home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / modules / nessus-2.2.8.mo / usr / lib / nessus / plugins / redhat-RHSA-2004-636.nasl < prev    next >
Text File  |  2005-01-14  |  4KB  |  129 lines

  1. #
  2. # (C) Tenable Network Security
  3. #
  4. #
  5. # The text of this plugin is (C) Red Hat Inc.
  6.  
  7. if ( ! defined_func("bn_random") ) exit(0);
  8. if(description)
  9. {
  10.  script_id(15946);
  11.  script_version ("$Revision: 1.1 $");
  12.  script_cve_id("CAN-2004-0827", "CAN-2004-0981");
  13.  
  14.  name["english"] = "RHSA-2004-636: ImageMagick";
  15.  
  16.  script_name(english:name["english"]);
  17.  
  18.  desc["english"] = '
  19.                                                                                   
  20.   Updated ImageMagick packages that fixes a buffer overflow are now available.    
  21.                                                                                   
  22.   ImageMagick(TM) is an image display and manipulation tool for the X Window      
  23.   System.                                                                         
  24.                                                                                   
  25.   A buffer overflow flaw was discovered in the ImageMagick image handler.         
  26.   An attacker could create a carefully crafted image file with an improper        
  27.   EXIF information in such a way that it would cause ImageMagick to execute       
  28.   arbitrary code when processing the image. The Common Vulnerabilities and        
  29.   Exposures project (cve.mitre.org) has assigned the name CAN-2004-0981 to        
  30.   this issue.                                                                     
  31.                                                                                   
  32.   David Eisenstein has reported that our previous fix for CAN-2004-0827, a        
  33.   heap overflow flaw, was incomplete. An attacker could create a carefully        
  34.   crafted BMP file in such a way that it could cause ImageMagick to execute       
  35.   arbitrary code when processing the image. The Common Vulnerabilities and        
  36.   Exposures project (cve.mitre.org) has assigned the name CAN-2004-0827 to        
  37.   this issue.                                                                     
  38.                                                                                   
  39.   Users of ImageMagick should upgrade to these updated packages, which            
  40.   contain a backported patch, and is not vulnerable to this issue.                
  41.                                                                                   
  42.                                                                                   
  43.  
  44.  
  45. Solution : http://rhn.redhat.com/errata/RHSA-2004-636.html
  46. Risk factor : High';
  47.  
  48.  script_description(english:desc["english"]);
  49.  
  50.  summary["english"] = "Check for the version of the ImageMagick packages";
  51.  script_summary(english:summary["english"]);
  52.  
  53.  script_category(ACT_GATHER_INFO);
  54.  
  55.  script_copyright(english:"This script is Copyright (C) 2004 Tenable Network Security");
  56.  family["english"] = "Red Hat Local Security Checks";
  57.  script_family(english:family["english"]);
  58.  
  59.  script_dependencies("ssh_get_info.nasl");
  60.  
  61.  script_require_keys("Host/RedHat/rpm-list");
  62.  exit(0);
  63. }
  64.  
  65. include("rpm.inc");
  66. if ( rpm_check( reference:"ImageMagick-5.3.8-6", release:"RHEL2.1") )
  67. {
  68.  security_hole(0);
  69.  exit(0);
  70. }
  71. if ( rpm_check( reference:"ImageMagick-c++-5.3.8-6", release:"RHEL2.1") )
  72. {
  73.  security_hole(0);
  74.  exit(0);
  75. }
  76. if ( rpm_check( reference:"ImageMagick-c++-devel-5.3.8-6", release:"RHEL2.1") )
  77. {
  78.  security_hole(0);
  79.  exit(0);
  80. }
  81. if ( rpm_check( reference:"ImageMagick-devel-5.3.8-6", release:"RHEL2.1") )
  82. {
  83.  security_hole(0);
  84.  exit(0);
  85. }
  86. if ( rpm_check( reference:"ImageMagick-perl-5.3.8-6", release:"RHEL2.1") )
  87. {
  88.  security_hole(0);
  89.  exit(0);
  90. }
  91. if ( rpm_check( reference:"ImageMagick-5.5.6-7", release:"RHEL3") )
  92. {
  93.  security_hole(0);
  94.  exit(0);
  95. }
  96. if ( rpm_check( reference:"ImageMagick-c++-5.5.6-7", release:"RHEL3") )
  97. {
  98.  security_hole(0);
  99.  exit(0);
  100. }
  101. if ( rpm_check( reference:"ImageMagick-c++-devel-5.5.6-7", release:"RHEL3") )
  102. {
  103.  security_hole(0);
  104.  exit(0);
  105. }
  106. if ( rpm_check( reference:"ImageMagick-devel-5.5.6-7", release:"RHEL3") )
  107. {
  108.  security_hole(0);
  109.  exit(0);
  110. }
  111. if ( rpm_check( reference:"ImageMagick-perl-5.5.6-7", release:"RHEL3") )
  112. {
  113.  security_hole(0);
  114.  exit(0);
  115. }
  116.  
  117. if ( rpm_exists(rpm:"ImageMagick-", release:"RHEL2.1") )
  118. {
  119.  set_kb_item(name:"CAN-2004-0827", value:TRUE);
  120.  set_kb_item(name:"CAN-2004-0981", value:TRUE);
  121. }
  122. if ( rpm_exists(rpm:"ImageMagick-", release:"RHEL3") )
  123. {
  124.  set_kb_item(name:"CAN-2004-0827", value:TRUE);
  125.  set_kb_item(name:"CAN-2004-0981", value:TRUE);
  126. }
  127.  
  128. set_kb_item(name:"RHSA-2004-636", value:TRUE);
  129.