Mandriva Linux Security Advisory : wxgtk (MDVSA-2009:204)
2009-08-20T00:00:00
ID MANDRIVA_MDVSA-2009-204.NASL Type nessus Reporter This script is Copyright (C) 2009-2021 Tenable Network Security, Inc. Modified 2009-08-20T00:00:00
Description
A vulnerability has been found and corrected in wxgtk :
Integer overflow in the wxImage::Create function in
src/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a
crafted JPEG file, which triggers a heap-based buffer overflow. NOTE:
the provenance of this information is unknown; the details are
obtained solely from third-party information (CVE-2009-2369).
This update provides a solution to this vulnerability.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandriva Linux Security Advisory MDVSA-2009:204.
# The text itself is copyright (C) Mandriva S.A.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(40636);
script_version("1.15");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2009-2369");
script_bugtraq_id(35552);
script_xref(name:"MDVSA", value:"2009:204");
script_name(english:"Mandriva Linux Security Advisory : wxgtk (MDVSA-2009:204)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandriva Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"A vulnerability has been found and corrected in wxgtk :
Integer overflow in the wxImage::Create function in
src/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a
crafted JPEG file, which triggers a heap-based buffer overflow. NOTE:
the provenance of this information is unknown; the details are
obtained solely from third-party information (CVE-2009-2369).
This update provides a solution to this vulnerability."
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:ND");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(189);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtk2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtk2.6-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtk2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtk2.8-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtkgl2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtkgl2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtkglu2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtkglu2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtku2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtku2.6-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtku2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wxgtku2.8-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtk2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtk2.6-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtk2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtk2.8-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtkgl2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtkgl2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtkglu2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtkglu2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtku2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtku2.6-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtku2.8");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwxgtku2.8-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:wxGTK2.6");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:wxgtk2.8");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.1");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.1");
script_set_attribute(attribute:"patch_publication_date", value:"2009/08/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2009/08/20");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtk2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtk2.6-devel-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtk2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtk2.8-devel-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtkgl2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtkgl2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtkglu2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtkglu2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtku2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtku2.6-devel-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtku2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"x86_64", reference:"lib64wxgtku2.8-devel-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtk2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtk2.6-devel-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtk2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtk2.8-devel-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtkgl2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtkgl2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtkglu2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtkglu2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtku2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtku2.6-devel-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtku2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", cpu:"i386", reference:"libwxgtku2.8-devel-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", reference:"wxGTK2.6-2.6.4-14.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2008.1", reference:"wxgtk2.8-2.8.7-1.1mdv2008.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtk2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtk2.6-devel-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtk2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtk2.8-devel-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtkgl2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtkgl2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtkglu2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtkglu2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtku2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtku2.6-devel-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtku2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wxgtku2.8-devel-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtk2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtk2.6-devel-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtk2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtk2.8-devel-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtkgl2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtkgl2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtkglu2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtkglu2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtku2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtku2.6-devel-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtku2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwxgtku2.8-devel-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"wxGTK2.6-2.6.4-16.