ID AIX_IV19098.NASL Type nessus Reporter This script is Copyright (C) 2013-2021 Tenable Network Security, Inc. Modified 2013-01-24T00:00:00
Description
AIX could allow a local attacker to gain elevated privileges on the
system, caused by an error in the getpwnam() function when customer
extended LDAP user filtering is configured. A local attacker could
exploit this vulnerability to gain lateral or elevated privileges on
the system.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The text in the description was extracted from AIX Security
# Advisory ldapauth_advisory2.asc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(63715);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2012-0745");
script_name(english:"AIX 7.1 TL 0 : ldapauth (IV19098)");
script_summary(english:"Check for APAR IV19098");
script_set_attribute(
attribute:"synopsis",
value:"The remote AIX host is missing a security patch."
);
script_set_attribute(
attribute:"description",
value:
"AIX could allow a local attacker to gain elevated privileges on the
system, caused by an error in the getpwnam() function when customer
extended LDAP user filtering is configured. A local attacker could
exploit this vulnerability to gain lateral or elevated privileges on
the system."
);
script_set_attribute(
attribute:"see_also",
value:"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc"
);
script_set_attribute(
attribute:"solution",
value:"Install the appropriate interim fix."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:7.1");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/03");
script_set_attribute(attribute:"patch_publication_date", value:"2012/05/03");
script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/24");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.");
script_family(english:"AIX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("aix.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This iFix check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );
flag = 0;
if (aix_check_ifix(release:"7.1", ml:"00", sp:"05", patch:"IV19098s5", package:"bos.rte.security", minfilesetver:"7.1.0.0", maxfilesetver:"7.1.0.17") < 0) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "AIX_IV19098.NASL", "bulletinFamily": "scanner", "title": "AIX 7.1 TL 0 : ldapauth (IV19098)", "description": "AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "published": "2013-01-24T00:00:00", "modified": "2013-01-24T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/63715", "reporter": "This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.", "references": ["http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc"], "cvelist": ["CVE-2012-0745"], "type": "nessus", "lastseen": "2021-01-06T09:17:40", "edition": 23, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-0745"]}, {"type": "seebug", "idList": ["SSV:60126"]}, {"type": "nessus", "idList": ["AIX_U838721.NASL", "AIX_U852829.NASL", "AIX_IV19077.NASL", "AIX_IV19097.NASL", "AIX_U849827.NASL", "AIX_IV18464.NASL", "AIX_IV18637.NASL", "MOZILLA_FIREFOX_1702.NASL", "MACOSX_FIREFOX_17_0_2.NASL", "AIX_IV18638.NASL"]}], "modified": "2021-01-06T09:17:40", "rev": 2}, "score": {"value": 6.2, "vector": "NONE", "modified": "2021-01-06T09:17:40", "rev": 2}, "vulnersScore": 6.2}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ldapauth_advisory2.asc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63715);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 7.1 TL 0 : ldapauth (IV19098)\");\n script_summary(english:\"Check for APAR IV19098\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.1\", ml:\"00\", sp:\"05\", patch:\"IV19098s5\", package:\"bos.rte.security\", minfilesetver:\"7.1.0.0\", maxfilesetver:\"7.1.0.17\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "AIX Local Security Checks", "pluginID": "63715", "cpe": ["cpe:/o:ibm:aix:7.1"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T12:06:00", "description": "The getpwnam function in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.1.0.10 through 2.2.1.3 does not properly interact with customer-extended LDAP user filtering, which allows local users to gain privileges via unspecified vectors.", "edition": 3, "cvss3": {}, "published": "2012-05-04T16:55:00", "title": "CVE-2012-0745", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-0745"], "modified": "2017-12-07T02:29:00", "cpe": ["cpe:/a:ibm:vios:2.2.1.3", "cpe:/a:ibm:vios:2.2.0.10", "cpe:/o:ibm:aix:6.1", "cpe:/a:ibm:vios:2.1.2.13", "cpe:/a:ibm:vios:2.2.0.12", "cpe:/a:ibm:vios:2.1.0.10", "cpe:/a:ibm:vios:2.2.0.11", "cpe:/a:ibm:vios:2.2.1.1", "cpe:/o:ibm:aix:7.1", "cpe:/a:ibm:vios:2.2.0.13", "cpe:/a:ibm:vios:2.2.1.0", "cpe:/a:ibm:vios:2.1.3.10", "cpe:/o:ibm:aix:5.3", "cpe:/a:ibm:vios:2.1.2.12"], "id": "CVE-2012-0745", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0745", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.1.3.10:*:*:*:*:*:*:*"]}], "seebug": [{"lastseen": "2017-11-19T17:52:22", "description": "BUGTRAQ ID: 53393\r\nCVE ID: CVE-2012-0745\r\n\r\nAIX\u662f\u4e00\u4e2a\u57fa\u4e8e\u5f00\u653e\u6807\u51c6\u7684UNIX\u64cd\u4f5c\u7cfb\u7edf\uff0c\u4e3a\u7528\u6237\u63d0\u4f9b\u4f01\u4e1a\u4fe1\u606f\u6280\u672f\u57fa\u7840\u67b6\u6784\u3002\r\n\r\nIBM