-3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libxfont1-dbg", ver:"1:1.4.1-3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libxfont1-udeb", ver:"1:1.4.1-2", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2294_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2294_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2294_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,106 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2294-1 (freetype)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70228);
+ script_tag(name:"cvss_base", value:"9.3");
+ script_cve_id("CVE-2011-0226");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2294-1 (freetype)");
+
+ desc = "The remote host is missing an update to freetype
+announced via advisory DSA 2294-1.
+
+It was discovered that insufficient input saniting in Freetype's code to
+parse Type1 could lead to the execution of arbitrary code.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 2.3.7-2+lenny6.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 2.4.2-2.1+squeeze1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2.4.6-1.
+
+We recommend that you upgrade your freetype packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202294-1
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2294-1 (freetype)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"freetype2-demos", ver:"2.3.7-2+lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6", ver:"2.3.7-2+lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6-dev", ver:"2.3.7-2+lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6-udeb", ver:"2.3.7-2+lenny4", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"freetype2-demos", ver:"2.4.2-2.1+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6", ver:"2.4.2-2.1+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6-dev", ver:"2.4.2-2.1+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libfreetype6-udeb", ver:"2.4.2-2.1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2295_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2295_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2295_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,130 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2295-1 (iceape)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70230);
+ script_tag(name:"cvss_base", value:"10.0");
+ script_cve_id("CVE-2011-0084", "CVE-2011-2378", "CVE-2011-2981", "CVE-2011-2982", "CVE-2011-2983", "CVE-2011-2984");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2295-1 (iceape)");
+
+ desc = "The remote host is missing an update to iceape
+announced via advisory DSA 2295-1.
+
+Several vulnerabilities have been found in the Iceape internet suite, an
+unbranded version of Seamonkey:
+
+CVE-2011-0084
+
+regenrecht discovered that incorrect pointer handling in the SVG
+processing code could lead to the execution of arbitrary code.
+
+CVE-2011-2378
+
+regenrecht discovered that incorrect memory management in DOM
+processing could lead to the execution of arbitrary code.
+
+CVE-2011-2981
+
+moz_bug_r_a_4 discovered a Chrome privilege escalation
+vulnerability in the event handler code.
+
+CVE-2011-2982
+
+Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory
+corruption bugs, which may lead to the execution of arbitrary code.
+
+CVE-2011-2983
+
+shutdown discovered an information leak in the handling of
+RegExp.input.
+
+CVE-2011-2984
+
+moz_bug_r_a4 discovered a Chrome privilege escalation
+vulnerability.
+
+The oldstable distribution (lenny) is not affected. The iceape
+package only  provides the XPCOM code.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 2.0.11-7.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2.0.14-5.
+
+We recommend that you upgrade your iceape packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202295-1
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2295-1 (iceape)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"iceape", ver:"2.0.11-7", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"iceape-browser", ver:"2.0.11-7", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"iceape-chatzilla", ver:"2.0.11-7", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"iceape-dbg", ver:"2.0.11-7", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"iceape-dev", ver:"2.0.11-7", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"iceape-mailnews", ver:"2.0.11-7", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2296_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2296_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2296_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,140 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2296-1 (iceweasel)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70231);
+ script_tag(name:"cvss_base", value:"10.0");
+ script_cve_id("CVE-2011-0084", "CVE-2011-2378", "CVE-2011-2981", "CVE-2011-2982", "CVE-2011-2983", "CVE-2011-2984");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2296-1 (iceweasel)");
+
+ desc = "The remote host is missing an update to iceweasel
+announced via advisory DSA 2296-1.
+
+Several vulnerabilities have been discovered in Iceweasel, a web browser
+based on Firefox. The included XULRunner library provides rendering
+services for several other applications included in Debian.
+
+CVE-2011-0084
+
+regenrecht discovered that incorrect pointer handling in the SVG
+processing code could lead to the execution of arbitrary code.
+
+CVE-2011-2378
+
+regenrecht discovered that incorrect memory management in DOM
+processing could lead to the execution of arbitrary code.
+
+CVE-2011-2981
+
+moz_bug_r_a_4 discovered a Chrome privilege escalation
+vulnerability in the event handler code.
+
+CVE-2011-2982
+
+Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory
+corruption bugs, which may lead to the execution of arbitrary code.
+
+CVE-2011-2983
+
+shutdown discovered an information leak in the handling of
+RegExp.input.
+
+CVE-2011-2984
+
+moz_bug_r_a4 discovered a Chrome privilege escalation vulnerability.
+
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 1.9.0.19-13 of the xulrunner source package.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 3.5.16-9.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 6.0-1
+
+We recommend that you upgrade your iceweasel packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202296-1
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2296-1 (iceweasel)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"iceweasel", ver:"3.5.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"iceweasel-dbg", ver:"3.5.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs-dev", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs2d", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libmozjs2d-dbg", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"spidermonkey-bin", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-1.9.1-dbg", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"xulrunner-dev", ver:"1.9.1.16-9", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2297_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2297_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2297_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,124 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2297-1 (icedove)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70232);
+ script_tag(name:"cvss_base", value:"10.0");
+ script_cve_id("CVE-2011-0084", "CVE-2011-2378", "CVE-2011-2981", "CVE-2011-2982", "CVE-2011-2983", "CVE-2011-2984");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2297-1 (icedove)");
+
+ desc = "The remote host is missing an update to icedove
+announced via advisory DSA 2297-1.
+
+Several vulnerabilities have been discovered in Icedove, an unbranded
+version of the Thunderbird mail/news client.
+
+CVE-2011-0084
+
+regenrecht discovered that incorrect pointer handling in the SVG
+processing code could lead to the execution of arbitrary code.
+
+CVE-2011-2378
+
+regenrecht discovered that incorrect memory management in DOM
+processing could lead to the execution of arbitrary code.
+
+CVE-2011-2981
+
+moz_bug_r_a_4 discovered a Chrome privilege escalation
+vulnerability in the event handler code.
+
+CVE-2011-2982
+
+Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory
+corruption bugs, which may lead to the execution of arbitrary code.
+
+CVE-2011-2983
+
+shutdown discovered an information leak in the handling of
+RegExp.input.
+
+CVE-2011-2984
+
+moz_bug_r_a4 discovered a Chrome privilege escalation vulnerability.
+
+
+As indicated in the Lenny (oldstable) release notes, security support for
+the Icedove packages in the oldstable needed to be stopped before the end
+of the regular Lenny security maintenance life cycle.
+You are strongly encouraged to upgrade to stable or switch to a different
+mail client.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 3.0.11-1+squeeze4.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 3.1.12-1.
+
+We recommend that you upgrade your iceweasel packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202297-1
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2297-1 (icedove)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"icedove", ver:"3.0.11-1+squeeze4", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"icedove-dbg", ver:"3.0.11-1+squeeze4", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"icedove-dev", ver:"3.0.11-1+squeeze4", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2298_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2298_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2298_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,178 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2298-1 (apache2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70233);
+ script_tag(name:"cvss_base", value:"7.8");
+ script_cve_id("CVE-2010-1452", "CVE-2011-3192");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2298-1 (apache2)");
+
+ desc = "The remote host is missing an update to apache2
+announced via advisory DSA 2298-1.
+
+Two issues have been found in the Apache HTTPD web server:
+
+CVE-2011-3192
+
+A vulnerability has been found in the way the multiple overlapping
+ranges are handled by the Apache HTTPD server. This vulnerability
+allows an attacker to cause Apache HTTPD to use an excessive amount of
+memory, causing a denial of service.
