HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15
2012-03-06T00:00:00
ID HPUX_PHSS_35843.NASL Type nessus Reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. Modified 2019-11-02T00:00:00
Description
s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 :
A potential vulnerability has been identified with HP OpenView Network
Node Manager (OV NNM). This vulnerability could be exploited remotely
to gain unauthorized access to certain facilities of the NNM server.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and patch checks in this plugin were
# extracted from HP patch PHSS_35843. The text itself is
# copyright (C) Hewlett-Packard Development Company, L.P.
#
include("compat.inc");
if (description)
{
script_id(56068);
script_version("1.6");
script_cvs_date("Date: 2018/08/10 18:07:07");
script_xref(name:"HP", value:"emr_na-c00854999");
script_name(english:"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15");
script_summary(english:"Checks for the patch in the swlist output");
script_set_attribute(
attribute:"synopsis",
value:"The remote HP-UX host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 :
A potential vulnerability has been identified with HP OpenView Network
Node Manager (OV NNM). This vulnerability could be exploited remotely
to gain unauthorized access to certain facilities of the NNM server."
);
# http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?6dbdfebb"
);
script_set_attribute(
attribute:"solution",
value:"Install patch PHSS_35843 or subsequent."
);
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
script_set_attribute(attribute:"patch_publication_date", value:"2007/03/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/03/06");
script_set_attribute(attribute:"vuln_publication_date", value:"2007/03/21");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");
script_family(english:"HP-UX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("hpux.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
if (!hpux_check_ctx(ctx:"11.00 11.11 11.23", proc:"parisc"))
{
exit(0, "The host is not affected since PHSS_35843 applies to a different OS release / architecture.");
}
patches = make_list("PHSS_35843", "PHSS_36385", "PHSS_36901", "PHSS_37273");
foreach patch (patches)
{
if (hpux_installed(app:patch))
{
exit(0, "The host is not affected because patch "+patch+" is installed.");
}
}
flag = 0;
if (hpux_check_patch(app:"OVNNMgr.OVWWW-JPN", version:"B.07.50.00")) flag++;
if (hpux_check_patch(app:"OVNNMgr.OVWWW-KOR", version:"B.07.50.00")) flag++;
if (hpux_check_patch(app:"OVNNMgr.OVWWW-SCH", version:"B.07.50.00")) flag++;
if (hpux_check_patch(app:"OVNNMgrRtDOC.OVNNM-DOC-REUS", version:"B.07.50.00")) flag++;
if (hpux_check_patch(app:"OVPlatform.OVSNMP-MIN", version:"B.07.50.00")) flag++;
if (hpux_check_patch(app:"OVPlatform.OVWIN", version:"B.07.50.00")) flag++;
if (hpux_check_patch(app:"OVPlatformMan.OVWIN-MAN", version:"B.07.50.00")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "HPUX_PHSS_35843.NASL", "bulletinFamily": "scanner", "title": "HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15", "description": "s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.", "published": "2012-03-06T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/56068", "reporter": "This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.", "references": ["http://www.nessus.org/u?6dbdfebb"], "cvelist": [], "type": "nessus", "lastseen": "2019-11-01T02:47:25", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-01-16T20:12:29", "references": []}, "score": {"value": 7.2, "vector": "NONE"}}, "hash": "633b32cc15ccde4b78e4ffca2838f135295f9991c44aca3edcb9bcbbc5c9220c", "hashmap": [{"hash": "9c6fe61712654f56360b12011e3de300", "key": "modified"}, {"hash": "25fc76bf71d3edf3c715130a7af0880e", "key": "description"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "6ab897f434f9dd21f009a1e56cbe8af1", "key": "pluginID"}, {"hash": "3587aca16bb025da5b10aa1e01c3f78b", "key": "sourceData"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "1a65cbc07b1d72f3a7c1524e3f570e41", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "47219046ac6624b3e2ae0f588439bc2a", "key": "title"}, {"hash": "783c3524d4baa77c16370c041e288083", "key": "published"}, {"hash": "512030fdd0378beede78989fec340a10", "key": "references"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=56068", "id": "HPUX_PHSS_35843.NASL", "lastseen": "2019-01-16T20:12:29", "modified": "2018-08-10T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "56068", "published": "2012-03-06T00:00:00", "references": ["http://www.nessus.org/u?6dbdfebb"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_35843. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56068);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_xref(name:\"HP\", value:\"emr_na-c00854999\");\n\n script_name(english:\"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6dbdfebb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_35843 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/03/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00 11.11 11.23\", proc:\"parisc\"))\n{\n exit(0, \"The host is not affected since PHSS_35843 applies to a different OS release / architecture.\");\n}\n\npatches = make_list(\"PHSS_35843\", \"PHSS_36385\", \"PHSS_36901\", \"PHSS_37273\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-JPN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-KOR\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-SCH\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgrRtDOC.OVNNM-DOC-REUS\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVSNMP-MIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVWIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatformMan.OVWIN-MAN\", version:\"B.07.50.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15", "type": "nessus", "viewCount": 0}, "differentElements": ["description"], "edition": 4, "lastseen": "2019-01-16T20:12:29"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). This vulnerability could be exploited remotely to gain unauthorized access to certain facilities of the NNM server.", "edition": 2, "enchantments": {"score": {"value": 7.2, "vector": "NONE"}}, "hash": "22599fbcd31a9c432d6d73e9b979ad13b8a0a2389d6af9db99a24364a78254ab", "hashmap": [{"hash": "91b65a75efaaa6c29c7ded1593d4460f", "key": "modified"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "4540c87824f7c1a59ebc3ed0acd89ea1", "key": "sourceData"}, {"hash": "6ab897f434f9dd21f009a1e56cbe8af1", "key": "pluginID"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "1a65cbc07b1d72f3a7c1524e3f570e41", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "47219046ac6624b3e2ae0f588439bc2a", "key": "title"}, {"hash": "783c3524d4baa77c16370c041e288083", "key": "published"}, {"hash": "512030fdd0378beede78989fec340a10", "key": "references"}, {"hash": "a527ccf94d291d920a9f96a3c128f199", "key": "description"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=56068", "id": "HPUX_PHSS_35843.NASL", "lastseen": "2017-10-29T13:41:11", "modified": "2014-03-12T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "56068", "published": "2012-03-06T00:00:00", "references": ["http://www.nessus.org/u?6dbdfebb"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_35843. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56068);\n script_version(\"$Revision: 1.5 $\");\n script_cvs_date(\"$Date: 2014/03/12 15:42:18 $\");\n\n script_osvdb_id(34639);\n script_xref(name:\"HP\", value:\"emr_na-c00854999\");\n\n script_name(english:\"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6dbdfebb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_35843 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/03/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00 11.11 11.23\", proc:\"parisc\"))\n{\n exit(0, \"The host is not affected since PHSS_35843 applies to a different OS release / architecture.\");\n}\n\npatches = make_list(\"PHSS_35843\", \"PHSS_36385\", \"PHSS_36901\", \"PHSS_37273\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-JPN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-KOR\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-SCH\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgrRtDOC.OVNNM-DOC-REUS\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVSNMP-MIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVWIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatformMan.OVWIN-MAN\", version:\"B.07.50.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15", "type": "nessus", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 2, "lastseen": "2017-10-29T13:41:11"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). This vulnerability could be exploited remotely to gain unauthorized access to certain facilities of the NNM server.", "edition": 1, "enchantments": {}, "hash": "d404628c6591b55da56a356d04131d6c2f93900be35c47ace90e3fdad6abba3d", "hashmap": [{"hash": "91b65a75efaaa6c29c7ded1593d4460f", "key": "modified"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "4540c87824f7c1a59ebc3ed0acd89ea1", "key": "sourceData"}, {"hash": "6ab897f434f9dd21f009a1e56cbe8af1", "key": "pluginID"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "1a65cbc07b1d72f3a7c1524e3f570e41", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "47219046ac6624b3e2ae0f588439bc2a", "key": "title"}, {"hash": "783c3524d4baa77c16370c041e288083", "key": "published"}, {"hash": "512030fdd0378beede78989fec340a10", "key": "references"}, {"hash": "a527ccf94d291d920a9f96a3c128f199", "key": "description"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=56068", "id": "HPUX_PHSS_35843.NASL", "lastseen": "2016-09-26T17:25:28", "modified": "2014-03-12T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.2", "pluginID": "56068", "published": "2012-03-06T00:00:00", "references": ["http://www.nessus.org/u?6dbdfebb"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_35843. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56068);\n script_version(\"$Revision: 1.5 $\");\n script_cvs_date(\"$Date: 2014/03/12 15:42:18 $\");\n\n script_osvdb_id(34639);\n script_xref(name:\"HP\", value:\"emr_na-c00854999\");\n\n script_name(english:\"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6dbdfebb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_35843 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/03/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00 11.11 11.23\", proc:\"parisc\"))\n{\n exit(0, \"The host is not affected since PHSS_35843 applies to a different OS release / architecture.\");\n}\n\npatches = make_list(\"PHSS_35843\", \"PHSS_36385\", \"PHSS_36901\", \"PHSS_37273\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-JPN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-KOR\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-SCH\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgrRtDOC.OVNNM-DOC-REUS\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVSNMP-MIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVWIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatformMan.OVWIN-MAN\", version:\"B.07.50.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15", "type": "nessus", "viewCount": 0}, "differentElements": ["cpe"], "edition": 1, "lastseen": "2016-09-26T17:25:28"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). This vulnerability could be exploited remotely to gain unauthorized access to certain facilities of the NNM server.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-02-21T01:15:20", "references": []}, "score": {"modified": "2019-02-21T01:15:20", "value": 0.6, "vector": "NONE"}}, "hash": "791cd7bfc3da3fd347773e0b4757630369a0fa6806604915e293b2f08df68d1b", "hashmap": [{"hash": "9c6fe61712654f56360b12011e3de300", "key": "modified"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "6ab897f434f9dd21f009a1e56cbe8af1", "key": "pluginID"}, {"hash": "3587aca16bb025da5b10aa1e01c3f78b", "key": "sourceData"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "1a65cbc07b1d72f3a7c1524e3f570e41", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "47219046ac6624b3e2ae0f588439bc2a", "key": "title"}, {"hash": "783c3524d4baa77c16370c041e288083", "key": "published"}, {"hash": "512030fdd0378beede78989fec340a10", "key": "references"}, {"hash": "a527ccf94d291d920a9f96a3c128f199", "key": "description"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=56068", "id": "HPUX_PHSS_35843.NASL", "lastseen": "2019-02-21T01:15:20", "modified": "2018-08-10T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "56068", "published": "2012-03-06T00:00:00", "references": ["http://www.nessus.org/u?6dbdfebb"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_35843. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56068);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_xref(name:\"HP\", value:\"emr_na-c00854999\");\n\n script_name(english:\"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6dbdfebb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_35843 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/03/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00 11.11 11.23\", proc:\"parisc\"))\n{\n exit(0, \"The host is not affected since PHSS_35843 applies to a different OS release / architecture.\");\n}\n\npatches = make_list(\"PHSS_35843\", \"PHSS_36385\", \"PHSS_36901\", \"PHSS_37273\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-JPN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-KOR\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-SCH\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgrRtDOC.OVNNM-DOC-REUS\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVSNMP-MIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVWIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatformMan.OVWIN-MAN\", version:\"B.07.50.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15", "type": "nessus", "viewCount": 0}, "differentElements": ["description", "reporter", "modified", "href"], "edition": 5, "lastseen": "2019-02-21T01:15:20"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["cpe:/o:hp:hp-ux"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-10-28T20:31:15", "references": []}, "score": {"modified": "2019-10-28T20:31:15", "value": 