[Openvas-nvts-commits] r573 - / scripts/2014

scm-commit at wald.intevation.org scm-commit at wald.intevation.org
Fri Jul 18 10:07:41 CEST 2014


Author: antu123
Date: 2014-07-18 10:07:41 +0200 (Fri, 18 Jul 2014)
New Revision: 573

Added:
   scripts/2014/gb_CESA-2014_0861_lzo_centos6.nasl
   scripts/2014/gb_CESA-2014_0865_tomcat6_centos6.nasl
   scripts/2014/gb_CESA-2014_0866_libsmbclient_centos6.nasl
   scripts/2014/gb_CESA-2014_0866_samba3x_centos5.nasl
   scripts/2014/gb_RHSA-2014_0861-01_lzo.nasl
   scripts/2014/gb_RHSA-2014_0865-01_tomcat6.nasl
   scripts/2014/gb_RHSA-2014_0866-01_samba_and_samba3x.nasl
   scripts/2014/gb_RHSA-2014_0867-01_samba.nasl
   scripts/2014/gb_fedora_2014_7333_ReviewBoard_fc19.nasl
   scripts/2014/gb_fedora_2014_7333_python-django-evolution_fc19.nasl
   scripts/2014/gb_fedora_2014_7348_ReviewBoard_fc20.nasl
   scripts/2014/gb_fedora_2014_7348_python-django-evolution_fc20.nasl
   scripts/2014/gb_fedora_2014_7577_claws-mail-plugins_fc20.nasl
   scripts/2014/gb_fedora_2014_7577_claws-mail_fc20.nasl
   scripts/2014/gb_fedora_2014_7654_samba_fc19.nasl
   scripts/2014/gb_fedora_2014_7780_python-pycadf_fc20.nasl
   scripts/2014/gb_fedora_2014_7782_php_fc19.nasl
   scripts/2014/gb_fedora_2014_7799_openstack-ceilometer_fc20.nasl
   scripts/2014/gb_fedora_2014_7836_cacti_fc20.nasl
   scripts/2014/gb_fedora_2014_7849_cacti_fc19.nasl
   scripts/2014/gb_fedora_2014_7954_openstack-nova_fc20.nasl
   scripts/2014/gb_fedora_2014_7964_owncloud_fc20.nasl
   scripts/2014/gb_fedora_2014_7997_ansible_fc19.nasl
   scripts/2014/gb_fedora_2014_8021_docker-io_fc20.nasl
   scripts/2014/gb_fedora_2014_8032_ansible_fc20.nasl
   scripts/2014/gb_fedora_2014_8034_docker-io_fc19.nasl
   scripts/2014/gb_fedora_2014_8059_dbus_fc20.nasl
   scripts/2014/gb_fedora_2014_8098_pnp4nagios_fc20.nasl
   scripts/2014/gb_fedora_2014_8107_pnp4nagios_fc19.nasl
   scripts/2014/gb_fedora_2014_8171_kernel_fc20.nasl
   scripts/2014/gb_suse_2014_0878_1.nasl
   scripts/2014/gb_ubuntu_USN_2275_1.nasl
   scripts/2014/gb_ubuntu_USN_2276_1.nasl
Modified:
   ChangeLog
Log:
Added new auto generated plugins.

Modified: ChangeLog
===================================================================
--- ChangeLog	2014-07-18 05:49:54 UTC (rev 572)
+++ ChangeLog	2014-07-18 08:07:41 UTC (rev 573)
@@ -1,5 +1,42 @@
 2014-07-18 Antu Sanadi <santu at secpod.com>
 
+	* scripts/2014/gb_CESA-2014_0861_lzo_centos6.nasl,
+	scripts/2014/gb_CESA-2014_0865_tomcat6_centos6.nasl,
+	scripts/2014/gb_CESA-2014_0866_libsmbclient_centos6.nasl,
+	scripts/2014/gb_CESA-2014_0866_samba3x_centos5.nasl,
+	scripts/2014/gb_fedora_2014_7333_python-django-evolution_fc19.nasl,
+	scripts/2014/gb_fedora_2014_7333_ReviewBoard_fc19.nasl,
+	scripts/2014/gb_fedora_2014_7348_python-django-evolution_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7348_ReviewBoard_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7577_claws-mail_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7577_claws-mail-plugins_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7654_samba_fc19.nasl,
+	scripts/2014/gb_fedora_2014_7780_python-pycadf_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7782_php_fc19.nasl,
+	scripts/2014/gb_fedora_2014_7799_openstack-ceilometer_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7836_cacti_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7849_cacti_fc19.nasl,
+	scripts/2014/gb_fedora_2014_7954_openstack-nova_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7964_owncloud_fc20.nasl,
+	scripts/2014/gb_fedora_2014_7997_ansible_fc19.nasl,
+	scripts/2014/gb_fedora_2014_8021_docker-io_fc20.nasl,
+	scripts/2014/gb_fedora_2014_8032_ansible_fc20.nasl,
+	scripts/2014/gb_fedora_2014_8034_docker-io_fc19.nasl,
+	scripts/2014/gb_fedora_2014_8059_dbus_fc20.nasl,
+	scripts/2014/gb_fedora_2014_8098_pnp4nagios_fc20.nasl,
+	scripts/2014/gb_fedora_2014_8107_pnp4nagios_fc19.nasl,
+	scripts/2014/gb_fedora_2014_8171_kernel_fc20.nasl,
+	scripts/2014/gb_RHSA-2014_0861-01_lzo.nasl,
+	scripts/2014/gb_RHSA-2014_0865-01_tomcat6.nasl,
+	scripts/2014/gb_RHSA-2014_0866-01_samba_and_samba3x.nasl,
+	scripts/2014/gb_RHSA-2014_0867-01_samba.nasl,
+	scripts/2014/gb_suse_2014_0878_1.nasl,
+	scripts/2014/gb_ubuntu_USN_2275_1.nasl,
+	scripts/2014/gb_ubuntu_USN_2276_1.nasl:
+	Added new auto generated plugins.
+
+2014-07-18 Antu Sanadi <santu at secpod.com>
+
 	* scripts/2014/deb_2979.nasl:
 	Added new auto generated plugins.
 

Added: scripts/2014/gb_CESA-2014_0861_lzo_centos6.nasl
===================================================================
--- scripts/2014/gb_CESA-2014_0861_lzo_centos6.nasl	                        (rev 0)
+++ scripts/2014/gb_CESA-2014_0861_lzo_centos6.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,123 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for lzo CESA-2014:0861 centos6 
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.881958");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 15:37:04 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4607");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("CentOS Update for lzo CESA-2014:0861 centos6 ");
+
+  tag_insight = "LZO is a portable lossless data compression library written
+in ANSI C.
+An integer overflow flaw was found in the way the lzo library decompressed
+certain archives compressed with the LZO algorithm. An attacker could
+create a specially crafted LZO-compressed input that, when decompressed by
+an application using the lzo library, would cause that application to crash
+or, potentially, execute arbitrary code. (CVE-2014-4607)
+
+Red Hat would like to thank Don A. Bailey from Lab Mouse Security for
+reporting this issue.
+
+All lzo users are advised to upgrade to these updated packages, which
+contain a backported patch to correct this issue. For the update to take
+effect, all services linked to the lzo library must be restarted or the
+system rebooted.