+
+CVE-2010-1452
+
+A vulnerability has been found in mod_dav that allows an attacker to
+cause a daemon crash, causing a denial of service. This issue only
+affects the Debian 5.0 oldstable/lenny distribution.
+
+
+For the oldstable distribution (lenny), these problems have been fixed
+in version 2.2.9-10+lenny10.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 2.2.16-6+squeeze2.
+
+For the testing distribution (wheezy), this problem will be fixed soon.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2.2.19-2.
+
+We recommend that you upgrade your apache2 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202298-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2298-1 (apache2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"apache2", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-dbg", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-doc", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-event", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-prefork", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-worker", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-prefork-dev", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-src", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec-custom", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-threaded-dev", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-utils", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-common", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-dbg", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-doc", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-event", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-itk", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-prefork", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-worker", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-prefork-dev", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec-custom", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-threaded-dev", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-utils", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-bin", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-common", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2298_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2298_2.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2298_2.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,230 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2298-2 (apache2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70235);
+ script_tag(name:"cvss_base", value:"7.8");
+ script_cve_id("CVE-2010-1452", "CVE-2011-3192");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2298-2 (apache2)");
+
+ desc = "The remote host is missing an update to apache2
+announced via advisory DSA 2298-2.
+
+The apache2 Upgrade from DSA-2298-1 has caused a regression that
+prevented some video players from seeking in video files served by
+Apache HTTPD. This update fixes this bug.
+
+
+The text of the original advisory is reproduced for reference:
+
+Two issues have been found in the Apache HTTPD web server:
+
+CVE-2011-3192
+
+A vulnerability has been found in the way the multiple overlapping
+ranges are handled by the Apache HTTPD server. This vulnerability
+allows an attacker to cause Apache HTTPD to use an excessive amount of
+memory, causing a denial of service.
+
+CVE-2010-1452
+
+A vulnerability has been found in mod_dav that allows an attacker to
+cause a daemon crash, causing a denial of service. This issue only
+affects the Debian 5.0 oldstable/lenny distribution.
+
+
+The regression has been fixed in the following packages:
+
+For the oldstable distribution (lenny), this problem has been fixed
+in version 2.2.9-10+lenny11.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 2.2.16-6+squeeze3.
+
+For the testing distribution (wheezy), this problem will be fixed in
+version 2.2.20-1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2.2.20-1.
+
+We recommend that you upgrade your apache2 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202298-2
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2298-2 (apache2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"apache2", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-dbg", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-doc", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-event", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-prefork", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-worker", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-prefork-dev", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-src", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec-custom", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-threaded-dev", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-utils", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-common", ver:"2.2.9-10+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-dbg", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-doc", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-event", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-itk", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-prefork", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-worker", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-prefork-dev", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec-custom", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-threaded-dev", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-utils", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-bin", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-common", ver:"2.2.16-6+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-dbg", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-doc", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-event", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-itk", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-prefork", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-mpm-worker", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-prefork-dev", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-suexec-custom", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-threaded-dev", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2-utils", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-bin", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"apache2.2-common", ver:"2.2.20-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2299_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2299_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2299_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,90 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2299-1 (ca-certificates)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70234);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2299-1 (ca-certificates)");
+
+ desc = "The remote host is missing an update to ca-certificates
+announced via advisory DSA 2299-1.
+
+An unauthorized SSL certificate has been found in the wild issued
+the DigiNotar Certificate Authority, obtained through a security
+compromise with said company. Debian, like other software
+distributors, has as a precaution decided to disable the DigiNotar
+Root CA by default in its ca-certificates bundle.
+
+For other software in Debian that ships a CA bundle, like the
+Mozilla suite, updates are forthcoming.
+
+For the oldstable distribution (lenny), the ca-certificates package
+does not contain this root CA.
+
+For the stable distribution (squeeze), the root CA has been
+disabled starting ca-certificates version 20090814+nmu3.
+
+For the testing distribution (wheezy) and unstable distribution
+(sid), the root CA has been disabled starting ca-certificates
+version 20110502+nmu1.
+
+We recommend that you upgrade your ca-certificates packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202299-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2299-1 (ca-certificates)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"ca-certificates", ver:"20090814+nmu3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2300_2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2300_2.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2300_2.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,110 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2300-2 (nss)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70236);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2300-2 (nss)");
+
+ desc = "The remote host is missing an update to nss
+announced via advisory DSA 2300-2.
+
+Several unauthorised SSL certificates have been found in the wild issued
+for the DigiNotar Certificate Authority, obtained through a security
+compromise with said company. Debian, like other software
+distributors, has as a precaution decided to disable the DigiNotar
+Root CA by default in the NSS crypto libraries.
+
+As a result from further understanding of the incident, this update
+to DSA 2300 disables additional DigiNotar issuing certificates.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 3.12.3.1-0lenny6.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 3.12.8-1+squeeze3.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 3.12.11-2.
+
+We recommend that you upgrade your nss packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202300-2
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2300-2 (nss)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libnss3-1d", ver:"3.12.3.1-0lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-1d-dbg", ver:"3.12.3.1-0lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-dev", ver:"3.12.3.1-0lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-tools", ver:"3.12.3.1-0lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-1d", ver:"3.12.8-1+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-1d-dbg", ver:"3.12.8-1+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-dev", ver:"3.12.8-1+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libnss3-tools", ver:"3.12.8-1+squeeze3", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2301_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2301_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2301_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,158 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2301-1 (rails)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70237);
+ script_tag(name:"cvss_base", value:"7.5");
+ script_cve_id("CVE-2011-2930", "CVE-2011-2931", "CVE-2011-3186", "CVE-2009-4214");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2301-1 (rails)");
+
+ desc = "The remote host is missing an update to rails
+announced via advisory DSA 2301-1.
+
+Several vulnerabilities have been discovered in Rails, the Ruby web
+application framework. The Common Vulnerabilities and Exposures project
+identifies the following problems:
+
+CVE-2009-4214
+
+A cross-site scripting (XSS) vulnerability had been found in the
+strip_tags function. An attacker may inject non-printable characters
+that certain browsers will then evaluate. This vulnerability only
+affects the oldstable distribution (lenny).
+
+CVE-2011-2930
+
+A SQL injection vulnerability had been found in the quote_table_name
+method could allow malicious users to inject arbitrary SQL into a
+query.
+
+CVE-2011-2931
+
+A cross-site scripting (XSS) vulnerability had been found in the
+strip_tags  helper. An parsing error can be exploited by an attacker,
+who can confuse the parser and may inject HTML tags into the output
+document.
+
+CVE-2011-3186
+
+A newline (CRLF) injection vulnerability had been found in
+response.rb. This vulnerability allows an attacker to inject arbitrary
+HTTP headers and conduct HTTP response splitting attacks via the
+Content-Type header.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 2.1.0-7+lenny1.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 2.3.5-1.2+squeeze1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 2.3.14.
