home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / redhat-RHSA-2004-061.nasl < prev    next >
Text File  |  2005-01-14  |  6KB  |  249 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. #
  5. # The text of this plugin is (C) Red Hat Inc.
  6.  
  7. if ( ! defined_func("bn_random") ) exit(0);
  8. if(description)
  9. {
  10.  script_id(12466);
  11.  script_version ("$Revision: 1.3 $");
  12.  script_cve_id("CAN-2004-0083", "CAN-2004-0084", "CAN-2004-0106");
  13.  
  14.  name["english"] = "RHSA-2004-061: XFree";
  15.  
  16.  script_name(english:name["english"]);
  17.  
  18.  desc["english"] = '
  19.  
  20.   Updated XFree86 packages that fix a privilege escalation vulnerability are
  21.   now available.
  22.  
  23.   [Update 16 February 2004]
  24.   Erratum filelist has been modified for x86_64 and s390x only so that the
  25.   correct multi-lib packages are available.
  26.  
  27.   XFree86 is an implementation of the X Window System, providing the core
  28.   graphical user interface and video drivers.
  29.  
  30.   iDefense discovered two buffer overflows in the parsing of the \'font.alias\'
  31.   file. A local attacker could exploit this vulnerability by creating a
  32.   carefully-crafted file and gaining root privileges.
  33.   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
  34.   assigned the names CAN-2004-0083 and CAN-2004-0084 to these issues.
  35.  
  36.   Additionally David Dawes discovered additional flaws in reading font files.
  37.   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
  38.   assigned the name CAN-2004-0106 to these issues.
  39.  
  40.   All users of XFree86 are advised to upgrade to these erratum packages,
  41.   which contain a backported fix and are not vulnerable to these issues.
  42.  
  43.   Red Hat would like to thank David Dawes from XFree86 for the patches and
  44.   notification of these issues.
  45.  
  46.  
  47.  
  48.  
  49. Solution : http://rhn.redhat.com/errata/RHSA-2004-061.html
  50. Risk factor : High';
  51.  
  52.  script_description(english:desc["english"]);
  53.  
  54.  summary["english"] = "Check for the version of the XFree packages";
  55.  script_summary(english:summary["english"]);
  56.  
  57.  script_category(ACT_GATHER_INFO);
  58.  
  59.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  60.  family["english"] = "Red Hat Local Security Checks";
  61.  script_family(english:family["english"]);
  62.  
  63.  script_dependencies("ssh_get_info.nasl");
  64.  
  65.  script_require_keys("Host/RedHat/rpm-list");
  66.  exit(0);
  67. }
  68.  
  69. include("rpm.inc");
  70. if ( rpm_check( reference:"XFree86-100dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  71. {
  72.  security_hole(0);
  73.  exit(0);
  74. }
  75. if ( rpm_check( reference:"XFree86-4.3.0-55.EL", release:"RHEL3") )
  76. {
  77.  security_hole(0);
  78.  exit(0);
  79. }
  80. if ( rpm_check( reference:"XFree86-75dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  81. {
  82.  security_hole(0);
  83.  exit(0);
  84. }
  85. if ( rpm_check( reference:"XFree86-base-fonts-4.3.0-55.EL", release:"RHEL3") )
  86. {
  87.  security_hole(0);
  88.  exit(0);
  89. }
  90. if ( rpm_check( reference:"XFree86-cyrillic-fonts-4.3.0-55.EL", release:"RHEL3") )
  91. {
  92.  security_hole(0);
  93.  exit(0);
  94. }
  95. if ( rpm_check( reference:"XFree86-devel-4.3.0-55.EL", release:"RHEL3") )
  96. {
  97.  security_hole(0);
  98.  exit(0);
  99. }
  100. if ( rpm_check( reference:"XFree86-doc-4.3.0-55.EL", release:"RHEL3") )
  101. {
  102.  security_hole(0);
  103.  exit(0);
  104. }
  105. if ( rpm_check( reference:"XFree86-font-utils-4.3.0-55.EL", release:"RHEL3") )
  106. {
  107.  security_hole(0);
  108.  exit(0);
  109. }
  110. if ( rpm_check( reference:"XFree86-ISO8859-14-100dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  111. {
  112.  security_hole(0);
  113.  exit(0);
  114. }
  115. if ( rpm_check( reference:"XFree86-ISO8859-14-75dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  116. {