+";
+
+  tag_affected = "lzo on CentOS 6";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "CESA", value: "2014:0861");
+  script_xref(name: "URL" , value: "http://lists.centos.org/pipermail/centos-announce/2014-July/020401.html");
+  script_summary("Check for the Version of lzo");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:centos:centos", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS6")
+{
+
+  if ((res = isrpmvuln(pkg:"lzo", rpm:"lzo~2.03~3.1.el6_5.1", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"lzo-devel", rpm:"lzo-devel~2.03~3.1.el6_5.1", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"lzo-minilzo", rpm:"lzo-minilzo~2.03~3.1.el6_5.1", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_CESA-2014_0861_lzo_centos6.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_CESA-2014_0865_tomcat6_centos6.nasl
===================================================================
--- scripts/2014/gb_CESA-2014_0865_tomcat6_centos6.nasl	                        (rev 0)
+++ scripts/2014/gb_CESA-2014_0865_tomcat6_centos6.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,182 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for tomcat6 CESA-2014:0865 centos6 
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.881960");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 15:43:57 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0075", "CVE-2014-0096", "CVE-2014-0099", "CVE-2014-0050",
+                "CVE-2013-4322");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("CentOS Update for tomcat6 CESA-2014:0865 centos6 ");
+
+  tag_insight = "Apache Tomcat is a servlet container for the Java Servlet and
+JavaServer Pages (JSP) technologies.
+
+It was discovered that Apache Tomcat did not limit the length of chunk
+sizes when using chunked transfer encoding. A remote attacker could use
+this flaw to perform a denial of service attack against Tomcat by streaming
+an unlimited quantity of data, leading to excessive consumption of server
+resources. (CVE-2014-0075)
+
+It was found that Apache Tomcat did not check for overflowing values when
+parsing request content length headers. A remote attacker could use this
+flaw to perform an HTTP request smuggling attack on a Tomcat server located
+behind a reverse proxy that processed the content length header correctly.
+(CVE-2014-0099)
+
+It was found that the org.apache.catalina.servlets.DefaultServlet
+implementation in Apache Tomcat allowed the definition of XML External
+Entities (XXEs) in provided XSLTs. A malicious application could use this
+to circumvent intended security restrictions to disclose sensitive
+information. (CVE-2014-0096)
+
+The CVE-2014-0075 issue was discovered by David Jorm of Red Hat Product
+Security.
+
+This update also fixes the following bugs:
+
+* The patch that resolved the CVE-2014-0050 issue contained redundant code.
+This update removes the redundant code. (BZ#1094528)
+
+* The patch that resolved the CVE-2013-4322 issue contained an invalid
+check that triggered a java.io.EOFException while reading trailer headers
+for chunked requests. This update fixes the check and the aforementioned
+exception is no longer triggered in the described scenario. (BZ#1095602)
+
+All Tomcat 6 users are advised to upgrade to these updated packages, which
+contain backported patches to correct these issues. Tomcat must be
+restarted for this update to take effect.
+";
+
+  tag_affected = "tomcat6 on CentOS 6";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "CESA", value: "2014:0865");
+  script_xref(name: "URL" , value: "http://lists.centos.org/pipermail/centos-announce/2014-July/020403.html");
+  script_summary("Check for the Version of tomcat6");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:centos:centos", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS6")
+{
+
+  if ((res = isrpmvuln(pkg:"tomcat6", rpm:"tomcat6~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-admin-webapps", rpm:"tomcat6-admin-webapps~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-docs-webapp", rpm:"tomcat6-docs-webapp~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-el", rpm:"tomcat6-el~2.1~api~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-javadoc", rpm:"tomcat6-javadoc~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-jsp", rpm:"tomcat6-jsp~2.1~api~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-lib", rpm:"tomcat6-lib~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-servlet", rpm:"tomcat6-servlet~2.5~api~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-webapps", rpm:"tomcat6-webapps~6.0.24~72.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_CESA-2014_0865_tomcat6_centos6.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_CESA-2014_0866_libsmbclient_centos6.nasl
===================================================================
--- scripts/2014/gb_CESA-2014_0866_libsmbclient_centos6.nasl	                        (rev 0)
+++ scripts/2014/gb_CESA-2014_0866_libsmbclient_centos6.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,186 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for libsmbclient CESA-2014:0866 centos6 
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.881959");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 15:39:14 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0244", "CVE-2014-3493");
+  script_tag(name:"cvss_base", value:"3.3");
+  script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("CentOS Update for libsmbclient CESA-2014:0866 centos6 ");
+
+  tag_insight = "Samba is an open-source implementation of the Server Message
+Block (SMB) or Common Internet File System (CIFS) protocol, which allows
+PC-compatible machines to share files, printers, and other information.
+
+A denial of service flaw was found in the way the sys_recvfile() function
+of nmbd, the NetBIOS message block daemon, processed non-blocking sockets.
+An attacker could send a specially crafted packet that, when processed,
+would cause nmbd to enter an infinite loop and consume an excessive amount
+of CPU time. (CVE-2014-0244)
+
+It was discovered that smbd, the Samba file server daemon, did not properly
+handle certain files that were stored on the disk and used a valid Unicode
+character in the file name. An attacker able to send an authenticated
+non-Unicode request that attempted to read such a file could cause smbd to
+crash. (CVE-2014-3493)
+
+Red Hat would like to thank Daniel Berteaud of FIREWALL-SERVICES SARL for
+reporting CVE-2014-0244, and the Samba project for reporting CVE-2014-3493.
+The Samba project acknowledges Simon Arlott as the original reporter of
+CVE-2014-3493.
+
+All Samba users are advised to upgrade to these updated packages, which
+contain backported patches to correct these issues. After installing this
+update, the smb service will be restarted automatically.
+";
+
+  tag_affected = "libsmbclient on CentOS 6";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "CESA", value: "2014:0866");
+  script_xref(name: "URL" , value: "http://lists.centos.org/pipermail/centos-announce/2014-July/020405.html");
+  script_summary("Check for the Version of libsmbclient");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:centos:centos", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS6")
+{
+
+  if ((res = isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba", rpm:"samba~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-domainjoin-gui", rpm:"samba-domainjoin-gui~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-swat", rpm:"samba-swat~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind-clients", rpm:"samba-winbind-clients~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind-devel", rpm:"samba-winbind-devel~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind-krb5-locator", rpm:"samba-winbind-krb5-locator~3.6.9~169.el6_5", rls:"CentOS6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_CESA-2014_0866_libsmbclient_centos6.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_CESA-2014_0866_samba3x_centos5.nasl
===================================================================
--- scripts/2014/gb_CESA-2014_0866_samba3x_centos5.nasl	                        (rev 0)
+++ scripts/2014/gb_CESA-2014_0866_samba3x_centos5.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,162 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# CentOS Update for samba3x CESA-2014:0866 centos5 
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.881961");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 15:55:19 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0244", "CVE-2014-3493");
+  script_tag(name:"cvss_base", value:"3.3");
+  script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("CentOS Update for samba3x CESA-2014:0866 centos5 ");
+
+  tag_insight = "Samba is an open-source implementation of the Server Message
+Block (SMB) or Common Internet File System (CIFS) protocol, which allows
+PC-compatible machines to share files, printers, and other information.
+
+A denial of service flaw was found in the way the sys_recvfile() function
+of nmbd, the NetBIOS message block daemon, processed non-blocking sockets.
+An attacker could send a specially crafted packet that, when processed,
+would cause nmbd to enter an infinite loop and consume an excessive amount
+of CPU time. (CVE-2014-0244)
+
+It was discovered that smbd, the Samba file server daemon, did not properly
+handle certain files that were stored on the disk and used a valid Unicode
+character in the file name. An attacker able to send an authenticated
+non-Unicode request that attempted to read such a file could cause smbd to
+crash. (CVE-2014-3493)
+
+Red Hat would like to thank Daniel Berteaud of FIREWALL-SERVICES SARL for
+reporting CVE-2014-0244, and the Samba project for reporting CVE-2014-3493.
+The Samba project acknowledges Simon Arlott as the original reporter of
+CVE-2014-3493.
+
+All Samba users are advised to upgrade to these updated packages, which
+contain backported patches to correct these issues. After installing this
+update, the smb service will be restarted automatically.