+
+We recommend that you upgrade your rails packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202301-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2301-1 (rails)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"rails", ver:"2.1.0-7+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactionmailer-ruby", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactionmailer-ruby1.8", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactionpack-ruby", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactionpack-ruby1.8", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactiverecord-ruby", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactiverecord-ruby1.8", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactiverecord-ruby1.9.1", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactiveresource-ruby", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactiveresource-ruby1.8", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactivesupport-ruby", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactivesupport-ruby1.8", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libactivesupport-ruby1.9.1", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"rails", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"rails-doc", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"rails-ruby1.8", ver:"2.3.5-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2302_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2302_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2302_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,105 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2302-1 (bcfg2)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70238);
+ script_cve_id("CVE-2011-3211");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2302-1 (bcfg2)");
+
+ desc = "The remote host is missing an update to bcfg2
+announced via advisory DSA 2302-1.
+
+It has been discovered that the bcfg2 server, a configuration management
+server for bcfg2 clients, is not properly sanitizing input from bcfg2
+clients before passing it to various shell commands.  This enables an
+attacker in control of a bcfg2 client to execute arbitrary commands on
+the server with root privileges.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 0.9.5.7-1.1+lenny1.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 1.0.1-3+squeeze1
+
+For the testing distribution (wheezy), this problem has been fixed in
+version 1.1.2-2.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.1.2-2.
+
+We recommend that you upgrade your bcfg2 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202302-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2302-1 (bcfg2)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"bcfg2", ver:"0.9.5.7-1.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bcfg2-server", ver:"0.9.5.7-1.1+lenny1", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bcfg2", ver:"1.0.1-3+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bcfg2-server", ver:"1.0.1-3+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bcfg2", ver:"1.1.2-2", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"bcfg2-server", ver:"1.1.2-2", rls:"DEB7.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2304_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2304_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2304_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,131 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2304-1 (squid3)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70241);
+ script_tag(name:"cvss_base", value:"6.8");
+ script_cve_id("CVE-2011-3205");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2304-1 (squid3)");
+
+ desc = "The remote host is missing an update to squid3
+announced via advisory DSA 2304-1.
+
+Ben Hawkes discovered that squid3, a full featured Web Proxy cache
+(HTTP proxy), is vulnerable to a buffer overflow when processing gopher
+server replies.  An attacker can exploit this flaw by connecting to a
+gopher server that returns lines longer than 4096 bytes.  This may result
+in denial of service conditions (daemon crash) or the possibly the
+execution of arbitrary code with rights of the squid daemon.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 3.0.STABLE8-3+lenny5.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 3.1.6-1.2+squeeze1.
+
+For the testing distribution (wheezy), this problem has been fixed in
+version 3.1.15-1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 3.1.15-1.
+
+We recommend that you upgrade your squid3 packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202304-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2304-1 (squid3)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"squid3", ver:"3.0.STABLE8-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3-cgi", ver:"3.0.STABLE8-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3-common", ver:"3.0.STABLE8-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squidclient", ver:"3.0.STABLE8-3+lenny5", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid-cgi", ver:"3.1.6-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3", ver:"3.1.6-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3-common", ver:"3.1.6-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3-dbg", ver:"3.1.6-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squidclient", ver:"3.1.6-1.2+squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid-cgi", ver:"3.1.15-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3", ver:"3.1.15-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3-common", ver:"3.1.15-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squid3-dbg", ver:"3.1.15-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"squidclient", ver:"3.1.15-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2306_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2306_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2306_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,168 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2306-1 (ffmpeg)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70239);
+ script_tag(name:"cvss_base", value:"9.3");
+ script_cve_id("CVE-2010-3908", "CVE-2010-4704", "CVE-2011-0480", "CVE-2011-0722", "CVE-2011-0723");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2306-1 (ffmpeg)");
+
+ desc = "The remote host is missing an update to ffmpeg
+announced via advisory DSA 2306-1.
+
+
+Several vulnerabilities have been discovered in ffmpeg, a multimedia player,
+server and encoder.
+The Common Vulnerabilities and Exposures project identifies the following
+problems:
+
+
+CVE-2010-3908
+
+FFmpeg before 0.5.4, allows remote attackers to cause a denial of service
+(memory corruption and application crash) or possibly execute arbitrary code
+via a malformed WMV file.
+
+
+CVE-2010-4704
+
+libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg allows remote
+attackers to cause a denial of service (application crash) via a crafted
+.ogg file, related to the vorbis_floor0_decode function.
+
+
+CVE-2011-0480
+
+Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg
+allow remote attackers to cause a denial of service (memory corruption and
+application crash) or possibly have unspecified other impact via a crafted
+WebM file, related to buffers for the channel floor and the channel residue.
+
+
+CVE-2011-0722
+
+FFmpeg allows remote attackers to cause a denial of service (heap memory
+corruption and application crash) or possibly execute arbitrary code via a
+malformed RealMedia file.
+
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 4:0.5.4-1.
+
+Security support for ffmpeg has been discontinued for the oldstable
+distribution (lenny).
+The current version in oldstable is not supported by upstream anymore
+and is affected by several security issues. Backporting fixes for these
+and any future issues has become unfeasible and therefore we need to
+drop our security support for the version in oldstable.
+
+
+We recommend that you upgrade your ffmpeg packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202306-1
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2306-1 (ffmpeg)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"ffmpeg", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ffmpeg-dbg", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"ffmpeg-doc", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavcodec-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavcodec52", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavdevice-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavdevice52", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavfilter-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavfilter0", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavformat-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavformat52", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavutil-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libavutil49", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostproc-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libpostproc51", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libswscale-dev", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libswscale0", ver:"4:0.5.4-1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2307_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2307_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2307_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,147 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2307-1 (chromium-browser)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70240);
+ script_tag(name:"cvss_base", value:"7.5");
+ script_cve_id("CVE-2011-2359", "CVE-2011-2800", "CVE-2011-2818");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2307-1 (chromium-browser)");
+
+ desc = "The remote host is missing an update to chromium-browser
+announced via advisory DSA 2307-1.
+
+
+Several vulnerabilities were discovered in the Chromium browser.
+The Common Vulnerabilities and Exposures project identifies
+the following problems:
+
+CVE-2011-2818
+
+Use-after-free vulnerability in Google Chrome allows remote attackers to
+cause a denial of service or possibly have unspecified other impact via
+vectors related to display box rendering.
+
+
+CVE-2011-2800
+
+Google Chrome before allows remote attackers to obtain potentially sensitive
+information about client-side redirect targets via a crafted web site.
+
+
+CVE-2011-2359
+
+Google Chrome does not properly track line boxes during rendering, which
+allows remote attackers to cause a denial of service or possibly have
+unspecified other impact via unknown vectors that lead to a stale pointer.
+
+
+Several unauthorised SSL certificates have been found in the wild issued
+for the DigiNotar Certificate Authority, obtained through a security
+compromise with said company.
+This update blacklists SSL certificates issued by DigiNotar-controlled
+intermediate CAs used by the Dutch PKIoverheid program.
+
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 6.0.472.63~r59945-5+squeeze6.
+
+For the testing distribution (wheezy), this problem has been fixed in
+version 13.0.782.220~r99552-1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 13.0.782.220~r99552-1.
+
+We recommend that you upgrade your chromium-browser packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202307-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2307-1 (chromium-browser)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"chromium-browser", ver:"6.0.472.63~r59945-5+squeeze6", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser-dbg", ver:"6.0.472.63~r59945-5+squeeze6", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser-inspector", ver:"6.0.472.63~r59945-5+squeeze6", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser-l10n", ver:"6.0.472.63~r59945-5+squeeze6", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser-dbg", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser-inspector", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-browser-l10n", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-dbg", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-inspector", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"chromium-l10n", ver:"13.0.782.220~r99552-1", rls:"DEB7.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2308_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2308_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2308_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,88 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2308-1 (mantis)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70242);
+ script_cve_id("CVE-2011-3357", "CVE-2011-3358");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2308-1 (mantis)");
+
+ desc = "The remote host is missing an update to mantis
+announced via advisory DSA 2308-1.
