[Openvas-nvts-commits] r570 - / scripts/2014

scm-commit at wald.intevation.org scm-commit at wald.intevation.org
Thu Jul 17 15:06:31 CEST 2014


Author: ckuerste
Date: 2014-07-17 15:06:31 +0200 (Thu, 17 Jul 2014)
New Revision: 570

Added:
   scripts/2014/gb_junos_cve_2014-3815.nasl
   scripts/2014/gb_junos_cve_2014-3816.nasl
   scripts/2014/gb_junos_cve_2014-3817.nasl
   scripts/2014/gb_junos_cve_2014-3822.nasl
Modified:
   ChangeLog
Log:
Added new plugins.

Modified: ChangeLog
===================================================================
--- ChangeLog	2014-07-17 06:18:14 UTC (rev 569)
+++ ChangeLog	2014-07-17 13:06:31 UTC (rev 570)
@@ -1,3 +1,11 @@
+2014-07-17 Christian Kuersteiner <christian.kuersteiner at greenbone.net>
+
+	* scripts/2014/gb_junos_cve_2014-3815.nasl,
+	scripts/2014/gb_junos_cve_2014-3816.nasl,
+	scripts/2014/gb_junos_cve_2014-3817.nasl,
+	scripts/2014/gb_junos_cve_2014-3822.nasl:
+	Added new plugins.
+
 2014-07-17 Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/2014/gb_snmp_reflected_dos.nasl:

Added: scripts/2014/gb_junos_cve_2014-3815.nasl
===================================================================
--- scripts/2014/gb_junos_cve_2014-3815.nasl	                        (rev 0)
+++ scripts/2014/gb_junos_cve_2014-3815.nasl	2014-07-17 13:06:31 UTC (rev 570)
@@ -0,0 +1,125 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Junos SIP ALG Denial of Service Vulnerability
+#
+# Authors:
+# Christian Kuersteiner <christian.kuersteiner at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2014 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+SCRIPT_DESC = "Junos SIP ALG Denial of Service Vulnerability";
+
+tag_insight = "On SRX Series devices, when SIP ALG is enabled, a certain crafted
+SIP packet may cause the flowd process to crash. SIP ALG is enabled by default
+on SRX Series devices except for SRX-HE devices. SRX-HE devices have SIP ALG 
+disabled by default. The status of ALGs can beobtained by executing the
+'show security alg status' CLI command.";
+
+tag_impact = "Repeated crashes of the flowd process constitutes an extended
+denial of service condition for the SRX Series device.";
+
+tag_affected = "Junos OS 12.1X46 and 12.1X47";
+
+tag_summary = "DoS on SRX devices when SIP ALG is enabled";
+
+tag_solution = "New builds of Junos OS software are available from Juniper. As a
+workaround disable SIP ALG or enable flow-based processing for IPv6 traffic.";
+
+tag_vuldetect = "Check the OS build.";
+
+if (description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.105914");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
+  script_version ("$Revision$");
+
+  script_name(SCRIPT_DESC);
+
+  desc = "
+Summary:
+" + tag_summary + "
+
+Vulnerability Detection:
+" + tag_vuldetect + "
+
+Vulnerability Insight:
+" + tag_insight + "
+
+Impact:
+" + tag_impact + "
+
+Affected Software/OS:
+" + tag_affected + "
+
+Solution:
+" + tag_solution;
+
+  script_xref(name:"URL", value:"http://kb.juniper.net/JSA10633");
+  script_cve_id("CVE-2014-3815");
+  script_bugtraq_id(68551);
+  
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-17 14:33:08 +0200 (Thu, 17 Jul 2014)");
+  script_description(desc);
+  script_summary("Junos Flowd Denial of Service");
+  script_category(ACT_GATHER_INFO);
+  script_family("General");
+  script_copyright("This script is Copyright (C) 2014 Greenbone Networks GmbH");
+  script_dependencies("gb_ssh_junos_get_version.nasl","gb_junos_snmp_version.nasl");
+  script_mandatory_keys("Junos/Build", "Junos/Version");
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0) {
+    script_tag(name : "impact" , value : tag_impact);
+    script_tag(name : "vuldetect" , value : tag_vuldetect);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+    script_tag(name : "summary" , value : tag_summary);
+    script_tag(name : "affected" , value : tag_affected);
+  }
+ 
+  exit(0);
+}
+
+include("version_func.inc");
+
+version = get_kb_item("Junos/Version");
+if (!version)
+  exit(0);
+
+desc += "Version:
+" + version;
+
+if (version =~ "^12.1X") {
+  if ((revcomp(a:version, b:"12.1X46-D20") < 0) &&
+      (revcomp(a:version, b:"12.1X46") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:" 12.1X47-D10") < 0) &&
+           (revcomp(a:version, b:"12.1X47") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+}