+";
+
+  tag_affected = "samba3x on CentOS 5";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "CESA", value: "2014:0866");
+  script_xref(name: "URL" , value: "http://lists.centos.org/pipermail/centos-announce/2014-July/020404.html");
+  script_summary("Check for the Version of samba3x");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("CentOS Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:centos:centos", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "CentOS5")
+{
+
+  if ((res = isrpmvuln(pkg:"samba3x", rpm:"samba3x~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-client", rpm:"samba3x-client~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-common", rpm:"samba3x-common~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-doc", rpm:"samba3x-doc~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-domainjoin-gui", rpm:"samba3x-domainjoin-gui~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-swat", rpm:"samba3x-swat~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-winbind", rpm:"samba3x-winbind~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-winbind-devel", rpm:"samba3x-winbind-devel~3.6.6~0.140.el5_10", rls:"CentOS5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_CESA-2014_0866_samba3x_centos5.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_RHSA-2014_0861-01_lzo.nasl
===================================================================
--- scripts/2014/gb_RHSA-2014_0861-01_lzo.nasl	                        (rev 0)
+++ scripts/2014/gb_RHSA-2014_0861-01_lzo.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,146 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for lzo RHSA-2014:0861-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.871198");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 17:14:41 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4607");
+  script_tag(name:"cvss_base", value:"5.5");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:S/C:P/I:P/A:C");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("RedHat Update for lzo RHSA-2014:0861-01");
+
+  tag_insight = "LZO is a portable lossless data compression library written in ANSI C.
+
+An integer overflow flaw was found in the way the lzo library decompressed
+certain archives compressed with the LZO algorithm. An attacker could
+create a specially crafted LZO-compressed input that, when decompressed by
+an application using the lzo library, would cause that application to crash
+or, potentially, execute arbitrary code. (CVE-2014-4607)
+
+Red Hat would like to thank Don A. Bailey from Lab Mouse Security for
+reporting this issue.
+
+All lzo users are advised to upgrade to these updated packages, which
+contain a backported patch to correct this issue. For the update to take
+effect, all services linked to the lzo library must be restarted or the
+system rebooted.
+";
+
+  tag_affected = "lzo on Red Hat Enterprise Linux Desktop (v. 6),
+  Red Hat Enterprise Linux Server (v. 6),
+  Red Hat Enterprise Linux Server (v. 7),
+  Red Hat Enterprise Linux Workstation (v. 6)";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "RHSA", value: "2014:0861-01");
+  script_xref(name: "URL" , value: "https://www.redhat.com/archives/rhsa-announce/2014-July/msg00016.html");
+  script_summary("Check for the Version of lzo");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:redhat:enterprise_linux", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_7")
+{
+
+  if ((res = isrpmvuln(pkg:"lzo", rpm:"lzo~2.06~6.el7_0.2", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"lzo-debuginfo", rpm:"lzo-debuginfo~2.06~6.el7_0.2", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"lzo-minilzo", rpm:"lzo-minilzo~2.06~6.el7_0.2", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "RHENT_6")
+{
+
+  if ((res = isrpmvuln(pkg:"lzo", rpm:"lzo~2.03~3.1.el6_5.1", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"lzo-debuginfo", rpm:"lzo-debuginfo~2.03~3.1.el6_5.1", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_RHSA-2014_0861-01_lzo.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_RHSA-2014_0865-01_tomcat6.nasl
===================================================================
--- scripts/2014/gb_RHSA-2014_0865-01_tomcat6.nasl	                        (rev 0)
+++ scripts/2014/gb_RHSA-2014_0865-01_tomcat6.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,158 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for tomcat6 RHSA-2014:0865-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.871200");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 17:21:16 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0075", "CVE-2014-0096", "CVE-2014-0099", "CVE-2014-0050", "CVE-2013-4322");
+  script_tag(name:"cvss_base", value:"5.0");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("RedHat Update for tomcat6 RHSA-2014:0865-01");
+
+  tag_insight = "Apache Tomcat is a servlet container for the Java Servlet and JavaServer
+Pages (JSP) technologies.
+
+It was discovered that Apache Tomcat did not limit the length of chunk
+sizes when using chunked transfer encoding. A remote attacker could use
+this flaw to perform a denial of service attack against Tomcat by streaming
+an unlimited quantity of data, leading to excessive consumption of server
+resources. (CVE-2014-0075)
+
+It was found that Apache Tomcat did not check for overflowing values when
+parsing request content length headers. A remote attacker could use this
+flaw to perform an HTTP request smuggling attack on a Tomcat server located
+behind a reverse proxy that processed the content length header correctly.
+(CVE-2014-0099)
+
+It was found that the org.apache.catalina.servlets.DefaultServlet
+implementation in Apache Tomcat allowed the definition of XML External
+Entities (XXEs) in provided XSLTs. A malicious application could use this
+to circumvent intended security restrictions to disclose sensitive
+information. (CVE-2014-0096)
+
+The CVE-2014-0075 issue was discovered by David Jorm of Red Hat Product
+Security.
+
+This update also fixes the following bugs:
+
+* The patch that resolved the CVE-2014-0050 issue contained redundant code.
+This update removes the redundant code. (BZ#1094528)
+
+* The patch that resolved the CVE-2013-4322 issue contained an invalid
+check that triggered a java.io.EOFException while reading trailer headers
+for chunked requests. This update fixes the check and the aforementioned
+exception is no longer triggered in the described scenario. (BZ#1095602)
+
+All Tomcat 6 users are advised to upgrade to these updated packages, which
+contain backported patches to correct these issues. Tomcat must be
+restarted for this update to take effect.
+";
+
+  tag_affected = "tomcat6 on Red Hat Enterprise Linux Server (v. 6),
+  Red Hat Enterprise Linux Workstation (v. 6)";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "RHSA", value: "2014:0865-01");
+  script_xref(name: "URL" , value: "https://www.redhat.com/archives/rhsa-announce/2014-July/msg00017.html");
+  script_summary("Check for the Version of tomcat6");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:redhat:enterprise_linux", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_6")
+{
+
+  if ((res = isrpmvuln(pkg:"tomcat6", rpm:"tomcat6~6.0.24~72.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-el", rpm:"tomcat6-el~2.1~api~6.0.24~72.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-jsp", rpm:"tomcat6-jsp~2.1~api~6.0.24~72.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-lib", rpm:"tomcat6-lib~6.0.24~72.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"tomcat6-servlet", rpm:"tomcat6-servlet~2.5~api~6.0.24~72.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_RHSA-2014_0865-01_tomcat6.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_RHSA-2014_0866-01_samba_and_samba3x.nasl
===================================================================
--- scripts/2014/gb_RHSA-2014_0866-01_samba_and_samba3x.nasl	                        (rev 0)
+++ scripts/2014/gb_RHSA-2014_0866-01_samba_and_samba3x.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,221 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for samba and samba3x RHSA-2014:0866-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.871199");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 17:16:52 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0244", "CVE-2014-3493");
+  script_tag(name:"cvss_base", value:"3.3");
+  script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("RedHat Update for samba and samba3x RHSA-2014:0866-01");
+
+  tag_insight = "Samba is an open-source implementation of the Server Message Block (SMB) or
+Common Internet File System (CIFS) protocol, which allows PC-compatible
+machines to share files, printers, and other information.
+
+A denial of service flaw was found in the way the sys_recvfile() function
+of nmbd, the NetBIOS message block daemon, processed non-blocking sockets.