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.0", reference:"wxgtk2.8-2.8.8-1.1mdv2009.0", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"x86_64", reference:"lib64wxgtk2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"x86_64", reference:"lib64wxgtk2.8-devel-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"x86_64", reference:"lib64wxgtkgl2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"x86_64", reference:"lib64wxgtkglu2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"x86_64", reference:"lib64wxgtku2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"x86_64", reference:"lib64wxgtku2.8-devel-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"i386", reference:"libwxgtk2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"i386", reference:"libwxgtk2.8-devel-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"i386", reference:"libwxgtkgl2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"i386", reference:"libwxgtkglu2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"i386", reference:"libwxgtku2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", cpu:"i386", reference:"libwxgtku2.8-devel-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (rpm_check(release:"MDK2009.1", reference:"wxgtk2.8-2.8.9-3.1mdv2009.1", yank:"mdv")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "MANDRIVA_MDVSA-2009-204.NASL", "bulletinFamily": "scanner", "title": "Mandriva Linux Security Advisory : wxgtk (MDVSA-2009:204)", "description": "A vulnerability has been found and corrected in wxgtk :\n\nInteger overflow in the wxImage::Create function in\nsrc/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause a\ndenial of service (crash) and possibly execute arbitrary code via a\ncrafted JPEG file, which triggers a heap-based buffer overflow. NOTE:\nthe provenance of this information is unknown; the details are\nobtained solely from third-party information (CVE-2009-2369).\n\nThis update provides a solution to this vulnerability.", "published": "2009-08-20T00:00:00", "modified": "2009-08-20T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/40636", "reporter": "This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.", "references": [], "cvelist": ["CVE-2009-2369"], "type": "nessus", "lastseen": "2021-01-07T11:52:16", "edition": 24, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-2369"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231064411", "OPENVAS:136141256231069025", "OPENVAS:136141256231064922", "OPENVAS:136141256231064676", "OPENVAS:136141256231064464", "OPENVAS:64411", "OPENVAS:69025", "OPENVAS:64408", "OPENVAS:136141256231064408", "OPENVAS:64464"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:22334", "SECURITYVULNS:VULN:10158"]}, {"type": "gentoo", "idList": ["GLSA-201009-01"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1890-1:23404"]}, {"type": "nessus", "idList": ["FEDORA_2009-7763.NASL", "DEBIAN_DSA-1890.NASL", "FEDORA_2009-7794.NASL", "FEDORA_2009-7780.NASL", "GENTOO_GLSA-201009-01.NASL", "FEDORA_2009-7755.NASL"]}, {"type": "fedora", "idList": ["FEDORA:2788710F8B0", "FEDORA:80A4D10F8CA", "FEDORA:3E58810F89B", "FEDORA:A96AC10F934"]}], "modified": "2021-01-07T11:52:16", "rev": 2}, "score": {"value": 8.0, "vector": "NONE", "modified": "2021-01-07T11:52:16", "rev": 2}, "vulnersScore": 8.0}, "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:204. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40636);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-2369\");\n script_bugtraq_id(35552);\n script_xref(name:\"MDVSA\", value:\"2009:204\");\n\n script_name(english:\"Mandriva Linux Security Advisory : wxgtk (MDVSA-2009:204)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been found and corrected in wxgtk :\n\nInteger overflow in the wxImage::Create function in\nsrc/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause a\ndenial of service (crash) and possibly execute arbitrary code via a\ncrafted JPEG file, which triggers a heap-based buffer overflow. NOTE:\nthe provenance of this information is unknown; the details are\nobtained solely from third-party information (CVE-2009-2369).\n\nThis update provides a solution to this vulnerability.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtk2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtk2.6-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtk2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtk2.8-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtkgl2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtkgl2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtkglu2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtkglu2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtku2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtku2.6-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtku2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64wxgtku2.8-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtk2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtk2.6-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtk2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtk2.8-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtkgl2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtkgl2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtkglu2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtkglu2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtku2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtku2.6-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtku2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libwxgtku2.8-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:wxGTK2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:wxgtk2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/08/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtk2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtk2.6-devel-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtk2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtk2.8-devel-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtkgl2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtkgl2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtkglu2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtkglu2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtku2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtku2.6-devel-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtku2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64wxgtku2.8-devel-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtk2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtk2.6-devel-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtk2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtk2.8-devel-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtkgl2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtkgl2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtkglu2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtkglu2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtku2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtku2.6-devel-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtku2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libwxgtku2.8-devel-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"wxGTK2.6-2.6.4-14.1mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"wxgtk2.8-2.8.7-1.1mdv2008.1\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtk2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtk2.6-devel-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtk2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtk2.8-devel-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtkgl2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtkgl2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtkglu2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtkglu2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtku2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtku2.6-devel-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtku2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64wxgtku2.8-devel-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtk2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtk2.6-devel-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtk2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtk2.8-devel-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtkgl2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtkgl2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtkglu2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtkglu2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtku2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtku2.6-devel-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtku2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libwxgtku2.8-devel-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"wxGTK2.6-2.6.4-16.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"wxgtk2.8-2.8.8-1.1mdv2009.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64wxgtk2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64wxgtk2.8-devel-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64wxgtkgl2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64wxgtkglu2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64wxgtku2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"x86_64\", reference:\"lib64wxgtku2.8-devel-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libwxgtk2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libwxgtk2.8-devel-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libwxgtkgl2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libwxgtkglu2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libwxgtku2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", cpu:\"i386\", reference:\"libwxgtku2.8-devel-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.1\", reference:\"wxgtk2.8-2.8.9-3.1mdv2009.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Mandriva Local Security Checks", "pluginID": "40636", "cpe": ["p-cpe:/a:mandriva:linux:wxgtk2.8", "p-cpe:/a:mandriva:linux:lib64wxgtkglu2.8", "p-cpe:/a:mandriva:linux:lib64wxgtk2.8", "p-cpe:/a:mandriva:linux:lib64wxgtku2.8-devel", "p-cpe:/a:mandriva:linux:libwxgtku2.6", "p-cpe:/a:mandriva:linux:lib64wxgtk2.8-devel", "cpe:/o:mandriva:linux:2009.0", "p-cpe:/a:mandriva:linux:wxGTK2.6", "p-cpe:/a:mandriva:linux:lib64wxgtku2.6", "p-cpe:/a:mandriva:linux:lib64wxgtkgl2.8", "p-cpe:/a:mandriva:linux:libwxgtku2.8-devel", "cpe:/o:mandriva:linux:2008.1", "p-cpe:/a:mandriva:linux:lib64wxgtk2.6", "p-cpe:/a:mandriva:linux:libwxgtku2.8", "p-cpe:/a:mandriva:linux:libwxgtkglu2.8", "p-cpe:/a:mandriva:linux:lib64wxgtku2.8", "p-cpe:/a:mandriva:linux:lib64wxgtkglu2.6", "cpe:/o:mandriva:linux:2009.1", "p-cpe:/a:mandriva:linux:lib64wxgtk2.6-devel", "p-cpe:/a:mandriva:linux:libwxgtkglu2.6", "p-cpe:/a:mandriva:linux:libwxgtk2.8", "p-cpe:/a:mandriva:linux:libwxgtkgl2.6", "p-cpe:/a:mandriva:linux:libwxgtk2.8-devel", "p-cpe:/a:mandriva:linux:lib64wxgtku2.6-devel", "p-cpe:/a:mandriva:linux:lib64wxgtkgl2.6", "p-cpe:/a:mandriva:linux:libwxgtkgl2.8", "p-cpe:/a:mandriva:linux:libwxgtku2.6-devel", "p-cpe:/a:mandriva:linux:libwxgtk2.6-devel", "p-cpe:/a:mandriva:linux:libwxgtk2.6"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:54:15", "description": "Integer overflow in the wxImage::Create function in src/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JPEG file, which triggers a heap-based buffer overflow. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.", "edition": 3, "cvss3": {}, "published": "2009-07-08T15:30:00", "title": "CVE-2009-2369", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-2369"], "modified": "2017-08-17T01:30:00", "cpe": ["cpe:/a:wxwidgets:wxwidgets:2.8.10"], "id": "CVE-2009-2369", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2369", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:wxwidgets:wxwidgets:2.8.10:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-25T10:56:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to compat-wxGTK26\nannounced via advisory FEDORA-2009-7755.", "modified": "2017-07-10T00:00:00", "published": "2009-07-29T00:00:00", "id": "OPENVAS:64408", "href": "http://plugins.openvas.org/nasl.php?oid=64408", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-7755 (compat-wxGTK26)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_7755.