Property changes on: scripts/2014/gb_junos_cve_2014-3815.nasl
___________________________________________________________________
Added: svn:keywords
   + Id Revision Date

Added: scripts/2014/gb_junos_cve_2014-3816.nasl
===================================================================
--- scripts/2014/gb_junos_cve_2014-3816.nasl	                        (rev 0)
+++ scripts/2014/gb_junos_cve_2014-3816.nasl	2014-07-17 13:06:31 UTC (rev 570)
@@ -0,0 +1,172 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Junos Multiple Privilege Escalation Vulnerabilities
+#
+# Authors:
+# Christian Kuersteiner <christian.kuersteiner at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2014 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+SCRIPT_DESC = "Junos Multiple Privilege Escalation Vulnerabilities";
+
+tag_insight = "Certain combinations of Junos OS CLI commands and arguments have
+been found to be exploitable in a way that can allow root access to the
+operating system.";
+
+tag_impact = "Users with permissions to run certain CLI commands may achieve
+elevated privileges and gain complete control on the device.";
+
+tag_affected = "Junos OS 11.4, 12.1, 12.2, 12.3, 13.1, 13.2 and 13.3";
+
+tag_summary = "Priviledge Escalation Vulnerability over CLI";
+
+tag_solution = "New builds of Junos OS software are available from Juniper.";
+
+tag_vuldetect = "Check the OS build.";
+
+if (description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.105915");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
+  script_version ("$Revision$");
+
+  script_name(SCRIPT_DESC);
+
+  desc = "
+Summary:
+" + tag_summary + "
+
+Vulnerability Detection:
+" + tag_vuldetect + "
+
+Vulnerability Insight:
+" + tag_insight + "
+
+Impact:
+" + tag_impact + "
+
+Affected Software/OS:
+" + tag_affected + "
+
+Solution:
+" + tag_solution;
+
+  script_xref(name:"URL", value:"http://kb.juniper.net/JSA10634");
+  script_cve_id("CVE-2014-3816");
+  script_bugtraq_id(68541);
+  
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-17 14:38:16 +0200 (Thu, 17 Jul 2014)");
+  script_description(desc);
+  script_summary("Junos CLI Privilege Escalation");
+  script_category(ACT_GATHER_INFO);
+  script_family("General");
+  script_copyright("This script is Copyright (C) 2014 Greenbone Networks GmbH");
+  script_dependencies("gb_ssh_junos_get_version.nasl","gb_junos_snmp_version.nasl");
+  script_mandatory_keys("Junos/Build", "Junos/Version");
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0) {
+    script_tag(name : "impact" , value : tag_impact);
+    script_tag(name : "vuldetect" , value : tag_vuldetect);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+    script_tag(name : "summary" , value : tag_summary);
+    script_tag(name : "affected" , value : tag_affected);
+  }
+ 
+  exit(0);
+}
+
+include("version_func.inc");
+
+version = get_kb_item("Junos/Version");
+if (!version)
+  exit(0);
+
+build = get_kb_item("Junos/Build");
+if (!build)
+  exit(0);
+
+desc += "Version/Build-Date:
+" + version + " / " + build;
+
+if (revcomp(a:version, b:"11.4R12") < 0) {
+  security_message(port:port, data:desc);
+  exit(0);
+}
+
+if (version =~ "^12") {
+  if (revcomp(a:version, b:"12.1R11") < 0) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X44-D35") < 0) &&
+           (revcomp(a:version, b:"12.1X44") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X45-D30") < 0) &&
+           (revcomp(a:version, b:"12.1X45") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X46-D20") < 0) &&
+           (revcomp(a:version, b:"12.1X46") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X47-D10") < 0) &&
+           (revcomp(a:version, b:"12.1X47") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.2R8-S2") < 0) &&
+           (revcomp(a:version, b:"12.2") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.3R7") < 0) &&
+           (revcomp(a:version, b:"12.3") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+}
+
+if (version =~ "^13") {
+  if (revcomp(a:version, b:"13.1R4-S2") < 0) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"13.2R5") < 0) &&
+           (revcomp(a:version, b:"13.2") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"13.3R2-S2") < 0) &&
+           (revcomp(a:version, b:"13.3") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+}