+An attacker could send a specially crafted packet that, when processed,
+would cause nmbd to enter an infinite loop and consume an excessive amount
+of CPU time. (CVE-2014-0244)
+
+It was discovered that smbd, the Samba file server daemon, did not properly
+handle certain files that were stored on the disk and used a valid Unicode
+character in the file name. An attacker able to send an authenticated
+non-Unicode request that attempted to read such a file could cause smbd to
+crash. (CVE-2014-3493)
+
+Red Hat would like to thank Daniel Berteaud of FIREWALL-SERVICES SARL for
+reporting CVE-2014-0244, and the Samba project for reporting CVE-2014-3493.
+The Samba project acknowledges Simon Arlott as the original reporter of
+CVE-2014-3493.
+
+All Samba users are advised to upgrade to these updated packages, which
+contain backported patches to correct these issues. After installing this
+update, the smb service will be restarted automatically.
+";
+
+  tag_affected = "samba and samba3x on Red Hat Enterprise Linux (v. 5 server),
+  Red Hat Enterprise Linux Desktop (v. 6),
+  Red Hat Enterprise Linux Server (v. 6),
+  Red Hat Enterprise Linux Workstation (v. 6)";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "RHSA", value: "2014:0866-01");
+  script_xref(name: "URL" , value: "https://www.redhat.com/archives/rhsa-announce/2014-July/msg00018.html");
+  script_summary("Check for the Version of samba and samba3x");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:redhat:enterprise_linux", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_6")
+{
+
+  if ((res = isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba", rpm:"samba~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-common", rpm:"samba-common~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-debuginfo", rpm:"samba-debuginfo~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind-clients", rpm:"samba-winbind-clients~3.6.9~169.el6_5", rls:"RHENT_6")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "RHENT_5")
+{
+
+  if ((res = isrpmvuln(pkg:"samba3x", rpm:"samba3x~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-client", rpm:"samba3x-client~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-common", rpm:"samba3x-common~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-debuginfo", rpm:"samba3x-debuginfo~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-doc", rpm:"samba3x-doc~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-domainjoin-gui", rpm:"samba3x-domainjoin-gui~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-swat", rpm:"samba3x-swat~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-winbind", rpm:"samba3x-winbind~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba3x-winbind-devel", rpm:"samba3x-winbind-devel~3.6.6~0.140.el5_10", rls:"RHENT_5")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_RHSA-2014_0866-01_samba_and_samba3x.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_RHSA-2014_0867-01_samba.nasl
===================================================================
--- scripts/2014/gb_RHSA-2014_0867-01_samba.nasl	                        (rev 0)
+++ scripts/2014/gb_RHSA-2014_0867-01_samba.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,180 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# RedHat Update for samba RHSA-2014:0867-01
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.871197");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 17:07:55 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0178", "CVE-2014-0244", "CVE-2014-3493");
+  script_tag(name:"cvss_base", value:"3.5");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:P/I:N/A:N");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("RedHat Update for samba RHSA-2014:0867-01");
+
+  tag_insight = "Samba is an open-source implementation of the Server Message Block (SMB) or
+Common Internet File System (CIFS) protocol, which allows PC-compatible
+machines to share files, printers, and other information.
+
+A denial of service flaw was found in the way the sys_recvfile() function
+of nmbd, the NetBIOS message block daemon, processed non-blocking sockets.
+An attacker could send a specially crafted packet that, when processed,
+would cause nmbd to enter an infinite loop and consume an excessive amount
+of CPU time. (CVE-2014-0244)
+
+A flaw was found in the way Samba created responses for certain
+authenticated client requests when a shadow-copy VFS module was enabled.
+An attacker able to send an authenticated request could use this flaw to
+disclose limited portions of memory per each request. (CVE-2014-0178)
+
+It was discovered that smbd, the Samba file server daemon, did not properly
+handle certain files that were stored on the disk and used a valid Unicode
+character in the file name. An attacker able to send an authenticated
+non-Unicode request that attempted to read such a file could cause smbd to
+crash. (CVE-2014-3493)
+
+Red Hat would like to thank Daniel Berteaud of FIREWALL-SERVICES SARL for
+reporting CVE-2014-0244, and the Samba project for reporting CVE-2014-0178
+and CVE-2014-3493. The Samba project acknowledges Christof Schmitt as the
+original reporter of CVE-2014-0178, and Simon Arlott as the original
+reporter of CVE-2014-3493.
+
+All Samba users are advised to upgrade to these updated packages, which
+contain backported patches to correct these issues. After installing this
+update, the smb service will be restarted automatically.
+";
+
+  tag_affected = "samba on Red Hat Enterprise Linux Server (v. 7)";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "RHSA", value: "2014:0867-01");
+  script_xref(name: "URL" , value: "https://www.redhat.com/archives/rhsa-announce/2014-July/msg00019.html");
+  script_summary("Check for the Version of samba");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Red Hat Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:redhat:enterprise_linux", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "RHENT_7")
+{
+
+  if ((res = isrpmvuln(pkg:"libsmbclient", rpm:"libsmbclient~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"libwbclient", rpm:"libwbclient~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba", rpm:"samba~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-client", rpm:"samba-client~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-common", rpm:"samba-common~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-debuginfo", rpm:"samba-debuginfo~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-libs", rpm:"samba-libs~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-python", rpm:"samba-python~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"samba-winbind-modules", rpm:"samba-winbind-modules~4.1.1~35.el7_0", rls:"RHENT_7")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_RHSA-2014_0867-01_samba.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7333_ReviewBoard_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7333_ReviewBoard_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7333_ReviewBoard_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ReviewBoard FEDORA-2014-7333
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867956");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:03:35 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2013-4519", "CVE-2013-4410", "CVE-2013-4411");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Fedora Update for ReviewBoard FEDORA-2014-7333");
+
+  tag_insight = "Review Board is a powerful web-based code review tool that offers
+developers an easy way to handle code reviews. It scales well from small
+projects to large companies and offers a variety of tools to take much
+of the stress and time out of the code review process.
+";
+
+  tag_affected = "ReviewBoard on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7333");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135229.html");
+  script_summary("Check for the Version of ReviewBoard");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"ReviewBoard", rpm:"ReviewBoard~1.7.26~2.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7333_ReviewBoard_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7333_python-django-evolution_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7333_python-django-evolution_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7333_python-django-evolution_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,103 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for python-django-evolution FEDORA-2014-7333
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867962");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:41:19 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"5.5");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:S/C:P/I:P/A:C");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for python-django-evolution FEDORA-2014-7333");
+
+  tag_insight = "When you run ./manage.py syncdb, Django will look for any new models that
+have been defined, and add a database table to represent those new models.
+However, if you make a change to an existing model, ./manage.py syncdb will
+not make any changes to the database.
+
+This is where Django Evolution fits in. Django Evolution is an extension to
+Django that allows you to track changes in your models over time, and to
+update the database to reflect those changes.
+";
+
+  tag_affected = "python-django-evolution on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7333");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135228.html");
+  script_summary("Check for the Version of python-django-evolution");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"python-django-evolution", rpm:"python-django-evolution~0.6.9~4.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7333_python-django-evolution_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7348_ReviewBoard_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7348_ReviewBoard_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7348_ReviewBoard_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,99 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ReviewBoard FEDORA-2014-7348
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867966");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:52:15 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Fedora Update for ReviewBoard FEDORA-2014-7348");
+
+  tag_insight = "Review Board is a powerful web-based code review tool that offers
+developers an easy way to handle code reviews. It scales well from small
+projects to large companies and offers a variety of tools to take much
+of the stress and time out of the code review process.
+";
+
+  tag_affected = "ReviewBoard on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7348");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135256.html");
+  script_summary("Check for the Version of ReviewBoard");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"ReviewBoard", rpm:"ReviewBoard~1.7.26~2.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7348_ReviewBoard_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7348_python-django-evolution_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7348_python-django-evolution_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7348_python-django-evolution_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,103 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for python-django-evolution FEDORA-2014-7348
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867963");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:41:19 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"5.5");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:S/C:P/I:P/A:C");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for python-django-evolution FEDORA-2014-7348");
+
+  tag_insight = "When you run ./manage.py syncdb, Django will look for any new models that
+have been defined, and add a database table to represent those new models.