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-7755 (compat-wxGTK26)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nAdded rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\nChangeLog:\n\n* Wed Jul 15 2009 Michael Schwendt - 2.6.4-10\n- apply rediffed fix for CVE-2009-2369 (#511279)\n* Thu Jun 11 2009 Michael Schwendt - 2.6.4-9\n- glib2 2.21.1's gio in Rawhide F-12 introduces a GSocket that\nconflicts with wxGTK's GSocket class (gsocket.h): reduce the glib/gdk\nheaders that are included during build to avoid conflicting redefinitions\n* Sun Jun 7 2009 Michael Schwendt - 2.6.4-8\n- target sparcv9 => setup-sparc.h\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update compat-wxGTK26' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7755\";\ntag_summary = \"The remote host is missing an update to compat-wxGTK26\nannounced via advisory FEDORA-2009-7755.\";\n\n\n\nif(description)\n{\n script_id(64408);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Core 11 FEDORA-2009-7755 (compat-wxGTK26)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=511279\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26\", rpm:\"compat-wxGTK26~2.6.4~10.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26-devel\", rpm:\"compat-wxGTK26-devel~2.6.4~10.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26-debuginfo\", rpm:\"compat-wxGTK26-debuginfo~2.6.4~10.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:57:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to wxwindows2.4 wxwidgets2.6 wxwidgets2.8\nannounced via advisory DSA 1890-1.", "modified": "2017-07-07T00:00:00", "published": "2009-09-21T00:00:00", "id": "OPENVAS:64922", "href": "http://plugins.openvas.org/nasl.php?oid=64922", "type": "openvas", "title": "Debian Security Advisory DSA 1890-1 (wxwindows2.4 wxwidgets2.6 wxwidgets2.8)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1890_1.nasl 6615 2017-07-07 12:09:52Z cfischer $\n# Description: Auto-generated from advisory DSA 1890-1 (wxwindows2.4 wxwidgets2.6 wxwidgets2.8)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Tielei Wang has discovered an integer overflow in wxWidgets, the wxWidgets\nCross-platform C++ GUI toolkit, which allows the execution of arbitrary\ncode via a crafted JPEG file.\n\nFor the oldstable distribution (etch), this problem has been fixed in version\n2.4.5.1.1+etch1 for wxwindows2.4 and version 2.6.3.2.1.5+etch1 for\nwxwidgets2.6.\n\nFor the stable distribution (lenny), this problem has been fixed in version\n2.6.3.2.2-3+lenny1 for wxwidgets2.6 and version 2.8.7.1-1.1+lenny1 for\nwxwidgets2.8.\n\nFor the testing distribution (squeeze), this problem will be fixed soon.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.8.7.1-2 for wxwidgets2.8 and will be fixed soon for\nwxwidgets2.6.\n\n\nWe recommend that you upgrade your wxwidgets packages.\";\ntag_summary = \"The remote host is missing an update to wxwindows2.4 wxwidgets2.6 wxwidgets2.8\nannounced via advisory DSA 1890-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201890-1\";\n\n\nif(description)\n{\n script_id(64922);\n script_version(\"$Revision: 6615 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:09:52 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-21 23:13:00 +0200 (Mon, 21 Sep 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1890-1 (wxwindows2.4 wxwidgets2.6 wxwidgets2.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"wx2.6-i18n\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxtools\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-examples\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-doc\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-i18n\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxversion\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-doc\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-examples\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.4\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.4-dev\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-headers\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dbg\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx-common\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dev\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-dev\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.4-dbg\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-dbg\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-1\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.6\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-0\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.4-1\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-contrib-dev\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-0\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-1-contrib\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dev\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-headers\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dbg\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-examples\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-i18n\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxtools\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-doc\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxversion\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-doc\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-i18n\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-examples\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.8-dbg\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx-common\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-headers\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.8-0\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.8\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.8-dev\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dev\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-headers\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dbg\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.8-dev\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.8-0\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.6\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-0\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.8-dbg\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dev\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.6-dbg\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.8-dbg\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dbg\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-0\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to wxgtk\nannounced via advisory MDVSA-2009:204.", "modified": "2017-07-06T00:00:00", "published": "2009-09-02T00:00:00", "id": "OPENVAS:64676", "href": "http://plugins.openvas.org/nasl.php?oid=64676", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:204 (wxgtk)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_204.