Property changes on: scripts/2014/gb_junos_cve_2014-3816.nasl
___________________________________________________________________
Added: svn:keywords
   + Id Revision Date

Added: scripts/2014/gb_junos_cve_2014-3817.nasl
===================================================================
--- scripts/2014/gb_junos_cve_2014-3817.nasl	                        (rev 0)
+++ scripts/2014/gb_junos_cve_2014-3817.nasl	2014-07-17 13:06:31 UTC (rev 570)
@@ -0,0 +1,141 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Junos NAT Protocol Translation Denial of Service Vulnerability
+#
+# Authors:
+# Christian Kuersteiner <christian.kuersteiner at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2014 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+SCRIPT_DESC = "Junos NAT Protocol Translation Denial of Service Vulnerability";
+
+tag_insight = "On SRX Series devices, when NAT protocol translation from IPv4 to
+IPv6 is enabled, a certain crafted packet may cause the flowd process to hang or crash.";
+
+tag_impact = "A hang or repeated crash of the flowd process constitutes an extended
+denial of service condition for SRX Series devices.";
+
+tag_affected = "Junos OS 11.4, 12.1X44, 12.1X45 or 12.1X46.";
+
+tag_summary = "DoS in NAT Protocol Translation";
+
+tag_solution = "New builds of Junos OS software are available from Juniper. As a
+workaround disable NAT protocol translation if it is not required.";
+
+tag_vuldetect = "Check the OS build.";
+
+if (description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.105916");
+  script_tag(name:"cvss_base", value:"7.8");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
+  script_version ("$Revision$");
+
+  script_name(SCRIPT_DESC);
+
+  desc = "
+Summary:
+" + tag_summary + "
+
+Vulnerability Detection:
+" + tag_vuldetect + "
+
+Vulnerability Insight:
+" + tag_insight + "
+
+Impact:
+" + tag_impact + "
+
+Affected Software/OS:
+" + tag_affected + "
+
+Solution:
+" + tag_solution;
+
+  script_xref(name:"URL", value:"http://kb.juniper.net/JSA10635");
+  script_cve_id("CVE-2014-3817");
+  script_bugtraq_id(68545);
+  
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-17 14:24:53 +0200 (Thu, 17 Jul 2014)");
+  script_description(desc);
+  script_summary("Junos NAT translation DoS");
+  script_category(ACT_GATHER_INFO);
+  script_family("General");
+  script_copyright("This script is Copyright (C) 2014 Greenbone Networks GmbH");
+  script_dependencies("gb_ssh_junos_get_version.nasl","gb_junos_snmp_version.nasl");
+  script_mandatory_keys("Junos/Build", "Junos/Version");
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0) {
+    script_tag(name : "impact" , value : tag_impact);
+    script_tag(name : "vuldetect" , value : tag_vuldetect);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+    script_tag(name : "summary" , value : tag_summary);
+    script_tag(name : "affected" , value : tag_affected);
+  }
+ 
+  exit(0);
+}
+
+include("version_func.inc");
+
+version = get_kb_item("Junos/Version");
+if (!version)
+  exit(0);
+
+build = get_kb_item("Junos/Build");
+if (!build)
+  exit(0);
+
+desc += "Version/Build-Date:
+" + version + " / " + build;
+
+if (revcomp(a:version, b:"11.4R12") < 0) {
+  security_message(port:port, data:desc);
+  exit(0);
+}
+
+if (version =~ "^12") {
+  if ((revcomp(a:version, b:"12.1X44-D35") < 0) &&
+      (revcomp(a:version, b:"12.1X44") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X45-D25") < 0) &&
+           (revcomp(a:version, b:"12.1X45") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X46-D20") < 0) &&
+           (revcomp(a:version, b:"12.1X46") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X47-D10") < 0) &&
+           (revcomp(a:version, b:"12.1X47") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+}


Property changes on: scripts/2014/gb_junos_cve_2014-3817.nasl
___________________________________________________________________
Added: svn:keywords
   + Id Revision Date

