ID FEDORA_2011-16859.NASL Type nessus Reporter This script is Copyright (C) 2011-2019 Tenable Network Security, Inc. Modified 2019-12-02T00:00:00
Description
This update fixes CVE-2011-4114 (insecure temporary directory
handling). See bug #753955 for tests.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2011-16859.
#
include("compat.inc");
if (description)
{
script_id(57368);
script_version("1.10");
script_cvs_date("Date: 2019/08/02 13:32:34");
script_cve_id("CVE-2011-4114");
script_bugtraq_id(50540);
script_xref(name:"FEDORA", value:"2011-16859");
script_name(english:"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"This update fixes CVE-2011-4114 (insecure temporary directory
handling). See bug #753955 for tests.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=753955"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c0b83d3f"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?9203463d"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected perl-PAR and / or perl-PAR-Packer packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:perl-PAR");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:15");
script_set_attribute(attribute:"patch_publication_date", value:"2011/12/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/22");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^15([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 15.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC15", reference:"perl-PAR-1.002-4.fc15")) flag++;
if (rpm_check(release:"FC15", reference:"perl-PAR-Packer-1.008-4.fc15")) flag++;
if (flag)
{
if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
else security_note(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "perl-PAR / perl-PAR-Packer");
}
{"id": "FEDORA_2011-16859.NASL", "bulletinFamily": "scanner", "title": "Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)", "description": "This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2011-12-22T00:00:00", "modified": "2019-12-02T00:00:00", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/57368", "reporter": "This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.", "references": ["http://www.nessus.org/u?9203463d", "http://www.nessus.org/u?c0b83d3f", "https://bugzilla.redhat.com/show_bug.cgi?id=753955"], "cvelist": ["CVE-2011-4114"], "type": "nessus", "lastseen": "2019-12-13T07:03:28", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-PAR", "p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer", "cpe:/o:fedoraproject:fedora:15"], "cvelist": ["CVE-2011-4114"], "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}, "description": "This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 8, "enchantments": {"dependencies": {"modified": "2019-11-01T02:26:53", "references": [{"idList": ["CVE-2011-4114"], "type": "cve"}, {"idList": ["FEDORA_2011-16856.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:863914", "OPENVAS:863886", "OPENVAS:1361412562310863886", "OPENVAS:863669", "OPENVAS:802562", "OPENVAS:1361412562310863914", "OPENVAS:1361412562310863668", "OPENVAS:1361412562310863669", "OPENVAS:1361412562310803343", "OPENVAS:863668"], "type": "openvas"}]}, "score": {"modified": "2019-11-01T02:26:53", "value": 5.3, "vector": "NONE"}}, "hash": "85f166f983541cd2fa3b88cd206fff86aca143ba013dd917a22ce95438069267", "hashmap": [{"hash": "f7369ad7a8b7c2873ab427f12ff3a7a0", "key": "published"}, {"hash": "85a4f9a55b00f26fb88ae4a2b40e7ef4", "key": "references"}, {"hash": "abcf9266f425f12dda38f529cd4a94bc", "key": "modified"}, {"hash": "d06743fb01be838054e405f2591bfbab", "key": "reporter"}, {"hash": "62d42c73c9091e8b39f9d397b45fd1a2", "key": "cpe"}, {"hash": "545c3d2fd2aa58d0e0d4eedeb6815e4c", "key": "title"}, {"hash": "c6d6d0a7dd44c4acb5181f4696449f05", "key": "href"}, {"hash": "d66a97274330eadcc3524f69bb61ad2e", "key": "description"}, {"hash": "77de9efea2217843001bf66ac0075530", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "accaf235b0edc5850498425a0c0fb36f", "key": "pluginID"}, {"hash": "2bf8f57998b4d5deeb74ff01a4131089", "key": "cvelist"}, {"hash": "3b30c17d94d0fd31cc394dc64233f761", "key": "sourceData"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/57368", "id": "FEDORA_2011-16859.NASL", "lastseen": "2019-11-01T02:26:53", "modified": "2019-11-02T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "57368", "published": "2011-12-22T00:00:00", "references": ["http://www.nessus.org/u?9203463d", "http://www.nessus.org/u?c0b83d3f", "https://bugzilla.redhat.com/show_bug.cgi?id=753955"], "reporter": "This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16859.