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:204 (wxgtk)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been found and corrected in wxgtk:\n\nInteger overflow in the wxImage::Create function in\nsrc/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause\na denial of service (crash) and possibly execute arbitrary code via\na crafted JPEG file, which triggers a heap-based buffer overflow.\nNOTE: the provenance of this information is unknown; the details are\nobtained solely from third party information (CVE-2009-2369).\n\nThis update provides a solution to this vulnerability.\n\nAffected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:204\";\ntag_summary = \"The remote host is missing an update to wxgtk\nannounced via advisory MDVSA-2009:204.\";\n\n \n\nif(description)\n{\n script_id(64676);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:204 (wxgtk)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6\", rpm:\"libwxgtk2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6-devel\", rpm:\"libwxgtk2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.6\", rpm:\"libwxgtkgl2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.6\", rpm:\"libwxgtkglu2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6\", rpm:\"libwxgtku2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6-devel\", rpm:\"libwxgtku2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK2.6\", rpm:\"wxGTK2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6\", rpm:\"lib64wxgtk2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6-devel\", rpm:\"lib64wxgtk2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.6\", rpm:\"lib64wxgtkgl2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.6\", rpm:\"lib64wxgtkglu2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6\", rpm:\"lib64wxgtku2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6-devel\", rpm:\"lib64wxgtku2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6\", rpm:\"libwxgtk2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6-devel\", rpm:\"libwxgtk2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.6\", rpm:\"libwxgtkgl2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.6\", rpm:\"libwxgtkglu2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6\", rpm:\"libwxgtku2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6-devel\", rpm:\"libwxgtku2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK2.6\", rpm:\"wxGTK2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6\", rpm:\"lib64wxgtk2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6-devel\", rpm:\"lib64wxgtk2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.6\", rpm:\"lib64wxgtkgl2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.6\", rpm:\"lib64wxgtkglu2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6\", rpm:\"lib64wxgtku2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6-devel\", rpm:\"lib64wxgtku2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6\", rpm:\"libwxgtk2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6-devel\", rpm:\"libwxgtk2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.6\", rpm:\"libwxgtkgl2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.6\", rpm:\"libwxgtkglu2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6\", rpm:\"libwxgtku2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6-devel\", rpm:\"libwxgtku2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK2.6\", rpm:\"wxGTK2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6\", rpm:\"lib64wxgtk2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6-devel\", rpm:\"lib64wxgtk2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.6\", rpm:\"lib64wxgtkgl2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.6\", rpm:\"lib64wxgtkglu2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6\", rpm:\"lib64wxgtku2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6-devel\", rpm:\"lib64wxgtku2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:37:28", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to wxGTK\nannounced via advisory FEDORA-2009-7780.", "modified": "2018-04-06T00:00:00", "published": "2009-07-29T00:00:00", "id": "OPENVAS:136141256231064464", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064464", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-7780 (wxGTK)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_7780.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-7780 (wxGTK)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nadded fix for CVE-2009-2369\n\nChangeLog:\n\n* Wed Jul 15 2009 Dan Hor\u00e1k - 2.8.10-2\n- add fix for CVE-2009-2369 (#511279)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update wxGTK' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7780\";\ntag_summary = \"The remote host is missing an update to wxGTK\nannounced via advisory FEDORA-2009-7780.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64464\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Core 11 FEDORA-2009-7780 (wxGTK)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=511279\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"wxBase\", rpm:\"wxBase~2.8.10~2.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK\", rpm:\"wxGTK~2.8.10~2.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK-devel\", rpm:\"wxGTK-devel~2.8.10~2.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK-gl\", rpm:\"wxGTK-gl~2.8.10~2.