AIX 5.3\u30016.1\u30017.1\u5728\u5b9e\u73b0\u4e0a\u5b58\u5728\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u63d0\u5347\u7684\u6743\u9650\u3002\r\n0\r\nIBM AIX 7.1\r\nIBM AIX 6.1\r\nIBM AIX 5.3\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nIBM\r\n---\r\nIBM\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08ldapauth_advisory2\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\n\r\nldapauth_advisory2\uff1aVulnerability in LDAP Authentication\r\n\r\n\u94fe\u63a5\uff1ahttp://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc", "published": "2012-05-15T00:00:00", "type": "seebug", "title": "IBM AIX 'getpwnam()'\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e(CVE-2012-0745)", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-0745"], "modified": "2012-05-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-60126", "id": "SSV:60126", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-06T09:18:26", "description": "The remote host is missing AIX PTF U852829, which is related to the\nsecurity of the package bos.rte.security.\n\nAIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-03-13T00:00:00", "title": "AIX 7.1 : bos.rte.security (U852829)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-03-13T00:00:00", "cpe": ["cpe:/o:ibm:aix:7.1"], "id": "AIX_U852829.NASL", "href": "https://www.tenable.com/plugins/nessus/65528", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were extracted\n# from AIX Security PTF U852829. The text itself is copyright (C)\n# International Business Machines Corp.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(65528);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 7.1 : bos.rte.security (U852829)\");\n script_summary(english:\"Check for PTF U852829\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is missing AIX PTF U852829, which is related to the\nsecurity of the package bos.rte.security.\n\nAIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www-01.ibm.com/support/docview.wss?uid=isg1IV19098\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate missing security-related fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/04/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/04/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AIX/oslevel\", \"Host/AIX/version\", \"Host/AIX/lslpp\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nflag = 0;\n\nif ( aix_check_patch(ml:\"710000\", patch:\"U852829\", package:\"bos.rte.security.7.1.0.20\") < 0 ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:17:40", "description": "AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-01-24T00:00:00", "title": "AIX 5.3 TL 12 : ldapauth (IV18638)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-01-24T00:00:00", "cpe": ["cpe:/o:ibm:aix:5.3"], "id": "AIX_IV18638.NASL", "href": "https://www.tenable.com/plugins/nessus/63712", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ldapauth_advisory2.asc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63712);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 5.3 TL 12 : ldapauth (IV18638)\");\n script_summary(english:\"Check for APAR IV18638\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:5.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"5.3\", ml:\"12\", sp:\"05\", patch:\"IV18638s05\", package:\"bos.rte.security\", minfilesetver:\"5.3.12.0\", maxfilesetver:\"5.3.12.4\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:18:24", "description": "The remote host is missing AIX PTF U838721, which is related to the\nsecurity of the package bos.rte.security.\n\nAIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-03-13T00:00:00", "title": "AIX 6.1 TL 7 : bos.rte.security (U838721)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-03-13T00:00:00", "cpe": ["cpe:/o:ibm:aix:6.1"], "id": "AIX_U838721.NASL", "href": "https://www.tenable.com/plugins/nessus/65473", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were extracted\n# from AIX Security PTF U838721. The text itself is copyright (C)\n# International Business Machines Corp.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(65473);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 6.1 TL 7 : bos.rte.security (U838721)\");\n script_summary(english:\"Check for PTF U838721\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is missing AIX PTF U838721, which is related to the\nsecurity of the package bos.rte.security.\n\nAIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www-01.ibm.com/support/docview.wss?uid=isg1IV18637\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate missing security-related fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:6.