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57368);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/08/02 13:32:34\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n\n script_name(english:\"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0b83d3f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9203463d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-1.002-4.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-Packer-1.008-4.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "title": "Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)", "type": "nessus", "viewCount": 3}, "differentElements": ["modified"], "edition": 8, "lastseen": "2019-11-01T02:26:53"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-PAR", "p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer", "cpe:/o:fedoraproject:fedora:15"], "cvelist": ["CVE-2011-4114"], "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "description": "This update fixes CVE-2011-4114 (insecure temporary directory handling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-02-21T01:15:48", "references": [{"idList": ["CVE-2011-4114"], "type": "cve"}, {"idList": ["FEDORA_2011-16856.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:863914", "OPENVAS:863886", "OPENVAS:1361412562310863886", "OPENVAS:863669", "OPENVAS:802562", "OPENVAS:1361412562310863914", "OPENVAS:1361412562310863668", "OPENVAS:1361412562310863669", "OPENVAS:1361412562310803343", "OPENVAS:863668"], "type": "openvas"}]}, "score": {"modified": "2019-02-21T01:15:48", "value": 5.3, "vector": "NONE"}}, "hash": "a3f0bcebef4a3c4ef5126a5fb9636167f6efab3257f3d15a52f22e0a9a06ed10", "hashmap": [{"hash": "f7369ad7a8b7c2873ab427f12ff3a7a0", "key": "published"}, {"hash": "85a4f9a55b00f26fb88ae4a2b40e7ef4", "key": "references"}, {"hash": "de38caaccc231e6a74b77a602b35db95", "key": "modified"}, {"hash": "e019a13fb060a83ea5f10886c26f3fa9", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "62d42c73c9091e8b39f9d397b45fd1a2", "key": "cpe"}, {"hash": "545c3d2fd2aa58d0e0d4eedeb6815e4c", "key": "title"}, {"hash": "5de4e9e006116026815535e551c36ee8", "key": "href"}, {"hash": "40ff91dc956033684fcbfc2dd8722d76", "key": "sourceData"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "d82e5473b48351d5ef66660c21ced17e", "key": "cvss"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "accaf235b0edc5850498425a0c0fb36f", "key": "pluginID"}, {"hash": "2bf8f57998b4d5deeb74ff01a4131089", "key": "cvelist"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=57368", "id": "FEDORA_2011-16859.NASL", "lastseen": "2019-02-21T01:15:48", "modified": "2015-10-20T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "57368", "published": "2011-12-22T00:00:00", "references": ["http://www.nessus.org/u?9203463d", "http://www.nessus.org/u?c0b83d3f", "https://bugzilla.redhat.com/show_bug.cgi?id=753955"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16859.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57368);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2015/10/20 21:56:30 $\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n\n script_name(english:\"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0b83d3f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9203463d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-1.002-4.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-Packer-1.008-4.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "title": "Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)", "type": "nessus", "viewCount": 3}, "differentElements": ["cvss", "description", "reporter", "modified", "sourceData", "href"], "edition": 6, "lastseen": "2019-02-21T01:15:48"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-PAR", "p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer", "cpe:/o:fedoraproject:fedora:15"], "cvelist": ["CVE-2011-4114"], "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}, "description": "This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 7, "enchantments": {"dependencies": {"modified": "2019-10-28T20:11:17", "references": [{"idList": ["CVE-2011-4114"], "type": "cve"}, {"idList": ["FEDORA_2011-16856.