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK-media\", rpm:\"wxGTK-media~2.8.10~2.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK-debuginfo\", rpm:\"wxGTK-debuginfo~2.8.10~2.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:39:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to compat-wxGTK26\nannounced via advisory FEDORA-2009-7763.", "modified": "2018-04-06T00:00:00", "published": "2009-07-29T00:00:00", "id": "OPENVAS:136141256231064411", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064411", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-7763 (compat-wxGTK26)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_7763.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-7763 (compat-wxGTK26)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nAdded rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\n\nChangeLog:\n\n* Wed Jul 15 2009 Michael Schwendt - 2.6.4-10\n- apply rediffed fix for CVE-2009-2369 (#511279)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update compat-wxGTK26' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7763\";\ntag_summary = \"The remote host is missing an update to compat-wxGTK26\nannounced via advisory FEDORA-2009-7763.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64411\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Core 10 FEDORA-2009-7763 (compat-wxGTK26)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=511279\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26\", rpm:\"compat-wxGTK26~2.6.4~10.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26-devel\", rpm:\"compat-wxGTK26-devel~2.6.4~10.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26-debuginfo\", rpm:\"compat-wxGTK26-debuginfo~2.6.4~10.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing updates announced in\nadvisory GLSA 201009-01.", "modified": "2019-03-14T00:00:00", "published": "2011-03-09T00:00:00", "id": "OPENVAS:136141256231069025", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231069025", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201009-01 (wxGTK)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201009_01.nasl 14171 2019-03-14 10:22:03Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.69025\");\n script_version(\"$Revision: 14171 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-14 11:22:03 +0100 (Thu, 14 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-2369\");\n script_name(\"Gentoo Security Advisory GLSA 201009-01 (wxGTK)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"An integer overflow vulnerability in wxGTK might enable remote attackers to\n cause the execution of arbitrary code.\");\n script_tag(name:\"solution\", value:\"All wxGTK 2.6 users should upgrade to an updated version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.6.4.0-r5'\n\nAll wxGTK 2.8 users should upgrade to an updated version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.8.10.1-r1'\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201009-01\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=277722\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201009-01.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"x11-libs/wxGTK\", unaffected: make_list(\"rge 2.6.4.0-r5\", \"ge 2.8.10.1-r1\"), vulnerable: make_list(\"lt 2.8.10.1-r1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:56:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to compat-wxGTK26\nannounced via advisory FEDORA-2009-7763.", "modified": "2017-07-10T00:00:00", "published": "2009-07-29T00:00:00", "id": "OPENVAS:64411", "href": "http://plugins.openvas.org/nasl.php?oid=64411", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-7763 (compat-wxGTK26)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_7763.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-7763 (compat-wxGTK26)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Update Information:\n\nAdded rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\n\nChangeLog:\n\n* Wed Jul 15 2009 Michael Schwendt - 2.6.4-10\n- apply rediffed fix for CVE-2009-2369 (#511279)\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update compat-wxGTK26' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7763\";\ntag_summary = \"The remote host is missing an update to compat-wxGTK26\nannounced via advisory FEDORA-2009-7763.\";\n\n\n\nif(description)\n{\n script_id(64411);\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-07-29 19:28:37 +0200 (Wed, 29 Jul 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Core 10 FEDORA-2009-7763 (compat-wxGTK26)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"https://bugzilla.redhat.com/show_bug.cgi?id=511279\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26\", rpm:\"compat-wxGTK26~2.6.4~10.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26-devel\", rpm:\"compat-wxGTK26-devel~2.6.4~10.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"compat-wxGTK26-debuginfo\", rpm:\"compat-wxGTK26-debuginfo~2.6.4~10.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-09-05T11:22:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing updates announced in\nadvisory GLSA 201009-01.", "modified": "2017-09-04T00:00:00", "published": "2011-03-09T00:00:00", "id": "OPENVAS:69025", "href": "http://plugins.openvas.org/nasl.php?oid=69025", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201009-01 (wxGTK)", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An integer overflow vulnerability in wxGTK might enable remote attackers to\n cause the execution of arbitrary code.\";\ntag_solution = \"All wxGTK 2.6 users should upgrade to an updated version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.6.4.0-r5'\n\nAll wxGTK 2.8 users should upgrade to an updated version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.8.10.1-r1'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201009-01\nhttp://bugs.gentoo.org/show_bug.cgi?id=277722\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201009-01.