Added: scripts/2014/gb_junos_cve_2014-3822.nasl
===================================================================
--- scripts/2014/gb_junos_cve_2014-3822.nasl	                        (rev 0)
+++ scripts/2014/gb_junos_cve_2014-3822.nasl	2014-07-17 13:06:31 UTC (rev 570)
@@ -0,0 +1,147 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Junos IPv6 to IPv4 Translating Denial of Service Vulnerability
+#
+# Authors:
+# Christian Kuersteiner <christian.kuersteiner at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2014 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+SCRIPT_DESC = "Junos IPv6 to IPv4 Translating Denial of Service Vulnerability";
+
+tag_insight = "A denial of service (DoS) issue has been discovered in Juniper SRX
+Series products that can be exploited by remote unauthenticated attackers. This issue
+takes place when a certain malformed packet is translated from IPv6 to IPv4. When this
+malformed packet is sent to a vulnerable SRX Series device, the flowd process may crash.";
+
+tag_impact = "Unauthenticated attackers can cause a DoS condition by repeatedly exploiting
+this vulnerability.";
+
+tag_affected = "Junos OS 11.4, 12.1, 12.1X44, 12.1X45 and 12.1X46.";
+
+tag_summary = "DoS when translating from IPv6 to IPv4.";
+
+tag_solution = "New builds of Junos OS software are available from Juniper. As a
+workaround disable NAT translation from IPv6 to IPv4 if not required.";
+
+tag_vuldetect = "Check the OS build.";
+
+if (description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.105917");
+  script_tag(name:"cvss_base", value:"5.4");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:N/I:N/A:C");
+  script_version ("$Revision$");
+
+  script_name(SCRIPT_DESC);
+
+  desc = "
+Summary:
+" + tag_summary + "
+
+Vulnerability Detection:
+" + tag_vuldetect + "
+
+Vulnerability Insight:
+" + tag_insight + "
+
+Impact:
+" + tag_impact + "
+
+Affected Software/OS:
+" + tag_affected + "
+
+Solution:
+" + tag_solution;
+
+  script_xref(name:"URL", value:"http://kb.juniper.net/JSA10641");
+  script_cve_id("CVE-2014-3822");
+  script_bugtraq_id(68553);
+  
+  script_tag(name:"risk_factor", value:"High");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-17 14:40:26 +0200 (Thu, 17 Jul 2014)");
+  script_description(desc);
+  script_summary("Junos DoS when translating traffic from IPv6 to IPv4");
+  script_category(ACT_GATHER_INFO);
+  script_family("General");
+  script_copyright("This script is Copyright (C) 2014 Greenbone Networks GmbH");
+  script_dependencies("gb_ssh_junos_get_version.nasl","gb_junos_snmp_version.nasl");
+  script_mandatory_keys("Junos/Build", "Junos/Version");
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0) {
+    script_tag(name : "impact" , value : tag_impact);
+    script_tag(name : "vuldetect" , value : tag_vuldetect);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+    script_tag(name : "summary" , value : tag_summary);
+    script_tag(name : "affected" , value : tag_affected);
+  }
+ 
+  exit(0);
+}
+
+include("version_func.inc");
+
+version = get_kb_item("Junos/Version");
+if (!version)
+  exit(0);
+
+build = get_kb_item("Junos/Build");
+if (!build)
+  exit(0);
+
+desc += "Version/Build-Date:
+" + version + " / " + build;
+
+if (revcomp(a:version, b:"11.4R8") < 0) {
+  security_message(port:port, data:desc);
+  exit(0);
+}
+
+if (version =~ "^12") {
+  if (revcomp(a:version, b:"12.1R5") < 0) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X44-D20") < 0) &&
+           (revcomp(a:version, b:"12.1X44") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X45-D15") < 0) &&
+           (revcomp(a:version, b:"12.1X45") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X46-D10") < 0) &&
+           (revcomp(a:version, b:"12.1X46") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+  else if ((revcomp(a:version, b:"12.1X47-D10") < 0) &&
+           (revcomp(a:version, b:"12.1X47") >= 0)) {
+    security_message(port:port, data:desc);
+    exit(0);
+  }
+}


Property changes on: scripts/2014/gb_junos_cve_2014-3822.nasl
___________________________________________________________________
Added: svn:keywords
   + Id Revision Date



More information about the Openvas-nvts-commits mailing list