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:863914", "OPENVAS:863886", "OPENVAS:1361412562310863886", "OPENVAS:863669", "OPENVAS:802562", "OPENVAS:1361412562310863914", "OPENVAS:1361412562310863668", "OPENVAS:1361412562310863669", "OPENVAS:1361412562310803343", "OPENVAS:863668"], "type": "openvas"}]}, "score": {"modified": "2019-10-28T20:11:17", "value": 5.3, "vector": "NONE"}}, "hash": "d904cc59d2846919c189801f9eed3a478359e4f604e35ffd8ce332504ef4ec76", "hashmap": [{"hash": "f7369ad7a8b7c2873ab427f12ff3a7a0", "key": "published"}, {"hash": "85a4f9a55b00f26fb88ae4a2b40e7ef4", "key": "references"}, {"hash": "d06743fb01be838054e405f2591bfbab", "key": "reporter"}, {"hash": "62d42c73c9091e8b39f9d397b45fd1a2", "key": "cpe"}, {"hash": "545c3d2fd2aa58d0e0d4eedeb6815e4c", "key": "title"}, {"hash": "c6d6d0a7dd44c4acb5181f4696449f05", "key": "href"}, {"hash": "d66a97274330eadcc3524f69bb61ad2e", "key": "description"}, {"hash": "77de9efea2217843001bf66ac0075530", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "accaf235b0edc5850498425a0c0fb36f", "key": "pluginID"}, {"hash": "2bf8f57998b4d5deeb74ff01a4131089", "key": "cvelist"}, {"hash": "3b30c17d94d0fd31cc394dc64233f761", "key": "sourceData"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/57368", "id": "FEDORA_2011-16859.NASL", "lastseen": "2019-10-28T20:11:17", "modified": "2019-10-02T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "57368", "published": "2011-12-22T00:00:00", "references": ["http://www.nessus.org/u?9203463d", "http://www.nessus.org/u?c0b83d3f", "https://bugzilla.redhat.com/show_bug.cgi?id=753955"], "reporter": "This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16859.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57368);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/08/02 13:32:34\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n\n script_name(english:\"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0b83d3f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9203463d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-1.002-4.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-Packer-1.008-4.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "title": "Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)", "type": "nessus", "viewCount": 3}, "differentElements": ["modified"], "edition": 7, "lastseen": "2019-10-28T20:11:17"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-PAR", "p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer", "cpe:/o:fedoraproject:fedora:15"], "cvelist": ["CVE-2011-4114"], "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "description": "This update fixes CVE-2011-4114 (insecure temporary directory handling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 2, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}}, "hash": "a3f0bcebef4a3c4ef5126a5fb9636167f6efab3257f3d15a52f22e0a9a06ed10", "hashmap": [{"hash": "f7369ad7a8b7c2873ab427f12ff3a7a0", "key": "published"}, {"hash": "85a4f9a55b00f26fb88ae4a2b40e7ef4", "key": "references"}, {"hash": "de38caaccc231e6a74b77a602b35db95", "key": "modified"}, {"hash": "e019a13fb060a83ea5f10886c26f3fa9", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "62d42c73c9091e8b39f9d397b45fd1a2", "key": "cpe"}, {"hash": "545c3d2fd2aa58d0e0d4eedeb6815e4c", "key": "title"}, {"hash": "5de4e9e006116026815535e551c36ee8", "key": "href"}, {"hash": "40ff91dc956033684fcbfc2dd8722d76", "key": "sourceData"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "d82e5473b48351d5ef66660c21ced17e", "key": "cvss"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "accaf235b0edc5850498425a0c0fb36f", "key": "pluginID"}, {"hash": "2bf8f57998b4d5deeb74ff01a4131089", "key": "cvelist"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=57368", "id": "FEDORA_2011-16859.NASL", "lastseen": "2017-10-29T13:35:16", "modified": "2015-10-20T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "57368", "published": "2011-12-22T00:00:00", "references": ["http://www.nessus.org/u?9203463d", "http://www.nessus.org/u?c0b83d3f", "https://bugzilla.redhat.com/show_bug.cgi?id=753955"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16859.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57368);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2015/10/20 21:56:30 $\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n\n script_name(english:\"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0b83d3f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9203463d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-1.002-4.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-Packer-1.008-4.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "title": "Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)", "type": "nessus", "viewCount": 1}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2017-10-29T13:35:16"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-PAR", "p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer", "cpe:/o:fedoraproject:fedora:15"], "cvelist": ["CVE-2011-4114"], "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "description": "This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-01-16T20:12:56", "references": [{"idList": ["CVE-2011-4114"], "type": "cve"}, {"idList": ["OPENVAS:1361412562310802562", "OPENVAS:863914", "OPENVAS:863886", "OPENVAS:1361412562310863886", "OPENVAS:863669", "OPENVAS:1361412562310863914", "OPENVAS:1361412562310863668", "OPENVAS:1361412562310863669", "OPENVAS:863668", "OPENVAS:803343"], "type": "openvas"}, {"idList": ["FEDORA_2011-16856.NASL"], "type": "nessus"}]}, "score": {"value": 