+However, if you make a change to an existing model, ./manage.py syncdb will
+not make any changes to the database.
+
+This is where Django Evolution fits in. Django Evolution is an extension to
+Django that allows you to track changes in your models over time, and to
+update the database to reflect those changes.
+";
+
+  tag_affected = "python-django-evolution on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7348");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135255.html");
+  script_summary("Check for the Version of python-django-evolution");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"python-django-evolution", rpm:"python-django-evolution~0.6.9~4.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7348_python-django-evolution_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7577_claws-mail-plugins_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7577_claws-mail-plugins_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7577_claws-mail-plugins_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for claws-mail-plugins FEDORA-2014-7577
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867965");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:52:15 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"7.9");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:C/I:C/A:N");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for claws-mail-plugins FEDORA-2014-7577");
+
+  tag_insight = "Additional plugins for Claws Mail.
+";
+
+  tag_affected = "claws-mail-plugins on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7577");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135345.html");
+  script_summary("Check for the Version of claws-mail-plugins");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"claws-mail-plugins", rpm:"claws-mail-plugins~3.10.1~1.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7577_claws-mail-plugins_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7577_claws-mail_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7577_claws-mail_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7577_claws-mail_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,98 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for claws-mail FEDORA-2014-7577
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867960");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:39:09 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"7.9");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:C/I:C/A:N");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for claws-mail FEDORA-2014-7577");
+
+  tag_insight = "Claws Mail is an email client (and news reader), based on GTK+, featuring
+quick response, graceful and sophisticated interface, easy configuration,
+intuitive operation, abundant features, and extensibility.
+";
+
+  tag_affected = "claws-mail on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7577");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135346.html");
+  script_summary("Check for the Version of claws-mail");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"claws-mail", rpm:"claws-mail~3.10.1~1.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7577_claws-mail_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7654_samba_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7654_samba_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7654_samba_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,99 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for samba FEDORA-2014-7654
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867958");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:16:38 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0244", "CVE-2014-3493", "CVE-2014-0178", "CVE-2013-4496",
+                "CVE-2013-6442", "CVE-2013-4408", "CVE-2012-6150", "CVE-2013-4475",
+                "CVE-2013-4124");
+  script_tag(name:"cvss_base", value:"8.3");
+  script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:C/I:C/A:C");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("Fedora Update for samba FEDORA-2014-7654");
+
+  tag_insight = "Samba is the standard Windows interoperability suite of programs for Linux and Unix.
+";
+
+  tag_affected = "samba on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7654");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135231.html");
+  script_summary("Check for the Version of samba");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"samba", rpm:"samba~4.0.19~1.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7654_samba_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7780_python-pycadf_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7780_python-pycadf_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7780_python-pycadf_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for python-pycadf FEDORA-2014-7780
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867959");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:37:00 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4615");
+  script_tag(name:"cvss_base", value:"7.0");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:C/I:P/A:N");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for python-pycadf FEDORA-2014-7780");
+
+  tag_insight = "DMTF Cloud Audit (CADF) data model
+";
+
+  tag_affected = "python-pycadf on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7780");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135199.html");
+  script_summary("Check for the Version of python-pycadf");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"python-pycadf", rpm:"python-pycadf~0.5.1~1.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7780_python-pycadf_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7782_php_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7782_php_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7782_php_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,108 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for php FEDORA-2014-7782
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867974");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:50:31 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-3981", "CVE-2014-0207", "CVE-2014-3478", "CVE-2014-3479",
+                "CVE-2014-3480", "CVE-2014-3487", "CVE-2014-4049", "CVE-2014-3515",
+                "CVE-2014-0185", "CVE-2013-6420", "CVE-2011-4718", "CVE-2013-4248",
+                "CVE-2013-4113");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for php FEDORA-2014-7782");
+
+  tag_insight = "PHP is an HTML-embedded scripting language. PHP attempts to make it
+easy for developers to write dynamically generated web pages. PHP also
+offers built-in database integration for several commercial and
+non-commercial database management systems, so writing a
+database-enabled webpage with PHP is fairly simple. The most common
+use of PHP coding is probably as a replacement for CGI scripts.
+
+The php package contains the module (often referred to as mod_php)
+which adds support for the PHP language to Apache HTTP Server.
+";
+
+  tag_affected = "php on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7782");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135138.html");
+  script_summary("Check for the Version of php");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"php", rpm:"php~5.5.14~1.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7782_php_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7799_openstack-ceilometer_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7799_openstack-ceilometer_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7799_openstack-ceilometer_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,98 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for openstack-ceilometer FEDORA-2014-7799
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867968");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:21:47 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4615");
+  script_tag(name:"cvss_base", value:"7.0");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:C/I:P/A:N");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for openstack-ceilometer FEDORA-2014-7799");
+
+  tag_insight = "OpenStack ceilometer provides services to measure and
+collect metrics from OpenStack components.
+";
+
+  tag_affected = "openstack-ceilometer on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7799");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135218.html");
+  script_summary("Check for the Version of openstack-ceilometer");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"openstack-ceilometer", rpm:"openstack-ceilometer~2013.2.3~2.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7799_openstack-ceilometer_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7836_cacti_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7836_cacti_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7836_cacti_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for cacti FEDORA-2014-7836
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867964");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:41:19 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4002", "CVE-2014-2708", "CVE-2014-2709", "CVE-2014-2326",
+                "CVE-2014-2328");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for cacti FEDORA-2014-7836");
+
+  tag_insight = "Cacti is a complete frontend to RRDTool. It stores all of the
+necessary information to create graphs and populate them with
+data in a MySQL database. The frontend is completely PHP
+driven. Along with being able to maintain graphs, data
+sources, and round robin archives in a database, Cacti also
+handles the data gathering. There is SNMP support for those
+used to creating traffic graphs with MRTG.
+";
+
+  tag_affected = "cacti on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7836");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135211.html");
+  script_summary("Check for the Version of cacti");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"cacti", rpm:"cacti~0.8.8b~7.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7836_cacti_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7849_cacti_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7849_cacti_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7849_cacti_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for cacti FEDORA-2014-7849
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867976");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 15:20:30 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4002", "CVE-2014-2708", "CVE-2014-2709", "CVE-2014-2326",
+                "CVE-2014-2328", "CVE-2013-5588", "CVE-2013-5589");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for cacti FEDORA-2014-7849");
+
+  tag_insight = "Cacti is a complete frontend to RRDTool. It stores all of the
+necessary information to create graphs and populate them with
+data in a MySQL database. The frontend is completely PHP
+driven. Along with being able to maintain graphs, data
+sources, and round robin archives in a database, Cacti also
+handles the data gathering. There is SNMP support for those
+used to creating traffic graphs with MRTG.
+";
+
+  tag_affected = "cacti on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7849");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135210.html");
+  script_summary("Check for the Version of cacti");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"cacti", rpm:"cacti~0.8.8b~7.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7849_cacti_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7954_openstack-nova_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7954_openstack-nova_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7954_openstack-nova_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for openstack-nova FEDORA-2014-7954
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867971");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:35:04 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0167", "CVE-2013-7130", "CVE-2013-4463", "CVE-2013-2096");
+  script_tag(name:"cvss_base", value:"7.1");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:N/A:N");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for openstack-nova FEDORA-2014-7954");
+
+  tag_insight = "OpenStack Compute (codename Nova) is open source software designed to
+provision and manage large networks of virtual machines, creating a
+redundant and scalable cloud computing platform. It gives you the
+software, control panels, and APIs required to orchestrate a cloud,
+including running instances, managing networks, and controlling access
+through users and projects. OpenStack Compute strives to be both
+hardware and hypervisor agnostic, currently supporting a variety of
+standard hardware configurations and seven major hypervisors.