+
+Several vulnerabilities were found in Mantis, a  web-based bug
+tracking system: Insufficient input validation could result in local
+file inclusion and cross-site scripting.
+
+For the oldstable distribution (lenny), this problem has been fixed in
+version 1.1.6+dfsg-2lenny6.
+
+For the stable distribution (squeeze), this problem has been fixed in
+version 1.1.8+dfsg-10squeeze1.
+
+For the unstable distribution (sid), this problem has been fixed in
+version 1.2.7-1.
+
+We recommend that you upgrade your mantis packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202308-1
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2308-1 (mantis)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"mantis", ver:"1.1.6+dfsg-2lenny6", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"mantis", ver:"1.1.8+dfsg-10squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/deb_2309_1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/deb_2309_1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/deb_2309_1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,130 @@
+# OpenVAS Vulnerability Test
+# $Id$
+# Description: Auto-generated from advisory DSA 2309-1 (openssl)
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisory, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# or at your option, GNU General Public License version 3,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70243);
+ script_tag(name:"cvss_base", value:"2.6");
+ script_cve_id("CVE-2011-1945");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_version ("$Revision$");
+ script_name("Debian Security Advisory DSA 2309-1 (openssl)");
+
+ desc = "The remote host is missing an update to openssl
+announced via advisory DSA 2309-1.
+
+Several fraudulent SSL certificates have been found in the wild issued
+by the DigiNotar Certificate Authority, obtained through a security
+compromise of said company. After further updates on this incident, it
+has been determined that all of DigiNotar's signing certificates can no
+longer be trusted.
+Debian, like other software distributors and vendors, has decided to
+distrust all of DigiNotar's CAs. In this update, this is done in the
+crypto library (a component of the OpenSSL toolkit) by marking such
+certificates as revoked.
+Any application that uses said component should now reject certificates
+signed by DigiNotar. Individual applications may allow users to overrride
+the validation failure. However, making exceptions is highly
+discouraged and should be carefully verified.
+
+Additionally, a vulnerability has been found in the ECDHE_ECDS cipher
+where timing attacks make it easier to determine private keys. The
+Common Vulnerabilities and Exposures project identifies it as
+CVE-2011-1945.
+
+For the oldstable distribution (lenny), these problems have been fixed in
+version 0.9.8g-15+lenny12.
+
+For the stable distribution (squeeze), these problems have been fixed in
+version 0.9.8o-4squeeze2.
+
+For the testing distribution (wheezy), these problems will be fixed soon.
+
+For the unstable distribution (sid), these problems have been fixed in
+version 1.0.0e-1.
+
+We recommend that you upgrade your openssl packages.
+
+Solution:
+https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202309-1
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("Debian Security Advisory DSA 2309-1 (openssl)");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("Debian Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/packages");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-deb.inc");
+vuln = 0;
+if(isdpkgvuln(pkg:"libcrypto0.9.8-udeb", ver:"0.9.8g-15+lenny11", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libssl-dev", ver:"0.9.8g-15+lenny12", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libssl0.9.8", ver:"0.9.8g-15+lenny12", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libssl0.9.8-dbg", ver:"0.9.8g-15+lenny12", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"openssl", ver:"0.9.8g-15+lenny12", rls:"DEB5.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libcrypto0.9.8-udeb", ver:"0.9.8o-4squeeze1", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libssl-dev", ver:"0.9.8o-4squeeze2", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libssl0.9.8", ver:"0.9.8o-4squeeze2", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"libssl0.9.8-dbg", ver:"0.9.8o-4squeeze2", rls:"DEB6.0")) {
+    vuln = 1;
+}
+if(isdpkgvuln(pkg:"openssl", ver:"0.9.8o-4squeeze2", rls:"DEB6.0")) {
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_apache18.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_apache18.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_apache18.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,114 @@
+#
+#VID 7f6108d2-cea8-11e0-9d58-0800279895ea
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 7f6108d2-cea8-11e0-9d58-0800279895ea
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70253);
+ script_tag(name:"cvss_base", value:"7.8");
+ script_cve_id("CVE-2011-3192");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: apache, apache-event, apache-itk, apache-peruser, apache-worker");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   apache
+   apache-event
+   apache-itk
+   apache-peruser
+   apache-worker
+
+CVE-2011-3192
+The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through
+2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a
+denial of service (memory and CPU consumption) via a Range header that
+expresses multiple overlapping ranges, as exploited in the wild in
+August 2011, a different vulnerability than CVE-2007-0086.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://people.apache.org/~dirkx/CVE-2011-3192.txt
+https://svn.apache.org/viewvc?view=revision&revision=1161534
+https://svn.apache.org/viewvc?view=revision&revision=1162874
+http://www.vuxml.org/freebsd/7f6108d2-cea8-11e0-9d58-0800279895ea.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: apache, apache-event, apache-itk, apache-peruser, apache-worker");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"apache");
+if(!isnull(bver) && revcomp(a:bver, b:"2")>0 && revcomp(a:bver, b:"2.2.20")<0) {
+    security_note(0, data:"Package apache version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"apache-event");
+if(!isnull(bver) && revcomp(a:bver, b:"2")>0 && revcomp(a:bver, b:"2.2.20")<0) {
+    security_note(0, data:"Package apache-event version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"apache-itk");
+if(!isnull(bver) && revcomp(a:bver, b:"2")>0 && revcomp(a:bver, b:"2.2.20")<0) {
+    security_note(0, data:"Package apache-itk version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"apache-peruser");
+if(!isnull(bver) && revcomp(a:bver, b:"2")>0 && revcomp(a:bver, b:"2.2.20")<0) {
+    security_note(0, data:"Package apache-peruser version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"apache-worker");
+if(!isnull(bver) && revcomp(a:bver, b:"2")>0 && revcomp(a:bver, b:"2.2.20")<0) {
+    security_note(0, data:"Package apache-worker version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_bugzilla13.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_bugzilla13.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_bugzilla13.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,140 @@
+#
+#VID dc8741b9-c5d5-11e0-8a8e-00151735203a
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID dc8741b9-c5d5-11e0-8a8e-00151735203a
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70264);
+ script_tag(name:"cvss_base", value:"5.0");
+ script_cve_id("CVE-2011-2379", "CVE-2011-2380", "CVE-2011-2979", "CVE-2011-2381", "CVE-2011-2978", "CVE-2011-2977", "CVE-2011-2976");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: bugzilla");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: bugzilla
+
+CVE-2011-2379
+Cross-site scripting (XSS) vulnerability in Bugzilla 2.4 through
+2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before
+3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3, when
+Internet Explorer before 9 or Safari before 5.0.6 is used for Raw
+Unified mode, allows remote attackers to inject arbitrary web script
+or HTML via a crafted patch, related to content sniffing.
+
+CVE-2011-2380
+Bugzilla 2.23.3 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before
+3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and
+4.1.x before 4.1.3 allows remote attackers to determine the existence
+of private group names via a crafted parameter during (1) bug creation
+or (2) bug editing.
+
+CVE-2011-2979
+Bugzilla 4.1.x before 4.1.3 generates different responses for certain
+assignee queries depending on whether the group name is valid, which
+allows remote attackers to determine the existence of private group
+names via a custom search.  NOTE: this vulnerability exists because of
+a CVE-2010-2756 regression.