2.1, "vector": "NONE"}}, "hash": "05d521819d411b439fb588e49a0f26f9e2055fbb1653817822b5bc2ffb6d9b99", "hashmap": [{"hash": "f7369ad7a8b7c2873ab427f12ff3a7a0", "key": "published"}, {"hash": "85a4f9a55b00f26fb88ae4a2b40e7ef4", "key": "references"}, {"hash": "de38caaccc231e6a74b77a602b35db95", "key": "modified"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "62d42c73c9091e8b39f9d397b45fd1a2", "key": "cpe"}, {"hash": "545c3d2fd2aa58d0e0d4eedeb6815e4c", "key": "title"}, {"hash": "5de4e9e006116026815535e551c36ee8", "key": "href"}, {"hash": "40ff91dc956033684fcbfc2dd8722d76", "key": "sourceData"}, {"hash": "d66a97274330eadcc3524f69bb61ad2e", "key": "description"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "d82e5473b48351d5ef66660c21ced17e", "key": "cvss"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "accaf235b0edc5850498425a0c0fb36f", "key": "pluginID"}, {"hash": "2bf8f57998b4d5deeb74ff01a4131089", "key": "cvelist"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=57368", "id": "FEDORA_2011-16859.NASL", "lastseen": "2019-01-16T20:12:56", "modified": "2015-10-20T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "57368", "published": "2011-12-22T00:00:00", "references": ["http://www.nessus.org/u?9203463d", "http://www.nessus.org/u?c0b83d3f", "https://bugzilla.redhat.com/show_bug.cgi?id=753955"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16859.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57368);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2015/10/20 21:56:30 $\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n\n script_name(english:\"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0b83d3f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9203463d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-1.002-4.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-Packer-1.008-4.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "title": "Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)", "type": "nessus", "viewCount": 2}, "differentElements": ["description"], "edition": 5, "lastseen": "2019-01-16T20:12:56"}], "edition": 9, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "62d42c73c9091e8b39f9d397b45fd1a2"}, {"key": "cvelist", "hash": "2bf8f57998b4d5deeb74ff01a4131089"}, {"key": "cvss", "hash": "77de9efea2217843001bf66ac0075530"}, {"key": "description", "hash": "d66a97274330eadcc3524f69bb61ad2e"}, {"key": "href", "hash": "c6d6d0a7dd44c4acb5181f4696449f05"}, {"key": "modified", "hash": "5a7504dfe859a7ccbaf560628f6442ad"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "accaf235b0edc5850498425a0c0fb36f"}, {"key": "published", "hash": "f7369ad7a8b7c2873ab427f12ff3a7a0"}, {"key": "references", "hash": "85a4f9a55b00f26fb88ae4a2b40e7ef4"}, {"key": "reporter", "hash": "d06743fb01be838054e405f2591bfbab"}, {"key": "sourceData", "hash": "3b30c17d94d0fd31cc394dc64233f761"}, {"key": "title", "hash": "545c3d2fd2aa58d0e0d4eedeb6815e4c"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "e0b5d47853c3aca676cf0398a691d0b04c769a5b186ef9add3aaedb9ffe0cee1", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-4114"]}, {"type": "openvas", "idList": ["OPENVAS:863669", "OPENVAS:863886", "OPENVAS:1361412562310863886", "OPENVAS:1361412562310863914", "OPENVAS:863914", "OPENVAS:1361412562310863668", "OPENVAS:863668", "OPENVAS:1361412562310863669", "OPENVAS:802562", "OPENVAS:1361412562310803343"]}, {"type": "nessus", "idList": ["FEDORA_2011-16856.NASL"]}], "modified": "2019-12-13T07:03:28"}, "score": {"value": 5.3, "vector": "NONE", "modified": "2019-12-13T07:03:28"}, "vulnersScore": 5.3}, "objectVersion": "1.3", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16859.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57368);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/08/02 13:32:34\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n\n script_name(english:\"Fedora 15 : perl-PAR-1.002-4.fc15 / perl-PAR-Packer-1.008-4.fc15 (2011-16859)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0b83d3f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9203463d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-1.002-4.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"perl-PAR-Packer-1.008-4.