+";
+
+  tag_affected = "openstack-nova on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7954");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135320.html");
+  script_summary("Check for the Version of openstack-nova");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"openstack-nova", rpm:"openstack-nova~2013.2.3~2.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7954_openstack-nova_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7964_owncloud_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7964_owncloud_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7964_owncloud_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for owncloud FEDORA-2014-7964
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867955");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:03:35 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"6.0");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:P/I:P/A:P");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for owncloud FEDORA-2014-7964");
+
+  tag_insight = "ownCloud gives you universal access to your files through a web interface or
+WebDAV. It also provides a platform to easily view &amp  sync your contacts,
+calendars and bookmarks across all your devices and enables basic editing right
+on the web. ownCloud is extendable via a simple but powerful API for
+applications and plugins.
+";
+
+  tag_affected = "owncloud on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7964");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135265.html");
+  script_summary("Check for the Version of owncloud");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"owncloud", rpm:"owncloud~6.0.4~1.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7964_owncloud_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_7997_ansible_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_7997_ansible_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_7997_ansible_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,101 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ansible FEDORA-2014-7997
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867969");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:23:57 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2013-4260", "CVE-2013-4259", "CVE-2013-2233");
+  script_tag(name:"cvss_base", value:"3.3");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:N/I:P/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Fedora Update for ansible FEDORA-2014-7997");
+
+  tag_insight = "Ansible is a radically simple model-driven configuration management,
+multi-node deployment, and remote task execution system. Ansible works
+over SSH and does not require any software or daemons to be installed
+on remote nodes. Extension modules can be written in any language and
+are transferred to managed machines automatically.
+";
+
+  tag_affected = "ansible on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-7997");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135299.html");
+  script_summary("Check for the Version of ansible");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"ansible", rpm:"ansible~1.6.6~1.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_7997_ansible_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8021_docker-io_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8021_docker-io_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8021_docker-io_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for docker-io FEDORA-2014-8021
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867961");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:39:09 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-3499");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for docker-io FEDORA-2014-8021");
+
+  tag_insight = "Docker is an open-source engine that automates the deployment of any
+application as a lightweight, portable, self-sufficient container that will
+run virtually anywhere.
+
+Docker containers can encapsulate any payload, and will run consistently on
+and between virtually any server. The same container that a developer builds
+and tests on a laptop will run at scale, in production*, on VMs, bare-metal
+servers, OpenStack clusters, public instances, or combinations of the above.
+";
+
+  tag_affected = "docker-io on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8021");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135378.html");
+  script_summary("Check for the Version of docker-io");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"docker-io", rpm:"docker-io~1.0.0~6.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8021_docker-io_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8032_ansible_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8032_ansible_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8032_ansible_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for ansible FEDORA-2014-8032
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867975");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 15:20:30 +0530 (Tue, 15 Jul 2014)");
+  script_tag(name:"cvss_base", value:"7.9");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:S/C:C/I:C/A:N");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for ansible FEDORA-2014-8032");
+
+  tag_insight = "Ansible is a radically simple model-driven configuration management,
+multi-node deployment, and remote task execution system. Ansible works
+over SSH and does not require any software or daemons to be installed
+on remote nodes. Extension modules can be written in any language and
+are transferred to managed machines automatically.
+";
+
+  tag_affected = "ansible on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8032");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135284.html");
+  script_summary("Check for the Version of ansible");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"ansible", rpm:"ansible~1.6.6~1.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8032_ansible_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8034_docker-io_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8034_docker-io_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8034_docker-io_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,104 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for docker-io FEDORA-2014-8034
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867973");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:48:20 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-3499");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Fedora Update for docker-io FEDORA-2014-8034");
+
+  tag_insight = "Docker is an open-source engine that automates the deployment of any
+application as a lightweight, portable, self-sufficient container that will
+run virtually anywhere.
+
+Docker containers can encapsulate any payload, and will run consistently on
+and between virtually any server. The same container that a developer builds
+and tests on a laptop will run at scale, in production*, on VMs, bare-metal
+servers, OpenStack clusters, public instances, or combinations of the above.
+";
+
+  tag_affected = "docker-io on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8034");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135366.html");
+  script_summary("Check for the Version of docker-io");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"docker-io", rpm:"docker-io~1.0.0~6.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8034_docker-io_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8059_dbus_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8059_dbus_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8059_dbus_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,99 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for dbus FEDORA-2014-8059
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867957");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:10:08 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-3477", "CVE-2014-3532", "CVE-2014-3533");
+  script_tag(name:"cvss_base", value:"2.1");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Fedora Update for dbus FEDORA-2014-8059");
+
+  tag_insight = "D-BUS is a system for sending messages between applications. It is
+used both for the system-wide message bus service, and as a
+per-user-login-session messaging facility.
+";
+
+  tag_affected = "dbus on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8059");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135226.html");
+  script_summary("Check for the Version of dbus");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"dbus", rpm:"dbus~1.6.12~9.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8059_dbus_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8098_pnp4nagios_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8098_pnp4nagios_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8098_pnp4nagios_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,98 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for pnp4nagios FEDORA-2014-8098
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867970");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:30:42 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4908", "CVE-2014-4907");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Fedora Update for pnp4nagios FEDORA-2014-8098");
+
+  tag_insight = "PNP is an addon to nagios which analyzes performance data provided by plugins
+and stores them automatically into RRD-databases.
+";
+
+  tag_affected = "pnp4nagios on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8098");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135371.html");
+  script_summary("Check for the Version of pnp4nagios");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"pnp4nagios", rpm:"pnp4nagios~0.6.22~2.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8098_pnp4nagios_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8107_pnp4nagios_fc19.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8107_pnp4nagios_fc19.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8107_pnp4nagios_fc19.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,98 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for pnp4nagios FEDORA-2014-8107
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867972");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 14:43:51 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4908", "CVE-2014-4907");
+  script_tag(name:"cvss_base", value:"4.3");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Fedora Update for pnp4nagios FEDORA-2014-8107");
+
+  tag_insight = "PNP is an addon to nagios which analyzes performance data provided by plugins
+and stores them automatically into RRD-databases.
+";
+
+  tag_affected = "pnp4nagios on Fedora 19";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8107");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135362.html");
+  script_summary("Check for the Version of pnp4nagios");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC19")
+{
+
+  if ((res = isrpmvuln(pkg:"pnp4nagios", rpm:"pnp4nagios~0.6.22~2.fc19", rls:"FC19")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8107_pnp4nagios_fc19.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_fedora_2014_8171_kernel_fc20.nasl
===================================================================
--- scripts/2014/gb_fedora_2014_8171_kernel_fc20.nasl	                        (rev 0)
+++ scripts/2014/gb_fedora_2014_8171_kernel_fc20.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,109 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Fedora Update for kernel FEDORA-2014-8171
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.867967");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 12:52:15 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-4715", "CVE-2014-4699", "CVE-2014-0206", "CVE-2014-4508",
+                "CVE-2014-4014", "CVE-2014-3153", "CVE-2014-3940", "CVE-2014-3917",
+                "CVE-2014-3144", "CVE-2014-3145", "CVE-2014-1738", "CVE-2014-1737",
+                "CVE-2014-0181", "CVE-2014-0196", "CVE-2014-3122", "CVE-2014-2851",
+                "CVE-2014-0155", "CVE-2014-2678", "CVE-2014-2580", "CVE-2014-0077",
+                "CVE-2014-0055", "CVE-2014-2568", "CVE-2014-0131", "CVE-2014-2523",
+                "CVE-2014-2309", "CVE-2014-0100", "CVE-2014-0101", "CVE-2014-0049",
+                "CVE-2014-0102", "CVE-2014-2039", "CVE-2014-0069", "CVE-2014-1874",
+                "CVE-2014-1446", "CVE-2014-1438", "CVE-2013-4579", "CVE-2013-4587",
+                "CVE-2013-6376", "CVE-2013-6368", "CVE-2013-6367");
+  script_tag(name:"cvss_base", value:"10.0");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
+  script_tag(name:"risk_factor", value:"Critical");
+  script_name("Fedora Update for kernel FEDORA-2014-8171");
+
+  tag_insight = "The kernel package contains the Linux kernel (vmlinuz), the core of any
+Linux operating system.  The kernel handles the basic functions
+of the operating system: memory allocation, process allocation, device
+input and output, etc.