  117.  security_hole(0);
  118.  exit(0);
  119. }
  120. if ( rpm_check( reference:"XFree86-ISO8859-15-100dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  121. {
  122.  security_hole(0);
  123.  exit(0);
  124. }
  125. if ( rpm_check( reference:"XFree86-ISO8859-15-75dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  126. {
  127.  security_hole(0);
  128.  exit(0);
  129. }
  130. if ( rpm_check( reference:"XFree86-ISO8859-2-100dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  131. {
  132.  security_hole(0);
  133.  exit(0);
  134. }
  135. if ( rpm_check( reference:"XFree86-ISO8859-2-75dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  136. {
  137.  security_hole(0);
  138.  exit(0);
  139. }
  140. if ( rpm_check( reference:"XFree86-ISO8859-9-100dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  141. {
  142.  security_hole(0);
  143.  exit(0);
  144. }
  145. if ( rpm_check( reference:"XFree86-ISO8859-9-75dpi-fonts-4.3.0-55.EL", release:"RHEL3") )
  146. {
  147.  security_hole(0);
  148.  exit(0);
  149. }
  150. if ( rpm_check( reference:"XFree86-libs-4.3.0-55.EL", release:"RHEL3") )
  151. {
  152.  security_hole(0);
  153.  exit(0);
  154. }
  155. if ( rpm_check( reference:"XFree86-libs-data-4.3.0-55.EL", release:"RHEL3") )
  156. {
  157.  security_hole(0);
  158.  exit(0);
  159. }
  160. if ( rpm_check( reference:"XFree86-Mesa-libGL-4.3.0-55.EL", release:"RHEL3") )
  161. {
  162.  security_hole(0);
  163.  exit(0);
  164. }
  165. if ( rpm_check( reference:"XFree86-Mesa-libGLU-4.3.0-55.EL", release:"RHEL3") )
  166. {
  167.  security_hole(0);
  168.  exit(0);
  169. }
  170. if ( rpm_check( reference:"XFree86-syriac-fonts-4.3.0-55.EL", release:"RHEL3") )
  171. {
  172.  security_hole(0);
  173.  exit(0);
  174. }
  175. if ( rpm_check( reference:"XFree86-tools-4.3.0-55.EL", release:"RHEL3") )
  176. {
  177.  security_hole(0);
  178.  exit(0);
  179. }
  180. if ( rpm_check( reference:"XFree86-truetype-fonts-4.3.0-55.EL", release:"RHEL3") )
  181. {
  182.  security_hole(0);
  183.  exit(0);
  184. }
  185. if ( rpm_check( reference:"XFree86-twm-4.3.0-55.EL", release:"RHEL3") )
  186. {
  187.  security_hole(0);
  188.  exit(0);
  189. }
  190. if ( rpm_check( reference:"XFree86-xauth-4.3.0-55.EL", release:"RHEL3") )
  191. {
  192.  security_hole(0);
  193.  exit(0);
  194. }
  195. if ( rpm_check( reference:"XFree86-xdm-4.3.0-55.EL", release:"RHEL3") )
  196. {
  197.  security_hole(0);
  198.  exit(0);
  199. }
  200. if ( rpm_check( reference:"XFree86-xfs-4.3.0-55.EL", release:"RHEL3") )
  201. {
  202.  security_hole(0);
  203.  exit(0);
  204. }
  205. if ( rpm_check( reference:"XFree86-Xnest-4.3.0-55.EL", release:"RHEL3") )
  206. {
  207.  security_hole(0);
  208.  exit(0);
  209. }
  210. if ( rpm_check( reference:"XFree86-Xvfb-4.3.0-55.EL", release:"RHEL3") )
  211. {
  212.  security_hole(0);
  213.  exit(0);
  214. }
  215. if ( rpm_check( reference:"XFree86-libs-4.3.0-55.EL", release:"RHEL3") )
  216. {
  217.  security_hole(0);
  218.  exit(0);
  219. }
  220. if ( rpm_check( reference:"XFree86-Mesa-libGL-4.3.0-55.EL", release:"RHEL3") )
  221. {
  222.  security_hole(0);
  223.  exit(0);
  224. }
  225. if ( rpm_check( reference:"XFree86-devel-4.3.0-55.EL", release:"RHEL3") )
  226. {
  227.  security_hole(0);
  228.  exit(0);
  229. }
  230. if ( rpm_check( reference:"XFree86-libs-4.3.0-55.EL", release:"RHEL3") )
  231. {
  232.  security_hole(0);
  233.  exit(0);
  234. }
  235. if ( rpm_check( reference:"XFree86-Mesa-libGL-4.3.0-55.EL", release:"RHEL3") )
  236. {
  237.  security_hole(0);
  238.  exit(0);
  239. }
  240.  
  241. if ( rpm_exists(rpm:"XFree-", release:"RHEL3") )
  242. {
  243.  set_kb_item(name:"CAN-2004-0083", value:TRUE);
  244.  set_kb_item(name:"CAN-2004-0084", value:TRUE);
  245.  set_kb_item(name:"CAN-2004-0106", value:TRUE);
  246. }
  247.  
  248. set_kb_item(name:"RHSA-2004-061", value:TRUE);
  249.