home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / mandrake_MDKSA-2004-145.nasl < prev    next >
Text File  |  2005-01-14  |  2KB  |  89 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. # This plugin text was extracted from Mandrake Linux Security Advisory MDKSA-2004:145
  5. #
  6.  
  7.  
  8. if ( ! defined_func("bn_random") ) exit(0);
  9. if(description)
  10. {
  11.  script_id(15918);
  12.  script_version ("$Revision: 1.1 $");
  13.  script_cve_id("CAN-2004-0564");
  14.  
  15.  name["english"] = "MDKSA-2004:145: rp-pppoe";
  16.  
  17.  script_name(english:name["english"]);
  18.  
  19.  desc["english"] = "
  20. The remote host is missing the patch for the advisory MDKSA-2004:145 (rp-pppoe).
  21.  
  22.  
  23.  
  24. Max Vozeler discovered a vulnerability in pppoe, part of the rp-pppoe package.
  25. When pppoe is running setuid root, an attacker can overwrite any file on the
  26. system. Mandrakelinux does not install pppoe setuid root, however the packages
  27. have been patched to prevent this problem.
  28.  
  29.  
  30.  
  31. Solution : http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:145
  32. Risk factor : High";
  33.  
  34.  
  35.  
  36.  script_description(english:desc["english"]);
  37.  
  38.  summary["english"] = "Check for the version of the rp-pppoe package";
  39.  script_summary(english:summary["english"]);
  40.  
  41.  script_category(ACT_GATHER_INFO);
  42.  
  43.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  44.  family["english"] = "Mandrake Local Security Checks";
  45.  script_family(english:family["english"]);
  46.  
  47.  script_dependencies("ssh_get_info.nasl");
  48.  script_require_keys("Host/Mandrake/rpm-list");
  49.  exit(0);
  50. }
  51.  
  52. include("rpm.inc");
  53. if ( rpm_check( reference:"rp-pppoe-3.5-3.1.100mdk", release:"MDK10.0", yank:"mdk") )
  54. {
  55.  security_hole(0);
  56.  exit(0);
  57. }
  58. if ( rpm_check( reference:"rp-pppoe-gui-3.5-3.1.100mdk", release:"MDK10.0", yank:"mdk") )
  59. {
  60.  security_hole(0);
  61.  exit(0);
  62. }
  63. if ( rpm_check( reference:"rp-pppoe-3.5-4.1.101mdk", release:"MDK10.1", yank:"mdk") )
  64. {
  65.  security_hole(0);
  66.  exit(0);
  67. }
  68. if ( rpm_check( reference:"rp-pppoe-gui-3.5-4.1.101mdk", release:"MDK10.1", yank:"mdk") )
  69. {
  70.  security_hole(0);
  71.  exit(0);
  72. }
  73. if ( rpm_check( reference:"rp-pppoe-3.5-3.1.92mdk", release:"MDK9.2", yank:"mdk") )
  74. {
  75.  security_hole(0);
  76.  exit(0);
  77. }
  78. if ( rpm_check( reference:"rp-pppoe-gui-3.5-3.1.92mdk", release:"MDK9.2", yank:"mdk") )
  79. {
  80.  security_hole(0);
  81.  exit(0);
  82. }
  83. if (rpm_exists(rpm:"rp-pppoe-", release:"MDK10.0")
  84.  || rpm_exists(rpm:"rp-pppoe-", release:"MDK10.1")
  85.  || rpm_exists(rpm:"rp-pppoe-", release:"MDK9.2") )
  86. {
  87.  set_kb_item(name:"CAN-2004-0564", value:TRUE);
  88. }
  89.