+";
+
+  tag_affected = "kernel on Fedora 20";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "FEDORA", value: "2014-8171");
+  script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135290.html");
+  script_summary("Check for the Version of kernel");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Fedora Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:fedoraproject:fedora", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "FC20")
+{
+
+  if ((res = isrpmvuln(pkg:"kernel", rpm:"kernel~3.15.4~200.fc20", rls:"FC20")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_fedora_2014_8171_kernel_fc20.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_suse_2014_0878_1.nasl
===================================================================
--- scripts/2014/gb_suse_2014_0878_1.nasl	                        (rev 0)
+++ scripts/2014/gb_suse_2014_0878_1.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,603 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# SuSE Update for kernel openSUSE-SU-2014:0878-1 (kernel)
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.850595");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 16:38:28 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-3153");
+  script_tag(name:"cvss_base", value:"7.2");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("SuSE Update for kernel openSUSE-SU-2014:0878-1 (kernel)");
+
+  tag_insight = "
+  kernel update for Evergreen 11.4 fixes local privilege escalation in futex
+  code (bnc#880892 / CVE-2014-3153) and a regression causing a crash if
+  IPsec peer is unavailable";
+
+  tag_affected = "kernel on openSUSE 11.4";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "openSUSE-SU", value: "2014:0878_1");
+  script_xref(name: "URL" , value: "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html");
+  script_summary("Check for the Version of kernel");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("SuSE Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("HostDetails/OS/cpe:/o:novell:opensuse", "login/SSH/success", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-rpm.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "openSUSE11.4")
+{
+
+  if ((res = isrpmvuln(pkg:"kernel-debug", rpm:"kernel-debug~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-base", rpm:"kernel-debug-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-base-debuginfo", rpm:"kernel-debug-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-debuginfo", rpm:"kernel-debug-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-debugsource", rpm:"kernel-debug-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-devel", rpm:"kernel-debug-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-devel-debuginfo", rpm:"kernel-debug-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-debug-hmac", rpm:"kernel-debug-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default", rpm:"kernel-default~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-base", rpm:"kernel-default-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-base-debuginfo", rpm:"kernel-default-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-debuginfo", rpm:"kernel-default-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-debugsource", rpm:"kernel-default-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-devel", rpm:"kernel-default-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-devel-debuginfo", rpm:"kernel-default-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-default-hmac", rpm:"kernel-default-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop", rpm:"kernel-desktop~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-base", rpm:"kernel-desktop-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-base-debuginfo", rpm:"kernel-desktop-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-debuginfo", rpm:"kernel-desktop-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-debugsource", rpm:"kernel-desktop-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-devel", rpm:"kernel-desktop-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-devel-debuginfo", rpm:"kernel-desktop-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-desktop-hmac", rpm:"kernel-desktop-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2", rpm:"kernel-ec2~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-base", rpm:"kernel-ec2-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-base-debuginfo", rpm:"kernel-ec2-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-debuginfo", rpm:"kernel-ec2-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-debugsource", rpm:"kernel-ec2-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-devel", rpm:"kernel-ec2-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-devel-debuginfo", rpm:"kernel-ec2-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-extra", rpm:"kernel-ec2-extra~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-extra-debuginfo", rpm:"kernel-ec2-extra-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-ec2-hmac", rpm:"kernel-ec2-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-source", rpm:"kernel-source~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-source-vanilla", rpm:"kernel-source-vanilla~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-syms", rpm:"kernel-syms~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace", rpm:"kernel-trace~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-base", rpm:"kernel-trace-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-base-debuginfo", rpm:"kernel-trace-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-debuginfo", rpm:"kernel-trace-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-debugsource", rpm:"kernel-trace-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-devel", rpm:"kernel-trace-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-devel-debuginfo", rpm:"kernel-trace-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-trace-hmac", rpm:"kernel-trace-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla", rpm:"kernel-vanilla~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-base", rpm:"kernel-vanilla-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-base-debuginfo", rpm:"kernel-vanilla-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-debuginfo", rpm:"kernel-vanilla-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-debugsource", rpm:"kernel-vanilla-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-devel", rpm:"kernel-vanilla-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-devel-debuginfo", rpm:"kernel-vanilla-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vanilla-hmac", rpm:"kernel-vanilla-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen", rpm:"kernel-xen~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-base", rpm:"kernel-xen-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-base-debuginfo", rpm:"kernel-xen-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-debuginfo", rpm:"kernel-xen-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-debugsource", rpm:"kernel-xen-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-devel", rpm:"kernel-xen-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-devel-debuginfo", rpm:"kernel-xen-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-xen-hmac", rpm:"kernel-xen-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload", rpm:"preload~1.2~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload-debuginfo", rpm:"preload-debuginfo~1.2~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload-debugsource", rpm:"preload-debugsource~1.2~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload-kmp-default", rpm:"preload-kmp-default~1.2_3.0.101_87~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload-kmp-default-debuginfo", rpm:"preload-kmp-default-debuginfo~1.2_3.0.101_87~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload-kmp-desktop", rpm:"preload-kmp-desktop~1.2_3.0.101_87~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"preload-kmp-desktop-debuginfo", rpm:"preload-kmp-desktop-debuginfo~1.2_3.0.101_87~6.65.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-docs", rpm:"kernel-docs~3.0.101~87.2", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae", rpm:"kernel-pae~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-base", rpm:"kernel-pae-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-base-debuginfo", rpm:"kernel-pae-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-debuginfo", rpm:"kernel-pae-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-debugsource", rpm:"kernel-pae-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-devel", rpm:"kernel-pae-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-devel-debuginfo", rpm:"kernel-pae-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-pae-hmac", rpm:"kernel-pae-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi", rpm:"kernel-vmi~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-base", rpm:"kernel-vmi-base~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-base-debuginfo", rpm:"kernel-vmi-base-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-debuginfo", rpm:"kernel-vmi-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-debugsource", rpm:"kernel-vmi-debugsource~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-devel", rpm:"kernel-vmi-devel~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-devel-debuginfo", rpm:"kernel-vmi-devel-debuginfo~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isrpmvuln(pkg:"kernel-vmi-hmac", rpm:"kernel-vmi-hmac~3.0.101~87.1", rls:"openSUSE11.4")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