+
+CVE-2011-2381
+CRLF injection vulnerability in Bugzilla 2.17.1 through 2.22.7, 3.0.x
+through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x,
+4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to
+inject arbitrary e-mail headers via an attachment description in a
+flagmail notification.
+
+CVE-2011-2978
+Bugzilla 2.16rc1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before
+3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and
+4.1.x before 4.1.3 does not prevent changes to the confirmation e-mail
+address (aka old_email field) for e-mail change notifications, which
+makes it easier for remote attackers to perform arbitrary address
+changes by leveraging an unattended workstation.
+
+CVE-2011-2977
+Bugzilla 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x
+before 4.1.3 on Windows does not delete the temporary files associated
+with uploaded attachments, which allows local users to obtain
+sensitive information by reading these files.  NOTE: this issue exists
+because of a regression in 3.6.
+
+CVE-2011-2976
+Cross-site scripting (XSS) vulnerability in Bugzilla 2.16rc1 through
+2.22.7, 3.0.x through 3.3.x, and 3.4.x before 3.4.12 allows remote
+attackers to inject arbitrary web script or HTML via vectors involving
+a BUGLIST cookie.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://bugzilla.mozilla.org/show_bug.cgi?id=637981
+https://bugzilla.mozilla.org/show_bug.cgi?id=653477
+https://bugzilla.mozilla.org/show_bug.cgi?id=674497
+https://bugzilla.mozilla.org/show_bug.cgi?id=657158
+https://bugzilla.mozilla.org/show_bug.cgi?id=670868
+https://bugzilla.mozilla.org/show_bug.cgi?id=660502
+https://bugzilla.mozilla.org/show_bug.cgi?id=660053
+http://www.vuxml.org/freebsd/dc8741b9-c5d5-11e0-8a8e-00151735203a.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: bugzilla");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"bugzilla");
+if(!isnull(bver) && revcomp(a:bver, b:"2.4")>=0 && revcomp(a:bver, b:"3.6.6")<0) {
+    security_note(0, data:"Package bugzilla version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"4.0")>=0 && revcomp(a:bver, b:"4.0.2")<0) {
+    security_note(0, data:"Package bugzilla version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_ca_root_nss.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,76 @@
+#
+#VID 1b27af46-d6f6-11e0-89a6-080027ef73ec
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 1b27af46-d6f6-11e0-89a6-080027ef73ec
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70251);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: ca_root_nss");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: ca_root_nss
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: ca_root_nss");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"ca_root_nss");
+if(!isnull(bver) && revcomp(a:bver, b:"3.12.11")<0) {
+    security_note(0, data:"Package ca_root_nss version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_cfs.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_cfs.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_cfs.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,85 @@
+#
+#VID e55f948f-d729-11e0-abd1-0017f22d6707
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID e55f948f-d729-11e0-abd1-0017f22d6707
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70250);
+ script_tag(name:"cvss_base", value:"7.5");
+ script_cve_id("CVE-2002-0351");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: cfs");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: cfs
+
+CVE-2002-0351
+Buffer overflows in CFS daemon (cfsd) before 1.3.3-8.1, and 1.4x
+before 1.4.1-5, allow remote attackers to cause a denial of service
+and possibly execute arbitrary code.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.debian.org/security/2002/dsa-116
+http://www.vuxml.org/freebsd/e55f948f-d729-11e0-abd1-0017f22d6707.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: cfs");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"cfs");
+if(!isnull(bver) && revcomp(a:bver, b:"1.4.1_6")<=0) {
+    security_note(0, data:"Package cfs version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_dovecot3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dovecot3.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_dovecot3.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,89 @@
+#
+#VID 0b53f5f7-ca8a-11e0-aea3-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 0b53f5f7-ca8a-11e0-aea3-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70259);
+ script_tag(name:"cvss_base", value:"5.0");
+ script_cve_id("CVE-2011-1929");
+ script_bugtraq_id(47930);
+ script_tag(name:"risk_factor", value:"Medium");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: dovecot");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: dovecot
+
+CVE-2011-1929
+lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and
+2.0.x before 2.0.13 does not properly handle '\0' characters in header
+names, which allows remote attackers to cause a denial of service
+(daemon crash or mailbox corruption) via a crafted e-mail message.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: dovecot");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"dovecot");
+if(!isnull(bver) && revcomp(a:bver, b:"1.2.17")<0) {
+    security_note(0, data:"Package dovecot version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"2.0")>0 && revcomp(a:bver, b:"2.0.13")<0) {
+    security_note(0, data:"Package dovecot version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_dtc.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_dtc.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_dtc.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,104 @@
+#
+#VID 879b0242-c5b6-11e0-abd1-0017f22d6707
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 879b0242-c5b6-11e0-abd1-0017f22d6707
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70265);
+ script_tag(name:"cvss_base", value:"7.5");
+ script_cve_id("CVE-2011-0434", "CVE-2011-0435", "CVE-2011-0436", "CVE-2011-0437");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: dtc");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: dtc
+
+CVE-2011-0434
+Multiple SQL injection vulnerabilities in Domain Technologie Control
+(DTC) before 0.32.9 allow remote attackers to execute arbitrary SQL
+commands via the cid parameter to (1) admin/bw_per_month.php or (2)
+client/bw_per_month.php.
+
+CVE-2011-0435
+Domain Technologie Control (DTC) before 0.32.9 does not require
+authentication for (1) admin/bw_per_month.php and (2)
+client/bw_per_month.php, which allows remote attackers to obtain
+potentially sensitive bandwidth information via a direct request.
+
+CVE-2011-0436
+The register_user function in client/new_account_form.php in Domain
+Technologie Control (DTC) before 0.32.9 includes a cleartext password
+in an e-mail message, which makes it easier for remote attackers to
+obtain sensitive information by sniffing the network.
