ID HPUX_PHSS_32206.NASL Type nessus Reporter This script is Copyright (C) 2005-2016 Tenable Network Security, Inc. Modified 2019-11-02T00:00:00
Description
s700_800 11.04 Virtualvault 4.6 IWS update :
Two security vulnerabilities have been reported in Apache HTTP server
(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may
allow a Denial of Service (DoS) attack and execution of arbitrarty
code.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and patch checks in this plugin were
# extracted from HP patch PHSS_32206. The text itself is
# copyright (C) Hewlett-Packard Development Company, L.P.
#
include("compat.inc");
if (description)
{
script_id(17564);
script_version("$Revision: 1.19 $");
script_cvs_date("$Date: 2016/11/18 20:51:40 $");
script_bugtraq_id(10508);
script_xref(name:"HP", value:"HPSBUX01113");
script_name(english:"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update");
script_summary(english:"Checks for the patch in the swlist output");
script_set_attribute(
attribute:"synopsis",
value:"The remote HP-UX host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"s700_800 11.04 Virtualvault 4.6 IWS update :
Two security vulnerabilities have been reported in Apache HTTP server
(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may
allow a Denial of Service (DoS) attack and execution of arbitrarty
code."
);
script_set_attribute(
attribute:"solution",
value:"Install patch PHSS_32206 or subsequent."
);
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
script_set_attribute(attribute:"patch_publication_date", value:"2004/12/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/18");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.");
script_family(english:"HP-UX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("hpux.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
if (!hpux_check_ctx(ctx:"11.04"))
{
exit(0, "The host is not affected since PHSS_32206 applies to a different OS release.");
}
patches = make_list("PHSS_32206", "PHSS_34170", "PHSS_35105", "PHSS_35307", "PHSS_35459", "PHSS_35554");
foreach patch (patches)
{
if (hpux_installed(app:patch))
{
exit(0, "The host is not affected because patch "+patch+" is installed.");
}
}
flag = 0;
if (hpux_check_patch(app:"VaultTS.VV-IWS", version:"A.04.60")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "HPUX_PHSS_32206.NASL", "bulletinFamily": "scanner", "title": "HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update", "description": "s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.", "published": "2005-03-18T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/17564", "reporter": "This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.", "references": [], "cvelist": [], "type": "nessus", "lastseen": "2019-11-01T02:47:25", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-01-16T20:06:00", "references": []}, "score": {"value": 7.5, "vector": "NONE"}}, "hash": "a8883ed00d49026f1e9d91c0a688b158c9faacc8e9ac42e3ec5ca212f402e836", "hashmap": [{"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "137eb4138cd3749938e763f1459bbeec", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "4e8f4eb8bec179b769a55af0099e85ef", "key": "sourceData"}, {"hash": "cd3d7f759c40c74564ee7fb5d1a49af7", "key": "title"}, {"hash": "c2b0309ac1ef32c2a7e3872e1f2b6187", "key": "description"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "2c90988f12d0f55d79edd4070999e39d", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "8e200fc779d0a8e7eaba42e877f0a5c0", "key": "pluginID"}, {"hash": "8a934eca3e00ea10d698e665a4e74aff", "key": "modified"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=17564", "id": "HPUX_PHSS_32206.NASL", "lastseen": "2019-01-16T20:06:00", "modified": "2016-11-18T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "17564", "published": "2005-03-18T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_32206. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17564);\n script_version(\"$Revision: 1.19 $\");\n script_cvs_date(\"$Date: 2016/11/18 20:51:40 $\");\n\n script_bugtraq_id(10508);\n script_xref(name:\"HP\", value:\"HPSBUX01113\");\n\n script_name(english:\"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_32206 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.04\"))\n{\n exit(0, \"The host is not affected since PHSS_32206 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHSS_32206\", \"PHSS_34170\", \"PHSS_35105\", \"PHSS_35307\", \"PHSS_35459\", \"PHSS_35554\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"VaultTS.VV-IWS\", version:\"A.04.60\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update", "type": "nessus", "viewCount": 1}, "differentElements": ["description"], "edition": 4, "lastseen": "2019-01-16T20:06:00"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server (http://httpd.apache.org/) versions prior to Apache 1.3.33 that may allow a Denial of Service (DoS) attack and execution of arbitrarty code.", "edition": 2, "enchantments": {}, "hash": "005f21fb2c0807b11943f7b5a337eabc8c6e0b9f3a46809634835ba8256204b3", "hashmap": [{"hash": "96a6a1ffbce14febf9bf6f4519c69ff8", "key": "description"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "137eb4138cd3749938e763f1459bbeec", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "4e8f4eb8bec179b769a55af0099e85ef", "key": "sourceData"}, {"hash": "cd3d7f759c40c74564ee7fb5d1a49af7", "key": "title"}, {"hash": "2c90988f12d0f55d79edd4070999e39d", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "8e200fc779d0a8e7eaba42e877f0a5c0", "key": "pluginID"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}, {"hash": "8a934eca3e00ea10d698e665a4e74aff", "key": "modified"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=17564", "id": "HPUX_PHSS_32206.NASL", "lastseen": "2016-11-19T05:24:44", "modified": "2016-11-18T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.2", "pluginID": "17564", "published": "2005-03-18T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_32206. