home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2001-072.nasl < prev    next >
Text File  |  2005-01-14  |  2KB  |  91 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2001:072
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(13887);
  12.  script_version ("$Revision: 1.2 $");
  13.  
  14.  name["english"] = "MDKSA-2001:072: fetchmail";
  15.  
  16.  script_name(english:name["english"]);
  17.  
  18.  desc["english"] = "
  19. The remote host is missing the patch for the advisory MDKSA-2001:072 (fetchmail).
  20.  
  21.  
  22. A vulnerability was found by Salvatore Sanfilippo in both the IMAP and POP3 code
  23. of fetchmail where the input is not verified and no bounds checking is done.
  24. This can be exploited by a remote attacker to write arbitrary data into memory.
  25. The attacker must have control of the mail server the client is connecting to
  26. via fetchmail in order to exploit this vulnerability.
  27.  
  28.  
  29. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2001:072
  30. Risk factor : High";
  31.  
  32.  
  33.  
  34.  script_description(english:desc["english"]);
  35.  
  36.  summary["english"] = "Check for the version of the fetchmail package";
  37.  script_summary(english:summary["english"]);
  38.  
  39.  script_category(ACT_GATHER_INFO);
  40.  
  41.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  42.  family["english"] = "Mandrake Local Security Checks";
  43.  script_family(english:family["english"]);
  44.  
  45.  script_dependencies("ssh_get_info.nasl");
  46.  script_require_keys("Host/Mandrake/rpm-list");
  47.  exit(0);
  48. }
  49.  
  50. include("rpm.inc");
  51. if ( rpm_check( reference:"fetchmail-5.3.8-4.2mdk", release:"MDK7.1", yank:"mdk") )
  52. {
  53.  security_hole(0);
  54.  exit(0);
  55. }
  56. if ( rpm_check( reference:"fetchmailconf-5.3.8-4.2mdk", release:"MDK7.1", yank:"mdk") )
  57. {
  58.  security_hole(0);
  59.  exit(0);
  60. }
  61. if ( rpm_check( reference:"fetchmail-5.5.2-5.2mdk", release:"MDK7.2", yank:"mdk") )
  62. {
  63.  security_hole(0);
  64.  exit(0);
  65. }
  66. if ( rpm_check( reference:"fetchmail-daemon-5.5.2-5.2mdk", release:"MDK7.2", yank:"mdk") )
  67. {
  68.  security_hole(0);
  69.  exit(0);
  70. }
  71. if ( rpm_check( reference:"fetchmailconf-5.5.2-5.2mdk", release:"MDK7.2", yank:"mdk") )
  72. {
  73.  security_hole(0);
  74.  exit(0);
  75. }
  76. if ( rpm_check( reference:"fetchmail-5.7.4-5.2mdk", release:"MDK8.0", yank:"mdk") )
  77. {
  78.  security_hole(0);
  79.  exit(0);
  80. }
  81. if ( rpm_check( reference:"fetchmail-daemon-5.7.4-5.2mdk", release:"MDK8.0", yank:"mdk") )
  82. {
  83.  security_hole(0);
  84.  exit(0);
  85. }
  86. if ( rpm_check( reference:"fetchmailconf-5.7.4-5.2mdk", release:"MDK8.0", yank:"mdk") )
  87. {
  88.  security_hole(0);
  89.  exit(0);
  90. }
  91.