Sat Dec 4 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.96.5-1400
updated to 0.96.5
CVE-2010-4260 Multiple errors within the processing of PDF files can be exploited to e.g. cause a crash.
CVE-2010-4261 An off-by-one error within the ‘icon_cb()’ function can be exploited to cause a memory corruption.
Sun Oct 31 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de> - 0.96.4-1400
updated to 0.96.4
execute ‘make check’ (#640347) but ignore errors for now because four checks are failing on f13
Tue Oct 5 2010 jkeating - 0.96.3-1400.1
Rebuilt for gcc bug 634757
Wed Sep 29 2010 Enrico Scholz <enrico.scholz at informatik.tu-chemnitz.de>
lowered stop priority of sysv initscripts (#629435)
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2010-18568.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(51068);
script_version("1.13");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2010-4260", "CVE-2010-4261", "CVE-2010-4479");
script_bugtraq_id(45152);
script_xref(name:"FEDORA", value:"2010-18568");
script_name(english:"Fedora 14 : clamav-0.96.5-1400.fc14 (2010-18568)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
" - Sat Dec 4 2010 Enrico Scholz <enrico.scholz at
informatik.tu-chemnitz.de> - 0.96.5-1400
- updated to 0.96.5
- CVE-2010-4260 Multiple errors within the processing of
PDF files can be exploited to e.g. cause a crash.
- CVE-2010-4261 An off-by-one error within the 'icon_cb()'
function can be exploited to cause a memory corruption.
- Sun Oct 31 2010 Enrico Scholz <enrico.scholz at
informatik.tu-chemnitz.de> - 0.96.4-1400
- updated to 0.96.4
- execute 'make check' (#640347) but ignore errors for
now because four checks are failing on f13
- Tue Oct 5 2010 jkeating - 0.96.3-1400.1
- Rebuilt for gcc bug 634757
- Wed Sep 29 2010 Enrico Scholz <enrico.scholz at
informatik.tu-chemnitz.de>
- lowered stop priority of sysv initscripts (#629435)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=659861"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2010-December/051905.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?84c221b8"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected clamav package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:clamav");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:14");
script_set_attribute(attribute:"patch_publication_date", value:"2010/12/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/12/08");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^14([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 14.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC14", reference:"clamav-0.96.5-1400.fc14")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "clamav");
}
Vendor | Product | Version | CPE |
---|---|---|---|
fedoraproject | fedora | clamav | p-cpe:/a:fedoraproject:fedora:clamav |
fedoraproject | fedora | 14 | cpe:/o:fedoraproject:fedora:14 |