+
+CVE-2011-0437
+shared/inc/sql/ssh.php in the SSH accounts management implementation
+in Domain Technologie Control (DTC) before 0.32.9 allows remote
+authenticated users to delete arbitrary accounts via the edssh_account
+parameter in a deletesshaccount Delete action.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.debian.org/security/2011/dsa-2179
+http://www.vuxml.org/freebsd/879b0242-c5b6-11e0-abd1-0017f22d6707.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: dtc");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"dtc");
+if(!isnull(bver) && revcomp(a:bver, b:"0.32.9")<0) {
+    security_note(0, data:"Package dtc version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_firefox58.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_firefox58.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_firefox58.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,112 @@
+#
+#VID 834591a9-c82f-11e0-897d-6c626dd55a41
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 834591a9-c82f-11e0-897d-6c626dd55a41
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70261);
+ script_tag(name:"cvss_base", value:"10.0");
+ script_cve_id("CVE-2011-2982", "CVE-2011-0084", "CVE-2011-2981", "CVE-2011-2378", "CVE-2011-2984", "CVE-2011-2980", "CVE-2011-2983", "CVE-2011-2989", "CVE-2011-2991", "CVE-2011-2992", "CVE-2011-2985", "CVE-2011-2993", "CVE-2011-2988", "CVE-2011-2987", "CVE-2011-0084", "CVE-2011-2990", "CVE-2011-2986");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: firefox");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   firefox
+   seamonkey
+   linux-firefox
+   thunderbird
+   linux-thunderbird
+
+For details, please visit the referenced advisories.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.mozilla.org/security/announce/2011/mfsa2011-29.html
+http://www.mozilla.org/security/announce/2011/mfsa2011-30.html
+http://www.vuxml.org/freebsd/834591a9-c82f-11e0-897d-6c626dd55a41.html
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: firefox");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.6.*,1")>0 && revcomp(a:bver, b:"3.6.20,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"5.0.*,1")>0 && revcomp(a:bver, b:"6.0,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"2.3")<0) {
+    security_note(0, data:"Package seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.6.20,1")<0) {
+    security_note(0, data:"Package linux-firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"thunderbird");
+if(!isnull(bver) && revcomp(a:bver, b:"3.1.12")<0) {
+    security_note(0, data:"Package thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-thunderbird");
+if(!isnull(bver) && revcomp(a:bver, b:"3.1.12")<0) {
+    security_note(0, data:"Package linux-thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_freetype23.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_freetype23.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_freetype23.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,88 @@
+#
+#VID 5d374b01-c3ee-11e0-8aa5-485d60cb5385
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 5d374b01-c3ee-11e0-8aa5-485d60cb5385
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70267);
+ script_tag(name:"cvss_base", value:"9.3");
+ script_cve_id("CVE-2011-0226");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: freetype2");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: freetype2
+
+CVE-2011-0226
+Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6,
+as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before
+4.3.4 and other products, allows remote attackers to execute arbitrary
+code or cause a denial of service (memory corruption and application
+crash) via a crafted Type 1 font in a PDF document, as exploited in
+the wild in July 2011.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0226
+http://www.vuxml.org/freebsd/5d374b01-c3ee-11e0-8aa5-485d60cb5385.html
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: freetype2");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"freetype2");
+if(!isnull(bver) && revcomp(a:bver, b:"2.4.6")<0) {
+    security_note(0, data:"Package freetype2 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_isc-dhcp31-server.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_isc-dhcp31-server.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_isc-dhcp31-server.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,101 @@
+#
+#VID 510b630e-c43b-11e0-916c-00e0815b8da8
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 510b630e-c43b-11e0-916c-00e0815b8da8
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70263);
+ script_tag(name:"cvss_base", value:"7.8");
+ script_cve_id("CVE-2011-2748", "CVE-2011-2749");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: isc-dhcp31-server");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   isc-dhcp31-server
+   isc-dhcp41-server
+   isc-dhcp42-server
+
+CVE-2011-2748
+The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before
+3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to
+cause a denial of service (daemon exit) via a crafted DHCP packet.
+
+CVE-2011-2749
+The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before
+3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to
+cause a denial of service (daemon exit) via a crafted BOOTP packet.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: isc-dhcp31-server");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"isc-dhcp31-server");
+if(!isnull(bver) && revcomp(a:bver, b:"3.1.ESV_1,1")<0) {
+    security_note(0, data:"Package isc-dhcp31-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"isc-dhcp41-server");
+if(!isnull(bver) && revcomp(a:bver, b:"4.1.e_2,2")<0) {
+    security_note(0, data:"Package isc-dhcp41-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"isc-dhcp42-server");
+if(!isnull(bver) && revcomp(a:bver, b:"4.2.2")<0) {
+    security_note(0, data:"Package isc-dhcp42-server version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_libXfont.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libXfont.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_libXfont.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,91 @@
+#
+#VID 304409c3-c3ef-11e0-8aa5-485d60cb5385
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 304409c3-c3ef-11e0-8aa5-485d60cb5385
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70266);
+ script_tag(name:"cvss_base", value:"9.3");
+ script_cve_id("CVE-2011-2895");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: libXfont");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: libXfont
+
+CVE-2011-2895
+The LZW decompressor in (1) the BufCompressedFill function in
+fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2)
+compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before
+3.8, FreeBSD, NetBSD, FreeType 2.1.9, and other products, does not
+properly handle code words that are absent from the decompression
+table when encountered, which allows context-dependent attackers to
+trigger an infinite loop or a heap-based buffer overflow, and possibly
+execute arbitrary code, via a crafted compressed stream, a related
+issue to CVE-2006-1168 and CVE-2011-2896.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://bugzilla.redhat.com/show_bug.cgi?id=725760
+http://www.vuxml.org/freebsd/304409c3-c3ef-11e0-8aa5-485d60cb5385.html
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: libXfont");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"libXfont");
+if(!isnull(bver) && revcomp(a:bver, b:"1.4.4,1")<0) {
+    security_note(0, data:"Package libXfont version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_libsndfile1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,86 @@
+#
+#VID b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70247);
+ script_tag(name:"cvss_base", value:"6.8");
+ script_cve_id("CVE-2011-2696");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: libsndfile");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: libsndfile
+
+CVE-2011-2696
+Integer overflow in libsndfile before 1.0.25 allows remote attackers
+to cause a denial of service (application crash) or possibly execute
+arbitrary code via a crafted PARIS Audio Format (PAF) file that
+triggers a heap-based buffer overflow.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://secunia.com/advisories/45125/
+http://www.vuxml.org/freebsd/b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: libsndfile");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"libsndfile");
+if(!isnull(bver) && revcomp(a:bver, b:"1.0.25")<0) {
+    security_note(0, data:"Package libsndfile version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_linux-flashplugin18.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_linux-flashplugin18.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_linux-flashplugin18.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,87 @@
+#
+#VID 2c12ae0c-c38d-11e0-8eb7-001b2134ef46
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 2c12ae0c-c38d-11e0-8eb7-001b2134ef46
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70268);
+ script_tag(name:"cvss_base", value:"10.0");
+ script_cve_id("CVE-2011-2130", "CVE-2011-2134", "CVE-2011-2135", "CVE-2011-2136", "CVE-2011-2137", "CVE-2011-2138", "CVE-2011-2139", "CVE-2011-2140", "CVE-2011-2414", "CVE-2011-2415", "CVE-2011-2416", "CVE-2011-2417", "CVE-2011-2425");