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17564);\n script_version(\"$Revision: 1.19 $\");\n script_cvs_date(\"$Date: 2016/11/18 20:51:40 $\");\n\n script_bugtraq_id(10508);\n script_xref(name:\"HP\", value:\"HPSBUX01113\");\n\n script_name(english:\"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_32206 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.04\"))\n{\n exit(0, \"The host is not affected since PHSS_32206 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHSS_32206\", \"PHSS_34170\", \"PHSS_35105\", \"PHSS_35307\", \"PHSS_35459\", \"PHSS_35554\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"VaultTS.VV-IWS\", version:\"A.04.60\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update", "type": "nessus", "viewCount": 1}, "differentElements": ["cpe"], "edition": 2, "lastseen": "2016-11-19T05:24:44"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-10-28T20:31:14", "references": []}, "score": {"modified": "2019-10-28T20:31:14", "value": 0.6, "vector": "NONE"}}, "hash": "d8ea9820c5b609c5daa86959b00b1712c072f87aa19051b5c2f005827977b8cb", "hashmap": [{"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "6c0011e0d2a77892850d0ab6526a7119", "key": "reporter"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "4e8f4eb8bec179b769a55af0099e85ef", "key": "sourceData"}, {"hash": "83a01ceda361bd60ccea4c1ebe56fbc7", "key": "href"}, {"hash": "cd3d7f759c40c74564ee7fb5d1a49af7", "key": "title"}, {"hash": "c2b0309ac1ef32c2a7e3872e1f2b6187", "key": "description"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "2c90988f12d0f55d79edd4070999e39d", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "8e200fc779d0a8e7eaba42e877f0a5c0", "key": "pluginID"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/17564", "id": "HPUX_PHSS_32206.NASL", "lastseen": "2019-10-28T20:31:14", "modified": "2019-10-02T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "17564", "published": "2005-03-18T00:00:00", "references": [], "reporter": "This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_32206. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17564);\n script_version(\"$Revision: 1.19 $\");\n script_cvs_date(\"$Date: 2016/11/18 20:51:40 $\");\n\n script_bugtraq_id(10508);\n script_xref(name:\"HP\", value:\"HPSBUX01113\");\n\n script_name(english:\"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_32206 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.04\"))\n{\n exit(0, \"The host is not affected since PHSS_32206 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHSS_32206\", \"PHSS_34170\", \"PHSS_35105\", \"PHSS_35307\", \"PHSS_35459\", \"PHSS_35554\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"VaultTS.VV-IWS\", version:\"A.04.60\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update", "type": "nessus", "viewCount": 1}, "differentElements": ["modified"], "edition": 6, "lastseen": "2019-10-28T20:31:14"}, {"bulletin": {"bulletinFamily": "exploit", "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server (http://httpd.apache.org/) versions prior to Apache 1.3.33 that may allow a Denial of Service (DoS) attack and execution of arbitrarty code.", "edition": 1, "hash": "3849c6200d2d2168ce127da28498600cd3ac90aa8bcbc08355131c2884b8976c", "hashmap": [{"hash": "96a6a1ffbce14febf9bf6f4519c69ff8", "key": "description"}, {"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "137eb4138cd3749938e763f1459bbeec", "key": "href"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "cd3d7f759c40c74564ee7fb5d1a49af7", "key": "title"}, {"hash": "2c90988f12d0f55d79edd4070999e39d", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "44e2c3315424539c9967df3fdc9ad296", "key": "sourceData"}, {"hash": "11f77624342c1d306e42f33a43f1ce21", "key": "modified"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "8e200fc779d0a8e7eaba42e877f0a5c0", "key": "pluginID"}, {"hash": "d4be9c4fc84262b4f39f89565918568f", "key": "cvss"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=17564", "id": "HPUX_PHSS_32206.NASL", "lastseen": "2016-09-26T17:23:48", "modified": "2015-01-19T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.2", "pluginID": "17564", "published": "2005-03-18T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_32206. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17564);\n script_version(\"$Revision: 1.18 $\");\n script_cvs_date(\"$Date: 2015/01/19 15:01:00 $\");\n\n script_bugtraq_id(10508);\n script_xref(name:\"HP\", value:\"HPSBUX01113\");\n\n script_name(english:\"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_32206 or subsequent.