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "57368", "cpe": ["p-cpe:/a:fedoraproject:fedora:perl-PAR", "p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer", "cpe:/o:fedoraproject:fedora:15"], "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:11:24", "bulletinFamily": "NVD", "description": "The par_mktmpdir function in the PAR::Packer module before 1.012 for Perl creates temporary files in a directory with a predictable name without verifying ownership and permissions of this directory, which allows local users to overwrite files when another user extracts a PAR packed program. NOTE: a similar vulnerability was reported for PAR, but this has been assigned a different CVE identifier.", "modified": "2012-02-08T05:00:00", "id": "CVE-2011-4114", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4114", "published": "2012-01-13T18:55:00", "title": "CVE-2011-4114", "type": "cve", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}}], "openvas": [{"lastseen": "2017-07-25T10:55:28", "bulletinFamily": "scanner", "description": "Check for the Version of perl-PAR-Packer", "modified": "2017-07-10T00:00:00", "published": "2011-12-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=863669", "id": "OPENVAS:863669", "title": "Fedora Update for perl-PAR-Packer FEDORA-2011-16859", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR-Packer FEDORA-2011-16859\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"perl-PAR-Packer on Fedora 15\";\ntag_insight = \"This module implements the App::Packer::Backend interface, for generating\n stand-alone executables, perl scripts and PAR files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\");\n script_id(863669);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-23 10:33:37 +0530 (Fri, 23 Dec 2011)\");\n script_xref(name: \"FEDORA\", value: \"2011-16859\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2011-4114\");\n script_name(\"Fedora Update for perl-PAR-Packer FEDORA-2011-16859\");\n\n script_summary(\"Check for the Version of perl-PAR-Packer\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR-Packer\", rpm:\"perl-PAR-Packer~1.008~4.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:58:16", "bulletinFamily": "scanner", "description": "Check for the Version of perl-PAR-Packer", "modified": "2017-12-29T00:00:00", "published": "2012-04-02T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=863886", "id": "OPENVAS:863886", "title": "Fedora Update for perl-PAR-Packer FEDORA-2011-16856", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR-Packer FEDORA-2011-16856\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"perl-PAR-Packer on Fedora 16\";\ntag_insight = \"This module implements the App::Packer::Backend interface, for generating\n stand-alone executables, perl scripts and PAR files.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071099.html\");\n script_id(863886);\n script_version(\"$Revision: 8257 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-29 07:29:46 +0100 (Fri, 29 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 12:28:13 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4114\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2011-16856\");\n script_name(\"Fedora Update for perl-PAR-Packer FEDORA-2011-16856\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of perl-PAR-Packer\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR-Packer\", rpm:\"perl-PAR-Packer~1.010~3.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:54", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:1361412562310863914", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863914", "title": "Fedora Update for perl-PAR FEDORA-2011-16856", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR FEDORA-2011-16856\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071098.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863914\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 12:36:11 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4114\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2011-16856\");\n script_name(\"Fedora Update for perl-PAR FEDORA-2011-16856\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-PAR'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"perl-PAR on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR\", rpm:\"perl-PAR~1.002~5.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:10", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:1361412562310863886", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863886", "title": "Fedora Update for perl-PAR-Packer FEDORA-2011-16856", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR-Packer FEDORA-2011-16856\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071099.