home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2004-021.nasl < prev    next >
Text File  |  2005-01-14  |  4KB  |  138 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2004:021
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(14120);
  12.  script_bugtraq_id(8981, 9323);
  13.  script_version ("$Revision: 1.3 $");
  14.  script_cve_id("CAN-2003-0564", "CAN-2003-0594");
  15.  
  16.  name["english"] = "MDKSA-2004:021: mozilla";
  17.  
  18.  script_name(english:name["english"]);
  19.  
  20.  desc["english"] = "
  21. The remote host is missing the patch for the advisory MDKSA-2004:021 (mozilla).
  22.  
  23.  
  24. A number of vulnerabilities were discovered in Mozilla 1.4:
  25. A malicious website could gain access to a user's authentication credentials to
  26. a proxy server.
  27. Script.prototype.freeze/thaw could allow an attacker to run arbitrary code on
  28. your computer.
  29. A vulnerability was also discovered in the NSS security suite which ships with
  30. Mozilla. The S/MIME implementation would allow remote attackers to cause a
  31. Denial of Service and possibly execute arbitrary code via an S/MIME email
  32. message containing certain unexpected ASN.1 constructs, which was demonstrated
  33. using the NISCC test suite. NSS version 3.9 corrects these problems and has been
  34. included in this package (which shipped with NSS 3.8).
  35. Finally, Corsaire discovered that a number of HTTP user agents contained a flaw
  36. in how they handle cookies. This flaw could allow an attacker to avoid the path
  37. restrictions specified by a cookie's originator. According to their advisory:
  38. 'The cookie specifications detail a path argument that can be used to restrict
  39. the areas of a host that will be exposed to a cookie. By using standard
  40. traversal techniques this functionality can be subverted, potentially exposing
  41. the cookie to scrutiny and use in further attacks.'
  42. As well, a bug with Mozilla and Finnish keyboards has been corrected.
  43. The updated packages are patched to correct these vulnerabilities.
  44.  
  45.  
  46. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:021
  47. Risk factor : High";
  48.  
  49.  
  50.  
  51.  script_description(english:desc["english"]);
  52.  
  53.  summary["english"] = "Check for the version of the mozilla package";
  54.  script_summary(english:summary["english"]);
  55.  
  56.  script_category(ACT_GATHER_INFO);
  57.  
  58.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  59.  family["english"] = "Mandrake Local Security Checks";
  60.  script_family(english:family["english"]);
  61.  
  62.  script_dependencies("ssh_get_info.nasl");
  63.  script_require_keys("Host/Mandrake/rpm-list");
  64.  exit(0);
  65. }
  66.  
  67. include("rpm.inc");
  68. if ( rpm_check( reference:"libnspr4-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  69. {
  70.  security_hole(0);
  71.  exit(0);
  72. }
  73. if ( rpm_check( reference:"libnspr4-devel-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  74. {
  75.  security_hole(0);
  76.  exit(0);
  77. }
  78. if ( rpm_check( reference:"libnss3-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  79. {
  80.  security_hole(0);
  81.  exit(0);
  82. }
  83. if ( rpm_check( reference:"libnss3-devel-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  84. {
  85.  security_hole(0);
  86.  exit(0);
  87. }
  88. if ( rpm_check( reference:"mozilla-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  89. {
  90.  security_hole(0);
  91.  exit(0);
  92. }
  93. if ( rpm_check( reference:"mozilla-devel-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  94. {
  95.  security_hole(0);
  96.  exit(0);
  97. }
  98. if ( rpm_check( reference:"mozilla-dom-inspector-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  99. {
  100.  security_hole(0);
  101.  exit(0);
  102. }
  103. if ( rpm_check( reference:"mozilla-enigmail-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  104. {
  105.  security_hole(0);
  106.  exit(0);
  107. }
  108. if ( rpm_check( reference:"mozilla-enigmime-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  109. {
  110.  security_hole(0);
  111.  exit(0);
  112. }
  113. if ( rpm_check( reference:"mozilla-irc-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  114. {
  115.  security_hole(0);
  116.  exit(0);
  117. }
  118. if ( rpm_check( reference:"mozilla-js-debugger-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  119. {
  120.  security_hole(0);
  121.  exit(0);
  122. }
  123. if ( rpm_check( reference:"mozilla-mail-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  124. {
  125.  security_hole(0);
  126.  exit(0);
  127. }
  128. if ( rpm_check( reference:"mozilla-spellchecker-1.4-13.2.92mdk", release:"MDK9.2", yank:"mdk") )
  129. {
  130.  security_hole(0);
  131.  exit(0);
  132. }
  133. if (rpm_exists(rpm:"mozilla-", release:"MDK9.2") )
  134. {
  135.  set_kb_item(name:"CAN-2003-0564", value:TRUE);
  136.  set_kb_item(name:"CAN-2003-0594", value:TRUE);
  137. }
  138.