\";\n\n \n \n\nif(description)\n{\n script_id(69025);\n script_version(\"$Revision: 7052 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-09-04 13:50:51 +0200 (Mon, 04 Sep 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-03-09 05:54:11 +0100 (Wed, 09 Mar 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-2369\");\n script_name(\"Gentoo Security Advisory GLSA 201009-01 (wxGTK)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"x11-libs/wxGTK\", unaffected: make_list(\"rge 2.6.4.0-r5\", \"ge 2.8.10.1-r1\"), vulnerable: make_list(\"lt 2.8.10.1-r1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:39:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to wxgtk\nannounced via advisory MDVSA-2009:204.", "modified": "2018-04-06T00:00:00", "published": "2009-09-02T00:00:00", "id": "OPENVAS:136141256231064676", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064676", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:204 (wxgtk)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_204.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:204 (wxgtk)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been found and corrected in wxgtk:\n\nInteger overflow in the wxImage::Create function in\nsrc/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause\na denial of service (crash) and possibly execute arbitrary code via\na crafted JPEG file, which triggers a heap-based buffer overflow.\nNOTE: the provenance of this information is unknown; the details are\nobtained solely from third party information (CVE-2009-2369).\n\nThis update provides a solution to this vulnerability.\n\nAffected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:204\";\ntag_summary = \"The remote host is missing an update to wxgtk\nannounced via advisory MDVSA-2009:204.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64676\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-02 04:58:39 +0200 (Wed, 02 Sep 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:204 (wxgtk)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6\", rpm:\"libwxgtk2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6-devel\", rpm:\"libwxgtk2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.6\", rpm:\"libwxgtkgl2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.6\", rpm:\"libwxgtkglu2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6\", rpm:\"libwxgtku2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6-devel\", rpm:\"libwxgtku2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK2.6\", rpm:\"wxGTK2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6\", rpm:\"lib64wxgtk2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6-devel\", rpm:\"lib64wxgtk2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.6\", rpm:\"lib64wxgtkgl2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.6\", rpm:\"lib64wxgtkglu2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6\", rpm:\"lib64wxgtku2.6~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6-devel\", rpm:\"lib64wxgtku2.6-devel~2.6.4~14.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.7~1.1mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6\", rpm:\"libwxgtk2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6-devel\", rpm:\"libwxgtk2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.6\", rpm:\"libwxgtkgl2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.6\", rpm:\"libwxgtkglu2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6\", rpm:\"libwxgtku2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6-devel\", rpm:\"libwxgtku2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK2.6\", rpm:\"wxGTK2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6\", rpm:\"lib64wxgtk2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6-devel\", rpm:\"lib64wxgtk2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.6\", rpm:\"lib64wxgtkgl2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.6\", rpm:\"lib64wxgtkglu2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6\", rpm:\"lib64wxgtku2.6~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6-devel\", rpm:\"lib64wxgtku2.6-devel~2.6.4~16.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.8~1.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.9~3.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6\", rpm:\"libwxgtk2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.6-devel\", rpm:\"libwxgtk2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.6\", rpm:\"libwxgtkgl2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.6\", rpm:\"libwxgtkglu2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6\", rpm:\"libwxgtku2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.6-devel\", rpm:\"libwxgtku2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxGTK2.6\", rpm:\"wxGTK2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6\", rpm:\"lib64wxgtk2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.6-devel\", rpm:\"lib64wxgtk2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.6\", rpm:\"lib64wxgtkgl2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.6\", rpm:\"lib64wxgtkglu2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6\", rpm:\"lib64wxgtku2.6~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.6-devel\", rpm:\"lib64wxgtku2.6-devel~2.6.1~1.1.20060mlcs4\", rls:\"MNDK_4.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8\", rpm:\"libwxgtk2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtk2.8-devel\", rpm:\"libwxgtk2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkgl2.8\", rpm:\"libwxgtkgl2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtkglu2.8\", rpm:\"libwxgtkglu2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8\", rpm:\"libwxgtku2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libwxgtku2.8-devel\", rpm:\"libwxgtku2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"wxgtk2.8\", rpm:\"wxgtk2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8\", rpm:\"lib64wxgtk2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtk2.8-devel\", rpm:\"lib64wxgtk2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkgl2.8\", rpm:\"lib64wxgtkgl2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtkglu2.8\", rpm:\"lib64wxgtkglu2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8\", rpm:\"lib64wxgtku2.8~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64wxgtku2.8-devel\", rpm:\"lib64wxgtku2.8-devel~2.8.8~1.1mdvmes5\", rls:\"MNDK_mes5\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:40:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "description": "The remote host is missing an update to wxwindows2.4 wxwidgets2.6 wxwidgets2.8\nannounced via advisory DSA 1890-1.", "modified": "2018-04-06T00:00:00", "published": "2009-09-21T00:00:00", "id": "OPENVAS:136141256231064922", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064922", "type": "openvas", "title": "Debian Security Advisory DSA 1890-1 (wxwindows2.4 wxwidgets2.6 wxwidgets2.8)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1890_1.