\ No newline at end of file


Property changes on: scripts/2014/gb_suse_2014_0878_1.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_ubuntu_USN_2275_1.nasl
===================================================================
--- scripts/2014/gb_ubuntu_USN_2275_1.nasl	                        (rev 0)
+++ scripts/2014/gb_ubuntu_USN_2275_1.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,152 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for dbus USN-2275-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.841891");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 17:01:14 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-3477", "CVE-2014-3532", "CVE-2014-3533");
+  script_tag(name:"cvss_base", value:"2.1");
+  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:N/I:N/A:P");
+  script_tag(name:"risk_factor", value:"Medium");
+  script_name("Ubuntu Update for dbus USN-2275-1");
+
+  tag_insight = "Alban Crequy discovered that dbus-daemon incorrectly sent
+AccessDenied errors to the service instead of the client when enforcing
+permissions. A local user can use this issue to possibly deny access to the
+service. (CVE-2014-3477)
+
+Alban Crequy discovered that dbus-daemon incorrectly handled certain file
+descriptors. A local attacker could use this issue to cause services or
+clients to disconnect, resulting in a denial of service. (CVE-2014-3532,
+CVE-2014-3533)";
+
+  tag_affected = "dbus on Ubuntu 14.04 LTS ,
+  Ubuntu 13.10 ,
+  Ubuntu 12.04 LTS";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "USN", value: "2275-1");
+  script_xref(name: "URL" , value: "https://lists.ubuntu.com/archives/ubuntu-security-announce/2014-July/002580.html");
+  script_summary("Check for the Version of dbus");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("login/SSH/success", "HostDetails/OS/cpe:/o:canonical:ubuntu_linux", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU14.04 LTS")
+{
+
+  if ((res = isdpkgvuln(pkg:"dbus", ver:"1.6.18-0ubuntu4.1", rls:"UBUNTU14.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"libdbus-1-3:i386", ver:"1.6.18-0ubuntu4.1", rls:"UBUNTU14.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "UBUNTU12.04 LTS")
+{
+
+  if ((res = isdpkgvuln(pkg:"dbus", ver:"1.4.18-1ubuntu1.5", rls:"UBUNTU12.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"libdbus-1-3", ver:"1.4.18-1ubuntu1.5", rls:"UBUNTU12.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "UBUNTU13.10")
+{
+
+  if ((res = isdpkgvuln(pkg:"dbus", ver:"1.6.12-0ubuntu10.1", rls:"UBUNTU13.10")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"libdbus-1-3:i386", ver:"1.6.12-0ubuntu10.1", rls:"UBUNTU13.10")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_ubuntu_USN_2275_1.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id

Added: scripts/2014/gb_ubuntu_USN_2276_1.nasl
===================================================================
--- scripts/2014/gb_ubuntu_USN_2276_1.nasl	                        (rev 0)
+++ scripts/2014/gb_ubuntu_USN_2276_1.nasl	2014-07-18 08:07:41 UTC (rev 573)
@@ -0,0 +1,229 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+#
+# Ubuntu Update for php5 USN-2276-1
+#
+# Authors:
+# System Generated Check
+#
+# Copyright:
+# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+include("revisions-lib.inc");
+
+if(description)
+{
+  script_oid("1.3.6.1.4.1.25623.1.0.841890");
+  script_version("$Revision$");
+  script_tag(name:"check_type", value:"authenticated package test");
+  script_tag(name:"last_modification", value:"$Date$");
+  script_tag(name:"creation_date", value:"2014-07-15 16:41:08 +0530 (Tue, 15 Jul 2014)");
+  script_cve_id("CVE-2014-0207", "CVE-2014-3478", "CVE-2014-3479", "CVE-2014-3480",
+                "CVE-2014-3487", "CVE-2014-3515", "CVE-2014-4670", "CVE-2014-4698",
+                "CVE-2014-4721");
+  script_tag(name:"cvss_base", value:"7.5");
+  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
+  script_tag(name:"risk_factor", value:"High");
+  script_name("Ubuntu Update for php5 USN-2276-1");
+
+  tag_insight = "Francisco Alonso discovered that the PHP Fileinfo component
+incorrectly handled certain CDF documents. A remote attacker could use this
+issue to cause PHP to hang or crash, resulting in a denial of service.
+(CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487)
+
+Stefan Esser discovered that PHP incorrectly handled unserializing SPL
+extension objects. An attacker could use this issue to execute arbitrary
+code. (CVE-2014-3515)
+
+It was discovered that PHP incorrectly handled certain SPL Iterators. An
+attacker could use this issue to cause PHP to crash, resulting in a denial
+of service. (CVE-2014-4670)
+
+It was discovered that PHP incorrectly handled certain ArrayIterators. An
+attacker could use this issue to cause PHP to crash, resulting in a denial
+of service. (CVE-2014-4698)
+
+Stefan Esser discovered that PHP incorrectly handled variable types when
+calling phpinfo(). An attacker could use this issue to possibly gain access
+to arbitrary memory, possibly containing sensitive information.
+(CVE-2014-4721)";
+
+  tag_affected = "php5 on Ubuntu 14.04 LTS ,
+  Ubuntu 13.10 ,
+  Ubuntu 12.04 LTS ,
+  Ubuntu 10.04 LTS";
+
+  tag_solution = "Please Install the Updated Packages.";
+
+  desc = "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+  if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){
+    script_tag(name : "affected" , value : tag_affected);
+    script_tag(name : "insight" , value : tag_insight);
+    script_tag(name : "solution" , value : tag_solution);
+  }
+  script_description(desc);
+  script_xref(name: "USN", value: "2276-1");
+  script_xref(name: "URL" , value: "https://lists.ubuntu.com/archives/ubuntu-security-announce/2014-July/002581.html");
+  script_summary("Check for the Version of php5");
+  script_category(ACT_GATHER_INFO);
+  script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
+  script_family("Ubuntu Local Security Checks");
+  script_dependencies("gather-package-list.nasl");
+  script_mandatory_keys("login/SSH/success", "HostDetails/OS/cpe:/o:canonical:ubuntu_linux", "ssh/login/release");
+  exit(0);
+}
+
+
+include("pkg-lib-deb.inc");
+
+release = get_kb_item("ssh/login/release");
+
+res = "";
+if(release == NULL){
+  exit(0);
+}
+
+if(release == "UBUNTU14.04 LTS")
+{
+
+  if ((res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.5.9+dfsg-1ubuntu4.3", rls:"UBUNTU14.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cgi", ver:"5.5.9+dfsg-1ubuntu4.3", rls:"UBUNTU14.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cli", ver:"5.5.9+dfsg-1ubuntu4.3", rls:"UBUNTU14.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-fpm", ver:"5.5.9+dfsg-1ubuntu4.3", rls:"UBUNTU14.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "UBUNTU12.04 LTS")
+{
+
+  if ((res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.3.10-1ubuntu3.13", rls:"UBUNTU12.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cgi", ver:"5.3.10-1ubuntu3.13", rls:"UBUNTU12.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cli", ver:"5.3.10-1ubuntu3.13", rls:"UBUNTU12.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-fpm", ver:"5.3.10-1ubuntu3.13", rls:"UBUNTU12.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "UBUNTU10.04 LTS")
+{
+
+  if ((res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.3.2-1ubuntu4.26", rls:"UBUNTU10.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cgi", ver:"5.3.2-1ubuntu4.26", rls:"UBUNTU10.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cli", ver:"5.3.2-1ubuntu4.26", rls:"UBUNTU10.04 LTS")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}
+
+
+if(release == "UBUNTU13.10")
+{
+
+  if ((res = isdpkgvuln(pkg:"libapache2-mod-php5", ver:"5.5.3+dfsg-1ubuntu2.6", rls:"UBUNTU13.10")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cgi", ver:"5.5.3+dfsg-1ubuntu2.6", rls:"UBUNTU13.10")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-cli", ver:"5.5.3+dfsg-1ubuntu2.6", rls:"UBUNTU13.10")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if ((res = isdpkgvuln(pkg:"php5-fpm", ver:"5.5.3+dfsg-1ubuntu2.6", rls:"UBUNTU13.10")) != NULL)
+  {
+    security_message(data:res);
+    exit(0);
+  }
+
+  if (__pkg_match) exit(99); # Not vulnerable.
+  exit(0);
+}


Property changes on: scripts/2014/gb_ubuntu_USN_2276_1.nasl
___________________________________________________________________
Added: svn:keywords
   + Author Revision Date Id



More information about the Openvas-nvts-commits mailing list