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863886\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 12:28:13 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4114\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2011-16856\");\n script_name(\"Fedora Update for perl-PAR-Packer FEDORA-2011-16856\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-PAR-Packer'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"perl-PAR-Packer on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR-Packer\", rpm:\"perl-PAR-Packer~1.010~3.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2018-01-06T13:07:28", "bulletinFamily": "scanner", "description": "Check for the Version of perl-PAR", "modified": "2018-01-04T00:00:00", "published": "2012-04-02T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=863914", "id": "OPENVAS:863914", "title": "Fedora Update for perl-PAR FEDORA-2011-16856", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR FEDORA-2011-16856\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"perl-PAR on Fedora 16\";\ntag_insight = \"This module lets you use special zip files, called Perl Archives, as\n libraries from which Perl modules can be loaded.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071098.html\");\n script_id(863914);\n script_version(\"$Revision: 8285 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 07:29:16 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 12:36:11 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-4114\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2011-16856\");\n script_name(\"Fedora Update for perl-PAR FEDORA-2011-16856\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of perl-PAR\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR\", rpm:\"perl-PAR~1.002~5.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:40", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-12-23T00:00:00", "id": "OPENVAS:1361412562310863668", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863668", "title": "Fedora Update for perl-PAR FEDORA-2011-16859", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR FEDORA-2011-16859\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863668\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-23 10:33:35 +0530 (Fri, 23 Dec 2011)\");\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2011-4114\");\n script_name(\"Fedora Update for perl-PAR FEDORA-2011-16859\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-PAR'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC15\");\n script_tag(name:\"affected\", value:\"perl-PAR on Fedora 15\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR\", rpm:\"perl-PAR~1.002~4.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:19", "bulletinFamily": "scanner", "description": "Check for the Version of perl-PAR", "modified": "2017-07-10T00:00:00", "published": "2011-12-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=863668", "id": "OPENVAS:863668", "title": "Fedora Update for perl-PAR FEDORA-2011-16859", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR FEDORA-2011-16859\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"perl-PAR on Fedora 15\";\ntag_insight = \"This module lets you use special zip files, called Perl Archives, as\n libraries from which Perl modules can be loaded.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071092.html\");\n script_id(863668);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-23 10:33:35 +0530 (Fri, 23 Dec 2011)\");\n script_xref(name: \"FEDORA\", value: \"2011-16859\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2011-4114\");\n script_name(\"Fedora Update for perl-PAR FEDORA-2011-16859\");\n\n script_summary(\"Check for the Version of perl-PAR\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR\", rpm:\"perl-PAR~1.002~4.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:29", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-12-23T00:00:00", "id": "OPENVAS:1361412562310863669", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863669", "title": "Fedora Update for perl-PAR-Packer FEDORA-2011-16859", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-PAR-Packer FEDORA-2011-16859\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071091.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863669\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-23 10:33:37 +0530 (Fri, 23 Dec 2011)\");\n script_xref(name:\"FEDORA\", value:\"2011-16859\");\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2011-4114\");\n script_name(\"Fedora Update for perl-PAR-Packer FEDORA-2011-16859\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-PAR-Packer'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC15\");\n script_tag(name:\"affected\", value:\"perl-PAR-Packer on Fedora 15\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-PAR-Packer\", rpm:\"perl-PAR-Packer~1.008~4.