\"\n );\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.04\"))\n{\n exit(0, \"The host is not affected since PHSS_32206 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHSS_32206\", \"PHSS_34170\", \"PHSS_35105\", \"PHSS_35307\", \"PHSS_35459\", \"PHSS_35554\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"VaultTS.VV-IWS\", version:\"A.04.60\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update", "type": "nessus", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 1, "lastseen": "2016-09-26T17:23:48"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server (http://httpd.apache.org/) versions prior to Apache 1.3.33 that may allow a Denial of Service (DoS) attack and execution of arbitrarty code.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-02-21T01:08:28", "references": []}, "score": {"modified": "2019-02-21T01:08:28", "value": 0.6, "vector": "NONE"}}, "hash": "941315c54b8779fc439e3617c5d4e7236451ae8bcd93720f46adad4a512374c8", "hashmap": [{"hash": "96a6a1ffbce14febf9bf6f4519c69ff8", "key": "description"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "137eb4138cd3749938e763f1459bbeec", "key": "href"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "4e8f4eb8bec179b769a55af0099e85ef", "key": "sourceData"}, {"hash": "cd3d7f759c40c74564ee7fb5d1a49af7", "key": "title"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "2c90988f12d0f55d79edd4070999e39d", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "8e200fc779d0a8e7eaba42e877f0a5c0", "key": "pluginID"}, {"hash": "8a934eca3e00ea10d698e665a4e74aff", "key": "modified"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=17564", "id": "HPUX_PHSS_32206.NASL", "lastseen": "2019-02-21T01:08:28", "modified": "2016-11-18T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "17564", "published": "2005-03-18T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_32206. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17564);\n script_version(\"$Revision: 1.19 $\");\n script_cvs_date(\"$Date: 2016/11/18 20:51:40 $\");\n\n script_bugtraq_id(10508);\n script_xref(name:\"HP\", value:\"HPSBUX01113\");\n\n script_name(english:\"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_32206 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.04\"))\n{\n exit(0, \"The host is not affected since PHSS_32206 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHSS_32206\", \"PHSS_34170\", \"PHSS_35105\", \"PHSS_35307\", \"PHSS_35459\", \"PHSS_35554\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"VaultTS.VV-IWS\", version:\"A.04.60\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update", "type": "nessus", "viewCount": 1}, "differentElements": ["description", "reporter", "modified", "href"], "edition": 5, "lastseen": "2019-02-21T01:08:28"}], "edition": 7, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "afe57d0304e958202be29619fb28e901"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "c2b0309ac1ef32c2a7e3872e1f2b6187"}, {"key": "href", "hash": "83a01ceda361bd60ccea4c1ebe56fbc7"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "f537a8c4c2a2ecce05af223984a006fc"}, {"key": "pluginID", "hash": "8e200fc779d0a8e7eaba42e877f0a5c0"}, {"key": "published", "hash": "2c90988f12d0f55d79edd4070999e39d"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "6c0011e0d2a77892850d0ab6526a7119"}, {"key": "sourceData", "hash": "4e8f4eb8bec179b769a55af0099e85ef"}, {"key": "title", "hash": "cd3d7f759c40c74564ee7fb5d1a49af7"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "a709dfd1204560d9ada34e5e620829f2b6df59bdafedf763e28570f936a82206", "viewCount": 1, "enchantments": {"dependencies": {"references": [], "modified": "2019-11-01T02:47:25"}, "score": {"value": 0.6, "vector": "NONE", "modified": "2019-11-01T02:47:25"}, "vulnersScore": 0.6}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_32206. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(17564);\n script_version(\"$Revision: 1.19 $\");\n script_cvs_date(\"$Date: 2016/11/18 20:51:40 $\");\n\n script_bugtraq_id(10508);\n script_xref(name:\"HP\", value:\"HPSBUX01113\");\n\n script_name(english:\"HP-UX PHSS_32206 : s700_800 11.04 Virtualvault 4.6 IWS update\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.04 Virtualvault 4.6 IWS update : \n\nTwo security vulnerabilities have been reported in Apache HTTP server\n(http://httpd.apache.org/) versions prior to Apache 1.3.33 that may\nallow a Denial of Service (DoS) attack and execution of arbitrarty\ncode.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_32206 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2004/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/03/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.04\"))\n{\n exit(0, \"The host is not affected since PHSS_32206 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHSS_32206\", \"PHSS_34170\", \"PHSS_35105\", \"PHSS_35307\", \"PHSS_35459\", \"PHSS_35554\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"VaultTS.VV-IWS\", version:\"A.04.60\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "HP-UX Local Security Checks", "pluginID": "17564", "cpe": ["cpe:/o:hp:hp-ux"], "scheme": null}