{"openvas": [{"lastseen": "2017-07-02T21:10:04", "bulletinFamily": "scanner", "description": "The host has Ortro installed and is prone to multiple Unspecified\n vulnerabilities.", "modified": "2017-02-17T00:00:00", "published": "2010-01-13T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=800981", "id": "OPENVAS:800981", "title": "Ortro Multiple Unspecified Vulnerabilities", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ortro_mult_vuln_jan10.nasl 5323 2017-02-17 08:49:23Z teissa $\n#\n# Ortro Multiple Unspecified Vulnerabilities\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the remote attacker Disable/Lock a host and\n to perform scp transfer between two remote hosts.\n Impact Level: Application\";\ntag_affected = \"Ortro version prior to 1.3.4\";\ntag_insight = \"The flaw is caused by unspecified errors with unknown impact and attack\n vectors.\";\ntag_solution = \"Upgrade to Ortro version 1.3.4\n For updates refer to http://www.ortro.net/download\";\ntag_summary = \"The host has Ortro installed and is prone to multiple Unspecified\n vulnerabilities.\";\n\nif(description)\n{\n script_id(800981);\n script_version(\"$Revision: 5323 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-17 09:49:23 +0100 (Fri, 17 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-13 15:42:20 +0100 (Wed, 13 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-4519\");\n script_name(\"Ortro Multiple Unspecified Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://www.ortro.net/\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/54026\");\n script_xref(name : \"URL\" , value : \"http://www.vupen.com/english/advisories/2009/3057\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_ortro_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"http_func.inc\");\ninclude(\"version_func.inc\");\n\nortroPort = get_http_port(default:80);\nif(!ortroPort){\n exit(0);\n}\n\nortroVer = get_kb_item(\"www/\"+ ortroPort + \"/Ortro\");\nif(!ortroVer){\n exit(0);\n}\n\nortroVer = eregmatch(pattern:\"^(.+) under (/.*)$\", string:ortroVer);\nif(ortroVer[1] != NULL)\n{\n # Check for Ortro version prior to 1.3.4\n if(version_is_less(version:ortroVer[1], test_version:\"1.3.4\")){\n security_message(ortroPort);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:40:05", "bulletinFamily": "scanner", "description": "The host has Ortro installed and is prone to multiple Unspecified\n vulnerabilities.", "modified": "2019-05-14T00:00:00", "published": "2010-01-13T00:00:00", "id": "OPENVAS:1361412562310800981", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800981", "title": "Ortro Multiple Unspecified Vulnerabilities", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ortro Multiple Unspecified Vulnerabilities\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800981\");\n script_version(\"2019-05-14T12:12:41+0000\");\n script_tag(name:\"last_modification\", value:\"2019-05-14 12:12:41 +0000 (Tue, 14 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2010-01-13 15:42:20 +0100 (Wed, 13 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-4519\");\n script_name(\"Ortro Multiple Unspecified Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://www.ortro.net/\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/54026\");\n script_xref(name:\"URL\", value:\"http://www.vupen.com/english/advisories/2009/3057\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_ortro_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"ortro/detected\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the remote attacker Disable/Lock a host and\n to perform scp transfer between two remote hosts.\");\n\n script_tag(name:\"affected\", value:\"Ortro version prior to 1.3.4.\");\n\n script_tag(name:\"insight\", value:\"The flaw is caused by unspecified errors with unknown impact and attack\n vectors.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Ortro version 1.3.4.\");\n\n script_tag(name:\"summary\", value:\"The host has Ortro installed and is prone to multiple Unspecified\n vulnerabilities.\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"version_func.inc\");\n\nortroPort = get_http_port(default:80);\n\nortroVer = get_kb_item(\"www/\"+ ortroPort + \"/Ortro\");\nif(!ortroVer)\n exit(0);\n\nortroVer = eregmatch(pattern:\"^(.+) under (/.*)$\", string:ortroVer);\nif(ortroVer[1] != NULL)\n{\n if(version_is_less(version:ortroVer[1], test_version:\"1.3.4\")){\n security_message(ortroPort);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}