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: linux-flashplugin");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   linux-flashplugin
+   linux-f10-flashplugin
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://www.adobe.com/support/security/bulletins/apsb11-21.html
+http://www.vuxml.org/freebsd/2c12ae0c-c38d-11e0-8eb7-001b2134ef46.html
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: linux-flashplugin");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"linux-flashplugin");
+if(!isnull(bver) && revcomp(a:bver, b:"9.0r289")<=0) {
+    security_note(0, data:"Package linux-flashplugin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-f10-flashplugin");
+if(!isnull(bver) && revcomp(a:bver, b:"10.3r183.5")<0) {
+    security_note(0, data:"Package linux-f10-flashplugin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_mantis5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_mantis5.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_mantis5.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,77 @@
+#
+#VID a83f25df-d775-11e0-8bf1-003067b2972c
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID a83f25df-d775-11e0-8bf1-003067b2972c
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70249);
+ script_cve_id("CVE-2011-2938");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: mantis");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: mantis
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: mantis");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"mantis");
+if(!isnull(bver) && revcomp(a:bver, b:"1.2.0")>=0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package mantis version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_nss0.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_nss0.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_nss0.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,131 @@
+#
+#VID aa5bc971-d635-11e0-b3cf-080027ef73ec
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID aa5bc971-d635-11e0-b3cf-080027ef73ec
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70252);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: nss");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   nss
+   ca_root_nss
+   firefox
+   seamonkey
+   linux-firefox
+   thunderbird
+   linux-thunderbird
+   linux-seamonkey
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.vasco.com/company/press_room/news_archive/2011/news_diginotar_reports_security_incident.aspx
+http://www.mozilla.org/security/announce/2011/mfsa2011-34.html
+http://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html
+http://www.vuxml.org/freebsd/aa5bc971-d635-11e0-b3cf-080027ef73ec.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: nss");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"nss");
+if(!isnull(bver) && revcomp(a:bver, b:"3.12.11")<0) {
+    security_note(0, data:"Package nss version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"ca_root_nss");
+if(!isnull(bver) && revcomp(a:bver, b:"3.12.11")<0) {
+    security_note(0, data:"Package ca_root_nss version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.6.*,1")>0 && revcomp(a:bver, b:"3.6.22,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"4.0.*,1")>0 && revcomp(a:bver, b:"6.0.2,1")<0) {
+    security_note(0, data:"Package firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"2.3.2")<0) {
+    security_note(0, data:"Package seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-firefox");
+if(!isnull(bver) && revcomp(a:bver, b:"3.6.22,1")<0) {
+    security_note(0, data:"Package linux-firefox version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"thunderbird");
+if(!isnull(bver) && revcomp(a:bver, b:"3.1")>0 && revcomp(a:bver, b:"3.1.14")<0) {
+    security_note(0, data:"Package thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"5.0")>0 && revcomp(a:bver, b:"6.0.2")<0) {
+    security_note(0, data:"Package thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-thunderbird");
+if(!isnull(bver) && revcomp(a:bver, b:"3.1.14")<0) {
+    security_note(0, data:"Package linux-thunderbird version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"linux-seamonkey");
+if(!isnull(bver) && revcomp(a:bver, b:"2.3.2")<0) {
+    security_note(0, data:"Package linux-seamonkey version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_openssl4.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_openssl4.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_openssl4.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,83 @@
+#
+#VID 2ecb7b20-d97e-11e0-b2e2-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 2ecb7b20-d97e-11e0-b2e2-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70248);
+ script_cve_id("CVE-2011-3207", "CVE-2011-3210");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: openssl");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: openssl
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.openssl.org/news/secadv_20110906.txt
+http://www.vuxml.org/freebsd/2ecb7b20-d97e-11e0-b2e2-00215c6a37bb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: openssl");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"openssl");
+if(!isnull(bver) && revcomp(a:bver, b:"1.0.0")>=0 && revcomp(a:bver, b:"1.0.0_6")<0) {
+    security_note(0, data:"Package openssl version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"0.9.8")>=0 && revcomp(a:bver, b:"1.0.0")<0) {
+    security_note(0, data:"Package openssl version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_otrs2.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_otrs2.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_otrs2.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,86 @@
+#
+#VID 86baa0d4-c997-11e0-8a8e-00151735203a
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 86baa0d4-c997-11e0-8a8e-00151735203a
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70260);
+ script_tag(name:"cvss_base", value:"4.0");
+ script_cve_id("CVE-2011-2746");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: otrs");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: otrs
+
+CVE-2011-2746
+Unspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in
+OTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and
+3.x before 3.0.10 allows remote authenticated administrators to read
+arbitrary files via unknown vectors.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://otrs.org/advisory/OSA-2011-03-en/
+http://www.vuxml.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: otrs");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"otrs");
+if(!isnull(bver) && revcomp(a:bver, b:"2.1")>0 && revcomp(a:bver, b:"3.0.10")<0) {
+    security_note(0, data:"Package otrs version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_php512.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php512.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_php512.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,78 @@
+#
+#VID 3f1df2f9-cd22-11e0-9bb2-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 3f1df2f9-cd22-11e0-9bb2-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70256);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: php5");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: php5
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://bugs.php.net/bug.php?id=55439
+http://www.vuxml.org/freebsd/3f1df2f9-cd22-11e0-9bb2-00215c6a37bb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: php5");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"php5");
+if(!isnull(bver) && revcomp(a:bver, b:"5.3.7")>=0 && revcomp(a:bver, b:"5.3.7_2")<0) {
+    security_note(0, data:"Package php5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_php513.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_php513.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_php513.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,112 @@
+#
+#VID 057bf770-cac4-11e0-aea3-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 057bf770-cac4-11e0-aea3-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70257);
+ script_tag(name:"cvss_base", value:"7.5");
+ script_cve_id("CVE-2011-2483", "CVE-2011-2202", "CVE-2011-1938", "CVE-2011-1148");
+ script_bugtraq_id(49241);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: php5, php5-sockets");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   php5
+   php5-sockets
+
+CVE-2011-2483
+crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain
+platforms, does not properly handle 8-bit characters, which makes it
+easier for context-dependent attackers to determine a cleartext
+password by leveraging knowledge of a password hash.
+
+CVE-2011-2202
+The rfc1867_post_handler function in main/rfc1867.c in PHP before
+5.3.7 does not properly restrict filenames in multipart/form-data POST
+requests, which allows remote attackers to conduct absolute path
+traversal attacks, and possibly create or overwrite arbitrary files,
+via a crafted upload request, related to a 'file path injection
+vulnerability.'
+
+CVE-2011-1938
+Stack-based buffer overflow in the socket_connect function in
+ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow
+context-dependent attackers to execute arbitrary code via a long
+pathname for a UNIX socket.
