Lucene search

K
nessusThis script is Copyright (C) 2006-2021 Tenable Network Security, Inc.AIX_IY28586.NASL
HistorySep 16, 2006 - 12:00 a.m.

AIX 5.1 : IY28586

2006-09-1600:00:00
This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.
www.tenable.com
13

The remote host is missing AIX Critical Security Patch number IY28586 (SECURITY: Buffer overflow vulnerability in lsmcode).

You should install this patch for your system to be up-to-date.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
#

if ( ! defined_func("bn_random") ) exit(0);

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(22394);
 script_version("1.7");
 name["english"] = "AIX 5.1 : IY28586";
 
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The remote host is missing AIX Critical Security Patch number IY28586
(SECURITY: Buffer overflow vulnerability in lsmcode).

You should install this patch for your system to be up-to-date." );
 script_set_attribute(attribute:"solution", value:
"http://www-912.ibm.com/eserver/support/fixes/" );
 script_set_attribute(attribute:"risk_factor", value:"High" );


 script_set_attribute(attribute:"plugin_publication_date", value: "2006/09/16");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/05");
 script_end_attributes();

 
 summary["english"] = "Check for patch IY28586"; 
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.");
 family["english"] = "AIX Local Security Checks";
 script_family(english:family["english"]);
 
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/AIX/lslpp");
 exit(0);
}



include("aix.inc");

 if( aix_check_patch(release:"5.1", patch:"IY28586", package:"devices.rspc.base.diag.5.1.0.25 devices.chrp.base.diag.5.1.0.25 devices.base.diag.5.1.0.25 bos.diag.util.5.1.0.25") < 0 ) 
   security_hole();