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/03/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AIX/oslevel\", \"Host/AIX/version\", \"Host/AIX/lslpp\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nflag = 0;\n\nif ( aix_check_patch(ml:\"610007\", patch:\"U838721\", package:\"bos.rte.security.6.1.7.15\") < 0 ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:17:40", "description": "AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-01-24T00:00:00", "title": "AIX 7.1 TL 1 : ldapauth (IV18464)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-01-24T00:00:00", "cpe": ["cpe:/o:ibm:aix:7.1"], "id": "AIX_IV18464.NASL", "href": "https://www.tenable.com/plugins/nessus/63710", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ldapauth_advisory2.asc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63710);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 7.1 TL 1 : ldapauth (IV18464)\");\n script_summary(english:\"Check for APAR IV18464\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.1\", ml:\"01\", sp:\"03\", patch:\"IV18464s3\", package:\"bos.rte.security\", minfilesetver:\"7.1.1.0\", maxfilesetver:\"7.1.1.2\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:17:40", "description": "AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-01-24T00:00:00", "title": "AIX 6.1 TL 5 : ldapauth (IV19097)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-01-24T00:00:00", "cpe": ["cpe:/o:ibm:aix:6.1"], "id": "AIX_IV19097.NASL", "href": "https://www.tenable.com/plugins/nessus/63714", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ldapauth_advisory2.asc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63714);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 6.1 TL 5 : ldapauth (IV19097)\");\n script_summary(english:\"Check for APAR IV19097\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:6.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"6.1\", ml:\"05\", sp:\"08\", patch:\"IV19097s8\", package:\"bos.rte.security\", minfilesetver:\"6.1.5.0\", maxfilesetver:\"6.1.5.7\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:18:26", "description": "The remote host is missing AIX PTF U849827, which is related to the\nsecurity of the package bos.rte.security.\n\nAIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-03-13T00:00:00", "title": "AIX 6.1 TL 5 : bos.rte.security (U849827)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-03-13T00:00:00", "cpe": ["cpe:/o:ibm:aix:6.1"], "id": "AIX_U849827.NASL", "href": "https://www.tenable.com/plugins/nessus/65520", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were extracted\n# from AIX Security PTF U849827. The text itself is copyright (C)\n# International Business Machines Corp.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(65520);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 6.1 TL 5 : bos.rte.security (U849827)\");\n script_summary(english:\"Check for PTF U849827\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is missing AIX PTF U849827, which is related to the\nsecurity of the package bos.rte.security.\n\nAIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www-01.ibm.com/support/docview.wss?uid=isg1IV19097\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate missing security-related fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:6.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/04/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/04/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AIX/oslevel\", \"Host/AIX/version\", \"Host/AIX/lslpp\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nflag = 0;\n\nif ( aix_check_patch(ml:\"610005\", patch:\"U849827\", package:\"bos.rte.security.6.1.5.8\") < 0 ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:17:40", "description": "AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-01-24T00:00:00", "title": "AIX 6.1 TL 6 : ldapauth (IV19077)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-01-24T00:00:00", "cpe": ["cpe:/o:ibm:aix:6.1"], "id": "AIX_IV19077.NASL", "href": "https://www.tenable.com/plugins/nessus/63713", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ldapauth_advisory2.asc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63713);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 6.1 TL 6 : ldapauth (IV19077)\");\n script_summary(english:\"Check for APAR IV19077\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:6.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"6.1\", ml:\"06\", sp:\"07\", patch:\"IV19077s07\", package:\"bos.rte.security\", minfilesetver:\"6.1.6.0\", maxfilesetver:\"6.1.6.17\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:17:40", "description": "AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.", "edition": 23, "published": "2013-01-24T00:00:00", "title": "AIX 6.1 TL 7 : ldapauth (IV18637)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-0745"], "modified": "2013-01-24T00:00:00", "cpe": ["cpe:/o:ibm:aix:6.1"], "id": "AIX_IV18637.NASL", "href": "https://www.tenable.com/plugins/nessus/63711", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory ldapauth_advisory2.asc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63711);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-0745\");\n\n script_name(english:\"AIX 6.1 TL 7 : ldapauth (IV18637)\");\n script_summary(english:\"Check for APAR IV18637\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"AIX could allow a local attacker to gain elevated privileges on the\nsystem, caused by an error in the getpwnam() function when customer\nextended LDAP user filtering is configured. A local attacker could\nexploit this vulnerability to gain lateral or elevated privileges on\nthe system.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/ldapauth_advisory2.