0.6, "vector": "NONE"}}, "hash": "4d89559282098f8772c7c2487d659784dcb173f2f4cc325d94a30d60b393501d", "hashmap": [{"hash": "25fc76bf71d3edf3c715130a7af0880e", "key": "description"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "6ab897f434f9dd21f009a1e56cbe8af1", "key": "pluginID"}, {"hash": "3587aca16bb025da5b10aa1e01c3f78b", "key": "sourceData"}, {"hash": "324ed8dd90f32656500027003742bd7b", "key": "reporter"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "a52f2b60feb267f964febb95d64911f0", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "47219046ac6624b3e2ae0f588439bc2a", "key": "title"}, {"hash": "783c3524d4baa77c16370c041e288083", "key": "published"}, {"hash": "512030fdd0378beede78989fec340a10", "key": "references"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/56068", "id": "HPUX_PHSS_35843.NASL", "lastseen": "2019-10-28T20:31:15", "modified": "2019-10-02T00:00:00", "naslFamily": "HP-UX Local Security Checks", "objectVersion": "1.3", "pluginID": "56068", "published": "2012-03-06T00:00:00", "references": ["http://www.nessus.org/u?6dbdfebb"], "reporter": "This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_35843. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56068);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_xref(name:\"HP\", value:\"emr_na-c00854999\");\n\n script_name(english:\"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6dbdfebb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_35843 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/03/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00 11.11 11.23\", proc:\"parisc\"))\n{\n exit(0, \"The host is not affected since PHSS_35843 applies to a different OS release / architecture.\");\n}\n\npatches = make_list(\"PHSS_35843\", \"PHSS_36385\", \"PHSS_36901\", \"PHSS_37273\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-JPN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-KOR\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-SCH\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgrRtDOC.OVNNM-DOC-REUS\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVSNMP-MIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVWIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatformMan.OVWIN-MAN\", version:\"B.07.50.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "title": "HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15", "type": "nessus", "viewCount": 0}, "differentElements": ["modified"], "edition": 6, "lastseen": "2019-10-28T20:31:15"}], "edition": 7, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "afe57d0304e958202be29619fb28e901"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "25fc76bf71d3edf3c715130a7af0880e"}, {"key": "href", "hash": "a52f2b60feb267f964febb95d64911f0"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "f537a8c4c2a2ecce05af223984a006fc"}, {"key": "pluginID", "hash": "6ab897f434f9dd21f009a1e56cbe8af1"}, {"key": "published", "hash": "783c3524d4baa77c16370c041e288083"}, {"key": "references", "hash": "512030fdd0378beede78989fec340a10"}, {"key": "reporter", "hash": "324ed8dd90f32656500027003742bd7b"}, {"key": "sourceData", "hash": "3587aca16bb025da5b10aa1e01c3f78b"}, {"key": "title", "hash": "47219046ac6624b3e2ae0f588439bc2a"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "c21387929459158b2106bdf4469ddad9c0d8f54666f0bbfc1dd649ab73d75fb3", "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2019-11-01T02:47:25"}, "score": {"value": 0.6, "vector": "NONE", "modified": "2019-11-01T02:47:25"}, "vulnersScore": 0.6}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHSS_35843. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56068);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_xref(name:\"HP\", value:\"emr_na-c00854999\");\n\n script_name(english:\"HP-UX PHSS_35843 : s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.X OV NNM7.51 PA RISC Intermediate Patch 15 : \n\nA potential vulnerability has been identified with HP OpenView Network\nNode Manager (OV NNM). This vulnerability could be exploited remotely\nto gain unauthorized access to certain facilities of the NNM server.\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854999\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6dbdfebb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHSS_35843 or subsequent.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/03/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00 11.11 11.23\", proc:\"parisc\"))\n{\n exit(0, \"The host is not affected since PHSS_35843 applies to a different OS release / architecture.\");\n}\n\npatches = make_list(\"PHSS_35843\", \"PHSS_36385\", \"PHSS_36901\", \"PHSS_37273\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-JPN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-KOR\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgr.OVWWW-SCH\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVNNMgrRtDOC.OVNNM-DOC-REUS\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVSNMP-MIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatform.OVWIN\", version:\"B.07.50.00\")) flag++;\nif (hpux_check_patch(app:\"OVPlatformMan.OVWIN-MAN\", version:\"B.07.50.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "HP-UX Local Security Checks", "pluginID": "56068", "cpe": ["cpe:/o:hp:hp-ux"], "scheme": null}