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2019-05-29T18:37:54", "bulletinFamily": "scanner", "description": "The host is installed with Active Perl and is prone to multiple\n vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2013-03-27T00:00:00", "id": "OPENVAS:1361412562310803343", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803343", "title": "Active Perl Modules Multiple Vulnerabilities (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_activeperl_modules_mult_vuln_win.nasl 11865 2018-10-12 10:03:43Z cfischer $\n#\n# Active Perl Modules Multiple Vulnerabilities (Windows)\n#\n# Authors:\n# Arun Kallavi <karun@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803343\");\n script_version(\"$Revision: 11865 $\");\n script_cve_id(\"CVE-2011-5060\", \"CVE-2011-4114\", \"CVE-2011-3597\", \"CVE-2011-2939\",\n \"CVE-2011-2728\");\n script_bugtraq_id(49911);\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 12:03:43 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-27 11:15:50 +0530 (Wed, 27 Mar 2013)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Active Perl Modules Multiple Vulnerabilities (Windows)\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/46172\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/46279\");\n script_xref(name:\"URL\", value:\"http://search.cpan.org/dist/Digest/Digest.pm\");\n script_xref(name:\"URL\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=731246\");\n script_xref(name:\"URL\", value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\");\n script_xref(name:\"URL\", value:\"https://rt.cpan.org/Public/Bug/Display.html?id=69560\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_perl_detect_win.nasl\");\n script_mandatory_keys(\"ActivePerl/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause an affected\n application to crash or execute arbitrary perl code.\");\n script_tag(name:\"affected\", value:\"Active Perl PAR module before 1.003\n Active Perl Digest module before 1.17\n Active Perl Encode module before 2.44\n Active Perl PAR::Packer module before 1.012 on winows\");\n script_tag(name:\"insight\", value:\"The flaws are due to\n\n - an error in par_mktmpdir function in the 'PAR::Packer' and 'PAR' modules\n creates temporary files in a directory with a predictable name without\n verifying ownership and permissions of this directory.\n\n - the 'Digest->new()' function not properly sanitising input before using it\n in an 'eval()' call, which can be exploited to inject and execute arbitrary\n perl code.\n\n - off-by-one error in the decode_xs function in Unicode/Unicode.xs in the\n 'Encode' module.\n\n - An error within the 'File::Glob::bsd_glob()' function when handling the\n GLOB_ALTDIRFUNC flag can be exploited to cause an access violation and\n potentially execute arbitrary code.\");\n script_tag(name:\"summary\", value:\"The host is installed with Active Perl and is prone to multiple\n vulnerabilities.\");\n script_tag(name:\"solution\", value:\"Upgrade to Perl 5.14.2 or latr,\n Upgrade to Active Perl PAR module version 1.003 or later\n Upgrade to Active Perl Digest module version 1.17 or later\n Upgrade to Active Perl Encode module version 2.44 or later\n Upgrade Active Perl PAR::Packer module version 1.012 or later *****\n NOTE: Ignore this warning if above mentioned versions of modules are already installed.\n *****\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"http://www.perl.org/get.html\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Perl Digest and Perl Encode modules are the default modules in perl\n## Test for the perl versions < 5.14.2, because all perl versions are\n## having Digest and Encode modules < 1.17 and 2.44 respectively\n\napVer = get_kb_item(\"ActivePerl/Ver\");\nif(apVer)\n{\n if(version_is_less(version:apVer, test_version:\"5.14.2\"))\n {\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-02T21:10:44", "bulletinFamily": "scanner", "description": "The host is installed with Strawberry Perl and is prone to\n multiple vulnerabilities.", "modified": "2017-04-13T00:00:00", "published": "2012-01-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=802562", "id": "OPENVAS:802562", "title": "Strawberry Perl Modules Multiple Vulnerabilities (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_perl_modules_mult_vuln_win.nasl 5950 2017-04-13 09:02:06Z teissa $\n#\n# Strawberry Perl Modules Multiple Vulnerabilities (Windows)\n#\n# Authors:\n# Madhuri D <dmadhuri@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_solution = \"Upgrade to Strawberry Perl 5.14.2 or later,\n Upgrade to Strawberry Perl PAR module version 1.003 or later\n Upgrade to Strawberry Perl Digest module version 1.17 or later\n Upgrade to Strawberry Perl Encode module version 2.44 or later\n Upgrade Strawberry Perl PAR::Packer module version 1.012 or later\n For updates refer to http://strawberryperl.com\n\n *****\n NOTE: Ignore this warning if above mentioned versions of modules are already installed.