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:6.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"6.1\", ml:\"07\", sp:\"03\", patch:\"IV18637s03\", package:\"bos.rte.security\", minfilesetver:\"6.1.7.0\", maxfilesetver:\"6.1.7.2\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:48:41", "description": "The installed version of Firefox 17.x is potentially affected by the\nfollowing security issues :\n \n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that could lead to potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that could allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects could lead to address information leakage.\n (CVE-2013-0748)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n \n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes, which could allow \n arbitrary code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins could \n allow privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that could\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n could result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)", "edition": 26, "published": "2013-01-15T00:00:00", "title": "Firefox ESR 17.x < 17.0.2 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0746", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2012-0745", "CVE-2013-0757", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MOZILLA_FIREFOX_1702.NASL", "href": "https://www.tenable.com/plugins/nessus/63550", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63550);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\n \"CVE-2013-0744\",\n \"CVE-2013-0745\",\n \"CVE-2013-0746\",\n \"CVE-2013-0747\",\n \"CVE-2013-0748\",\n \"CVE-2013-0750\",\n \"CVE-2013-0752\",\n \"CVE-2013-0753\",\n \"CVE-2013-0754\",\n \"CVE-2013-0755\",\n \"CVE-2013-0756\",\n \"CVE-2013-0757\",\n \"CVE-2013-0758\",\n \"CVE-2013-0759\",\n \"CVE-2013-0764\",\n \"CVE-2013-0768\"\n );\n script_bugtraq_id(\n 57204,\n 57209,\n 57211,\n 57213,\n 57215,\n 57217,\n 57218,\n 57228,\n 57232,\n 57234,\n 57235,\n 57236,\n 57238,\n 57240,\n 57241,\n 57244,\n 57258\n );\n\n script_name(english:\"Firefox ESR 17.x < 17.0.2 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox 17.x is potentially affected by the\nfollowing security issues :\n \n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that could lead to potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that could allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects could lead to address information leakage.\n (CVE-2013-0748)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n \n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes, which could allow \n arbitrary code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins could \n allow privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that could\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n could result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-003/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-006/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-037/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-038/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-039/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 17.0.2 ESR or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-0768\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mozilla_org_installed.nasl\");\n script_require_keys(\"Mozilla/Firefox/Version\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nport = get_kb_item_or_exit(\"SMB/transport\"); \n\ninstalls = get_kb_list(\"SMB/Mozilla/Firefox/*\");\nif (isnull(installs)) audit(AUDIT_NOT_INST, \"Firefox\");\n\nmozilla_check_version(installs:installs, product:'firefox', esr:TRUE, fix:'17.0.2', min:'17.0', severity:SECURITY_HOLE, xss:TRUE);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:27:56", "description": "The installed version of Firefox ESR is earlier than 17.0.2 and thus, \nis potentially affected by the following security issues :\n \n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that could lead to potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that could allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects could lead to address information leakage.\n (CVE-2013-0748)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n \n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes, which could allow \n arbitrary code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins could \n allow privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that could\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n could result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)", "edition": 26, "published": "2013-01-15T00:00:00", "title": "Firefox ESR < 17.0.2 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-0743", "CVE-2013-0746", "CVE-2013-0747", "CVE-2013-0744", "CVE-2013-0748", "CVE-2013-0768", "CVE-2013-0755", "CVE-2013-0752", "CVE-2013-0754", "CVE-2012-0745", "CVE-2013-0757", "CVE-2013-0745", "CVE-2013-0756", "CVE-2013-0753", "CVE-2013-0750", "CVE-2013-0759", "CVE-2013-0758", "CVE-2013-0764"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mozilla:firefox"], "id": "MACOSX_FIREFOX_17_0_2.NASL", "href": "https://www.tenable.com/plugins/nessus/63544", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63544);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\n \"CVE-2013-0744\",\n \"CVE-2013-0745\",\n \"CVE-2013-0746\",\n \"CVE-2013-0747\",\n \"CVE-2013-0748\",\n \"CVE-2013-0750\",\n \"CVE-2013-0752\",\n \"CVE-2013-0753\",\n \"CVE-2013-0754\",\n \"CVE-2013-0755\",\n \"CVE-2013-0756\",\n \"CVE-2013-0757\",\n \"CVE-2013-0758\",\n \"CVE-2013-0759\",\n \"CVE-2013-0764\",\n \"CVE-2013-0768\"\n );\n script_bugtraq_id(\n 57204,\n 57209,\n 57211,\n 57213,\n 57215,\n 57217,\n 57218,\n 57228,\n 57232,\n 57234,\n 57235,\n 57236,\n 57238,\n 57240,\n 57241,\n 57244,\n 57258\n );\n\n script_name(english:\"Firefox ESR < 17.0.2 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks version of Firefox\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The installed version of Firefox ESR is earlier than 17.0.2 and thus, \nis potentially affected by the following security issues :\n \n - Two intermediate certificates were improperly issued by\n TURKTRUST certificate authority. (CVE-2013-0743)\n\n - A use-after-free error exists related to displaying\n HTML tables with many columns and column groups.\n (CVE-2013-0744)\n\n - An error exists related to the 'AutoWrapperChanger'\n class that does not properly manage objects during\n garbage collection. (CVE-2012-0745)\n\n - An error exists related to 'jsval', 'quickstubs', and\n compartmental mismatches that could lead to potentially\n exploitable crashes. (CVE-2013-0746)\n\n - Errors exist related to events in the plugin handler\n that could allow same-origin policy bypass.\n (CVE-2013-0747)\n\n - An error related to the 'toString' method of XBL\n objects could lead to address information leakage.\n (CVE-2013-0748)\n\n - A buffer overflow exists related to JavaScript string\n concatenation. (CVE-2013-0750)\n \n - An error exists related to multiple XML bindings with\n SVG content, contained in XBL files. (CVE-2013-0752)\n\n - A use-after-free error exists related to\n 'XMLSerializer' and 'serializeToStream'.\n (CVE-2013-0753)\n\n - A use-after-free error exists related to garbage\n collection and 'ListenManager'. (CVE-2013-0754)\n\n - A use-after-free error exists related to the 'Vibrate'\n library and 'domDoc'. (CVE-2013-0755)\n\n - A use-after-free error exists related to JavaScript\n 'Proxy' objects. (CVE-2013-0756)\n \n - 'Chrome Object Wrappers' (COW) can be bypassed by\n changing object prototypes, which could allow \n arbitrary code execution. (CVE-2013-0757)\n\n - An error related to SVG elements and plugins could \n allow privilege escalation. (CVE-2013-0758)\n\n - An error exists related to the address bar that could\n allow URL spoofing attacks. (CVE-2013-0759)\n\n - An error exists related to SSL and threading that\n could result in potentially exploitable crashes.\n (CVE-2013-0764)\n\n - An error exists related to 'Canvas' and bad height or\n width values passed to it from HTML. (CVE-2013-0768)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-003/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-006/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-037/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-038/\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-13-039/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-03/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-04/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-05/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-07/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-08/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-09/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-10/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-11/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-12/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-13/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-14/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-15/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-16/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-17/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-18/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2013-20/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Firefox 17.0.2 ESR or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2013-0768\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Firefox 17.0.1 Flash Privileged Code Injection');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mozilla:firefox\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_firefox_installed.nasl\");\n script_require_keys(\"MacOSX/Firefox/Installed\");\n\n exit(0);\n}\n\ninclude(\"mozilla_version.inc\");\nkb_base = \"MacOSX/Firefox\";\nget_kb_item_or_exit(kb_base+\"/Installed\");\n\nversion = get_kb_item_or_exit(kb_base+\"/Version\", exit_code:1);\npath = get_kb_item_or_exit(kb_base+\"/Path\", exit_code:1);\n\nif (isnull(get_kb_item(kb_base + '/is_esr'))) audit(AUDIT_NOT_INST, 'Mozilla Firefox ESR');\n\nmozilla_check_version(product:'firefox', version:version, path:path, esr:TRUE, fix:'17.0.2', severity:SECURITY_HOLE);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}