home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / redhat-RHSA-2003-065.nasl < prev    next >
Text File  |  2005-01-14  |  4KB  |  169 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. #
  5. # The text of this plugin is (C) Red Hat Inc.
  6.  
  7. if ( ! defined_func("bn_random") ) exit(0);
  8. if(description)
  9. {
  10.  script_id(12369);
  11.  script_version ("$Revision: 1.5 $");
  12.  script_cve_id("CAN-2001-1409", "CAN-2002-0164", "CVE-2002-1510", "CVE-2003-0063", "CVE-2003-0071");
  13.  
  14.  name["english"] = "RHSA-2003-065: XFree";
  15.  
  16.  script_name(english:name["english"]);
  17.  
  18.  desc["english"] = '
  19.  
  20.   Updated XFree86 packages that resolve various security issues and
  21.   additionally provide a number of bug fixes and enhancements are now
  22.   available for Red Hat Enterprise Linux 2.1.
  23.  
  24.   XFree86 is an implementation of the X Window System, which provides the
  25.   graphical user interface, video drivers, etc. for Linux systems.
  26.  
  27.   A number of security vulnerabilities have been found and fixed. In
  28.   addition, various other bug fixes, driver updates, and other enhancements
  29.   have been made.
  30.  
  31.   Users are advised to upgrade to these updated packages, which contain
  32.   XFree86 version 4.1.0 with patches correcting these issues.
  33.  
  34.  
  35.  
  36.  
  37. Solution : http://rhn.redhat.com/errata/RHSA-2003-065.html
  38. Risk factor : High';
  39.  
  40.  script_description(english:desc["english"]);
  41.  
  42.  summary["english"] = "Check for the version of the XFree packages";
  43.  script_summary(english:summary["english"]);
  44.  
  45.  script_category(ACT_GATHER_INFO);
  46.  
  47.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  48.  family["english"] = "Red Hat Local Security Checks";
  49.  script_family(english:family["english"]);
  50.  
  51.  script_dependencies("ssh_get_info.nasl");
  52.  
  53.  script_require_keys("Host/RedHat/rpm-list");
  54.  exit(0);
  55. }
  56.  
  57. include("rpm.inc");
  58. if ( rpm_check( reference:"XFree86-100dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  59. {
  60.  security_hole(0);
  61.  exit(0);
  62. }
  63. if ( rpm_check( reference:"XFree86-4.1.0-49.RHEL", release:"RHEL2.1") )
  64. {
  65.  security_hole(0);
  66.  exit(0);
  67. }
  68. if ( rpm_check( reference:"XFree86-75dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  69. {
  70.  security_hole(0);
  71.  exit(0);
  72. }
  73. if ( rpm_check( reference:"XFree86-cyrillic-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  74. {
  75.  security_hole(0);
  76.  exit(0);
  77. }
  78. if ( rpm_check( reference:"XFree86-devel-4.1.0-49.RHEL", release:"RHEL2.1") )
  79. {
  80.  security_hole(0);
  81.  exit(0);
  82. }
  83. if ( rpm_check( reference:"XFree86-doc-4.1.0-49.RHEL", release:"RHEL2.1") )
  84. {
  85.  security_hole(0);
  86.  exit(0);
  87. }
  88. if ( rpm_check( reference:"XFree86-ISO8859-15-100dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  89. {
  90.  security_hole(0);
  91.  exit(0);
  92. }
  93. if ( rpm_check( reference:"XFree86-ISO8859-15-75dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  94. {
  95.  security_hole(0);
  96.  exit(0);
  97. }
  98. if ( rpm_check( reference:"XFree86-ISO8859-2-100dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  99. {
  100.  security_hole(0);
  101.  exit(0);
  102. }
  103. if ( rpm_check( reference:"XFree86-ISO8859-2-75dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  104. {
  105.  security_hole(0);
  106.  exit(0);
  107. }
  108. if ( rpm_check( reference:"XFree86-ISO8859-9-100dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  109. {
  110.  security_hole(0);
  111.  exit(0);
  112. }
  113. if ( rpm_check( reference:"XFree86-ISO8859-9-75dpi-fonts-4.1.0-49.RHEL", release:"RHEL2.1") )
  114. {
  115.  security_hole(0);
  116.  exit(0);
  117. }
  118. if ( rpm_check( reference:"XFree86-libs-4.1.0-49.RHEL", release:"RHEL2.1") )
  119. {
  120.  security_hole(0);
  121.  exit(0);
  122. }
  123. if ( rpm_check( reference:"XFree86-tools-4.1.0-49.RHEL", release:"RHEL2.1") )
  124. {
  125.  security_hole(0);
  126.  exit(0);
  127. }
  128. if ( rpm_check( reference:"XFree86-twm-4.1.0-49.RHEL", release:"RHEL2.1") )
  129. {
  130.  security_hole(0);
  131.  exit(0);
  132. }
  133. if ( rpm_check( reference:"XFree86-xdm-4.1.0-49.RHEL", release:"RHEL2.1") )
  134. {
  135.  security_hole(0);
  136.  exit(0);
  137. }
  138. if ( rpm_check( reference:"XFree86-xf86cfg-4.1.0-49.RHEL", release:"RHEL2.1") )
  139. {
  140.  security_hole(0);
  141.  exit(0);
  142. }
  143. if ( rpm_check( reference:"XFree86-xfs-4.1.0-49.RHEL", release:"RHEL2.1") )
  144. {
  145.  security_hole(0);
  146.  exit(0);
  147. }
  148. if ( rpm_check( reference:"XFree86-Xnest-4.1.0-49.RHEL", release:"RHEL2.1") )
  149. {
  150.  security_hole(0);
  151.  exit(0);
  152. }
  153. if ( rpm_check( reference:"XFree86-Xvfb-4.1.0-49.RHEL", release:"RHEL2.1") )
  154. {
  155.  security_hole(0);
  156.  exit(0);
  157. }
  158.  
  159. if ( rpm_exists(rpm:"XFree-", release:"RHEL2.1") )
  160. {
  161.  set_kb_item(name:"CAN-2001-1409", value:TRUE);
  162.  set_kb_item(name:"CAN-2002-0164", value:TRUE);
  163.  set_kb_item(name:"CVE-2002-1510", value:TRUE);
  164.  set_kb_item(name:"CVE-2003-0063", value:TRUE);
  165.  set_kb_item(name:"CVE-2003-0071", value:TRUE);
  166. }
  167.  
  168. set_kb_item(name:"RHSA-2003-065", value:TRUE);
  169.