\n *****\";\n\ntag_impact = \"Successful exploitation will allow attackers to cause an affected\n application to crash or execute arbitrary perl code.\n Impact Level: System/Application\";\ntag_affected = \"Strawberry Perl PAR module before 1.003\n Strawberry Perl Digest module before 1.17\n Strawberry Perl Encode module before 2.44\n Strawberry Perl PAR::Packer module before 1.012 on winows\";\ntag_insight = \"The flaws are due to\n - an error in par_mktmpdir function in the 'PAR::Packer' and 'PAR' modules\n creates temporary files in a directory with a predictable name without\n verifying ownership and permissions of this directory.\n - the 'Digest->new()' function not properly sanitising input before using it\n in an 'eval()' call, which can be exploited to inject and execute arbitrary\n perl code.\n - off-by-one error in the decode_xs function in Unicode/Unicode.xs in the\n 'Encode' module.\n - An error within the 'File::Glob::bsd_glob()' function when handling the\n GLOB_ALTDIRFUNC flag can be exploited to cause an access violation and\n potentially execute arbitrary code.\";\ntag_summary = \"The host is installed with Strawberry Perl and is prone to\n multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(802562);\n script_version(\"$Revision: 5950 $\");\n script_cve_id(\"CVE-2011-5060\", \"CVE-2011-4114\", \"CVE-2011-3597\", \"CVE-2011-2939\",\n \"CVE-2011-2728\");\n script_bugtraq_id(49911);\n script_tag(name:\"last_modification\", value:\"$Date: 2017-04-13 11:02:06 +0200 (Thu, 13 Apr 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-01-17 17:28:53 +0530 (Tue, 17 Jan 2012)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Strawberry Perl Modules Multiple Vulnerabilities (Windows)\");\n\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/46172\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/46279\");\n script_xref(name : \"URL\" , value : \"http://search.cpan.org/dist/Digest/Digest.pm\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=731246\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=753955\");\n script_xref(name : \"URL\" , value : \"https://rt.cpan.org/Public/Bug/Display.html?id=69560\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_perl_detect_win.nasl\");\n script_mandatory_keys(\"Strawberry/Perl/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Perl Digest and Perl Encode modules are the default modules in perl\n## Checking for the perl versions < 5.14.2, because all perl versions are\n## having Digest and Encode modules < 1.17 and 2.44 respectively\n\nspVer = get_kb_item(\"Strawberry/Perl/Ver\");\nif(spVer)\n{\n if(version_is_less(version:spVer, test_version:\"5.14.2\")){\n security_message(0);\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-12-13T07:03:28", "bulletinFamily": "scanner", "description": "This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-12-02T00:00:00", "id": "FEDORA_2011-16856.NASL", "href": "https://www.tenable.com/plugins/nessus/57367", "published": "2011-12-22T00:00:00", "title": "Fedora 16 : perl-PAR-1.002-5.fc16 / perl-PAR-Packer-1.010-3.fc16 (2011-16856)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-16856.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57367);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/08/02 13:32:34\");\n\n script_cve_id(\"CVE-2011-4114\");\n script_bugtraq_id(50540);\n script_xref(name:\"FEDORA\", value:\"2011-16856\");\n\n script_name(english:\"Fedora 16 : perl-PAR-1.002-5.fc16 / perl-PAR-Packer-1.010-3.fc16 (2011-16856)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2011-4114 (insecure temporary directory\nhandling). See bug #753955 for tests.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=753955\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071098.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?700f431f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-December/071099.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ee4b1df9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected perl-PAR and / or perl-PAR-Packer packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:perl-PAR-Packer\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"perl-PAR-1.002-5.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"perl-PAR-Packer-1.010-3.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-PAR / perl-PAR-Packer\");\n}\n", "cvss": {"score": 3.3, "vector": "AV:L/AC:M/Au:N/C:N/I:P/A:P"}}]}