+
+CVE-2011-1148
+Use-after-free vulnerability in the substr_replace function in PHP
+5.3.6 and earlier allows context-dependent attackers to cause a denial
+of service (memory corruption) or possibly have unspecified other
+impact by using the same variable for multiple arguments.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: php5, php5-sockets");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"php5");
+if(!isnull(bver) && revcomp(a:bver, b:"5.3.7")<0) {
+    security_note(0, data:"Package php5 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"php5-sockets");
+if(!isnull(bver) && revcomp(a:bver, b:"5.3.7")<0) {
+    security_note(0, data:"Package php5-sockets version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin25.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin25.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin25.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,78 @@
+#
+#VID e44fe906-df27-11e0-a333-001cc0a36e12
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID e44fe906-df27-11e0-a333-001cc0a36e12
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70244);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: phpMyAdmin");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: phpMyAdmin
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://www.phpmyadmin.net/home_page/security/PMASA-2011-14.php
+http://www.vuxml.org/freebsd/e44fe906-df27-11e0-a333-001cc0a36e12.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: phpMyAdmin");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"phpMyAdmin");
+if(!isnull(bver) && revcomp(a:bver, b:"3.4.5")<0) {
+    security_note(0, data:"Package phpMyAdmin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_phpMyAdmin26.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_phpMyAdmin26.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_phpMyAdmin26.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,84 @@
+#
+#VID 75e26236-ce9e-11e0-b26a-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 75e26236-ce9e-11e0-b26a-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70255);
+ script_tag(name:"cvss_base", value:"4.3");
+ script_cve_id("CVE-2011-3181");
+ script_tag(name:"risk_factor", value:"Medium");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: phpMyAdmin");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: phpMyAdmin
+
+CVE-2011-3181
+Multiple cross-site scripting (XSS) vulnerabilities in the Tracking
+feature in phpMyAdmin 3.3.x before 3.3.10.4 and 3.4.x before 3.4.4
+allow remote attackers to inject arbitrary web script or HTML via a
+(1) table name, (2) column name, or (3) index name.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : Medium";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: phpMyAdmin");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"phpMyAdmin");
+if(!isnull(bver) && revcomp(a:bver, b:"3.4.4")<0) {
+    security_note(0, data:"Package phpMyAdmin version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_py23-django5.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_py23-django5.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_py23-django5.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,186 @@
+#
+#VID d01d10c7-de2d-11e0-b215-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID d01d10c7-de2d-11e0-b215-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70245);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("django -- multiple vulnerabilities");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   py23-django
+   py24-django
+   py25-django
+   py26-django
+   py27-django
+   py30-django
+   py31-django
+   py23-django-devel
+   py24-django-devel
+   py25-django-devel
+   py26-django-devel
+   py27-django-devel
+   py30-django-devel
+   py31-django-devel
+
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+https://www.djangoproject.com/weblog/2011/sep/09/security-releases-issued/
+http://www.vuxml.org/freebsd/d01d10c7-de2d-11e0-b215-00215c6a37bb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("django -- multiple vulnerabilities");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"py23-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py23-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py23-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py24-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py24-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py24-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py25-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py25-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py25-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py26-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py26-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py26-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py27-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py27-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py27-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py30-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py30-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py30-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py31-django");
+if(!isnull(bver) && revcomp(a:bver, b:"1.3")>0 && revcomp(a:bver, b:"1.3.1")<0) {
+    security_note(0, data:"Package py31-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+if(!isnull(bver) && revcomp(a:bver, b:"1.2")>0 && revcomp(a:bver, b:"1.2.7")<0) {
+    security_note(0, data:"Package py31-django version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py23-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py23-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py24-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py24-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py25-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py25-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py26-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py26-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py27-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py27-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py30-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py30-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"py31-django-devel");
+if(!isnull(bver) && revcomp(a:bver, b:"16758,1")<0) {
+    security_note(0, data:"Package py31-django-devel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_roundcube1.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_roundcube1.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_roundcube1.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,77 @@
+#
+#VID 4ae68e7c-dda4-11e0-a906-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 4ae68e7c-dda4-11e0-a906-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70246);
+ script_cve_id("CVE-2011-2937");
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: roundcube");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: roundcube
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: roundcube");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"roundcube");
+if(!isnull(bver) && revcomp(a:bver, b:"0.5.4,1")<0) {
+    security_note(0, data:"Package roundcube version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_rubygem-rails3.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_rubygem-rails3.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_rubygem-rails3.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,83 @@
+#
+#VID be77eff6-ca91-11e0-aea3-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID be77eff6-ca91-11e0-aea3-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70258);
+ script_bugtraq_id(49179);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: rubygem-rails");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: rubygem-rails
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6a1e473744bc389b
+http://groups.google.com/group/rubyonrails-security/browse_thread/thread/3420ac71aed312d6
+http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768
+http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b9130749b74ea12
+http://groups.google.com/group/rubyonrails-security/browse_thread/thread/56bffb5923ab1195
+http://www.vuxml.org/freebsd/be77eff6-ca91-11e0-aea3-00215c6a37bb.html
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: rubygem-rails");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"rubygem-rails");
+if(!isnull(bver) && revcomp(a:bver, b:"3.0.10")<0) {
+    security_note(0, data:"Package rubygem-rails version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_samba340.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_samba340.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_samba340.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,102 @@
+#
+#VID 56f4b3a6-c82c-11e0-a498-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID 56f4b3a6-c82c-11e0-a498-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70262);
+ script_tag(name:"cvss_base", value:"6.8");
+ script_cve_id("CVE-2011-2522", "CVE-2011-2694");
+ script_bugtraq_id(48901,48899);
+ script_tag(name:"risk_factor", value:"High");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: samba34");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following packages are affected:
+   samba34
+   samba35
+
+CVE-2011-2522
+Multiple cross-site request forgery (CSRF) vulnerabilities in the
+Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow
+remote attackers to hijack the authentication of administrators for
+requests that (1) shut down daemons, (2) start daemons, (3) add
+shares, (4) remove shares, (5) add printers, (6) remove printers, (7)
+add user accounts, or (8) remove user accounts, as demonstrated by
+certain start, stop, and restart parameters to the status program.
+
+CVE-2011-2694
+Cross-site scripting (XSS) vulnerability in the chg_passwd function in
+web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x
+before 3.5.10 allows remote authenticated administrators to inject
+arbitrary web script or HTML via the username parameter to the passwd
+program (aka the user field to the Change Password page).
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : High";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: samba34");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"samba34");
+if(!isnull(bver) && revcomp(a:bver, b:"3.4")>0 && revcomp(a:bver, b:"3.4.14")<0) {
+    security_note(0, data:"Package samba34 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+bver = portver(pkg:"samba35");
+if(!isnull(bver) && revcomp(a:bver, b:"3.5")>0 && revcomp(a:bver, b:"3.5.10")<0) {
+    security_note(0, data:"Package samba35 version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}

Added: trunk/openvas-plugins/scripts/freebsd_stunnel.nasl
===================================================================
--- trunk/openvas-plugins/scripts/freebsd_stunnel.nasl	2011-09-20 13:38:54 UTC (rev 11640)
+++ trunk/openvas-plugins/scripts/freebsd_stunnel.nasl	2011-09-21 03:47:11 UTC (rev 11641)
@@ -0,0 +1,84 @@
+#
+#VID cdeb34e6-d00d-11e0-987e-00215c6a37bb
+# OpenVAS Vulnerability Test
+# $
+# Description: Auto generated from VID cdeb34e6-d00d-11e0-987e-00215c6a37bb
+#
+# Authors:
+# Thomas Reinke <reinke at securityspace.com>
+#
+# Copyright:
+# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com
+# Text descriptions are largely excerpted from the referenced
+# advisories, and are Copyright (c) the respective author(s)
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2,
+# as published by the Free Software Foundation
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+
+if(description)
+{
+ script_id(70254);
+ script_tag(name:"cvss_base", value:"9.3");
+ script_cve_id("CVE-2011-2940");
+ script_bugtraq_id(49254);
+ script_tag(name:"risk_factor", value:"Critical");
+ script_version ("$Revision$");
+ script_name("FreeBSD Ports: stunnel");
+
+ desc = "The remote host is missing an update to the system
+as announced in the referenced advisory.
+
+The following package is affected: stunnel
+
+CVE-2011-2940
+stunnel 4.40 and 4.41 might allow remote attackers to execute
+arbitrary code or cause a denial of service (heap memory corruption)
+via unspecified vectors.
+
+Solution:
+Update your system with the appropriate patches or
+software upgrades.
+
+
+Risk factor : Critical";
+
+ script_description(desc);
+
+ script_summary("FreeBSD Ports: stunnel");
+
+ script_category(ACT_GATHER_INFO);
+
+ script_copyright("Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com");
+ script_family("FreeBSD Local Security Checks");
+ script_dependencies("gather-package-list.nasl");
+ script_require_keys("ssh/login/freebsdrel");
+ exit(0);
+}
+
+#
+# The script code starts here
+#
+
+include("revisions-lib.inc");
+include("pkg-lib-bsd.inc");
+vuln = 0;
+bver = portver(pkg:"stunnel");
+if(!isnull(bver) && revcomp(a:bver, b:"4.40")>=0 && revcomp(a:bver, b:"4.42")<0) {
+    security_note(0, data:"Package stunnel version " + bver + " is installed which is known to be vulnerable.");
+    vuln = 1;
+}
+
+if(vuln) {
+    security_hole(0);
+}



More information about the Openvas-commits mailing list