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory DSA 1890-1 (wxwindows2.4 wxwidgets2.6 wxwidgets2.8)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Tielei Wang has discovered an integer overflow in wxWidgets, the wxWidgets\nCross-platform C++ GUI toolkit, which allows the execution of arbitrary\ncode via a crafted JPEG file.\n\nFor the oldstable distribution (etch), this problem has been fixed in version\n2.4.5.1.1+etch1 for wxwindows2.4 and version 2.6.3.2.1.5+etch1 for\nwxwidgets2.6.\n\nFor the stable distribution (lenny), this problem has been fixed in version\n2.6.3.2.2-3+lenny1 for wxwidgets2.6 and version 2.8.7.1-1.1+lenny1 for\nwxwidgets2.8.\n\nFor the testing distribution (squeeze), this problem will be fixed soon.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.8.7.1-2 for wxwidgets2.8 and will be fixed soon for\nwxwidgets2.6.\n\n\nWe recommend that you upgrade your wxwidgets packages.\";\ntag_summary = \"The remote host is missing an update to wxwindows2.4 wxwidgets2.6 wxwidgets2.8\nannounced via advisory DSA 1890-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201890-1\";\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64922\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-21 23:13:00 +0200 (Mon, 21 Sep 2009)\");\n script_cve_id(\"CVE-2009-2369\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1890-1 (wxwindows2.4 wxwidgets2.6 wxwidgets2.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"wx2.6-i18n\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxtools\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-examples\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-doc\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-i18n\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxversion\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-doc\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-examples\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.4\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.4-dev\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.4-headers\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dbg\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx-common\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dev\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-dev\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.4-dbg\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-dbg\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-1\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.6\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-0\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.4-1\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-contrib-dev\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-0\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.4-1-contrib\", ver:\"2.4.5.1.1+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dev\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-headers\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dbg\", ver:\"2.6.3.2.1.5+etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-examples\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-i18n\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxtools\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-doc\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxversion\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-doc\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-i18n\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-examples\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.8-dbg\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx-common\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.6-headers\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.8-0\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.8\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.8-dev\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dev\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wx2.8-headers\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-dbg\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.8-dev\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.8-0\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.6\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.6-0\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxgtk2.8-dbg\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dev\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-wxgtk2.6-dbg\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.8-dbg\", ver:\"2.8.7.1-1.1+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-dbg\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libwxbase2.6-0\", ver:\"2.6.3.2.2-3+lenny1\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:31", "bulletinFamily": "software", "cvelist": ["CVE-2009-2369"], "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2009:204\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : wxgtk\r\n Date : August 16, 2009\r\n Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A vulnerability has been found and corrected in wxgtk:\r\n \r\n Integer overflow in the wxImage::Create function in\r\n src/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause\r\n a denial of service (crash) and possibly execute arbitrary code via\r\n a crafted JPEG file, which triggers a heap-based buffer overflow.\r\n NOTE: the provenance of this information is unknown; the details are\r\n obtained solely from third party information (CVE-2009-2369).\r\n \r\n This update provides a solution to this vulnerability.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2369\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2008.1:\r\n 9dc6e8e719baf1d987f97bbde60712de 2008.1/i586/libwxgtk2.6-2.6.4-14.1mdv2008.1.i586.rpm\r\n f23c5030971ed93b3c74b879ebbb3b8b 2008.1/i586/libwxgtk2.6-devel-2.6.4-14.1mdv2008.1.i586.rpm\r\n 7cf2e7531b37fc6bc28a791a095d487f 2008.1/i586/libwxgtk2.8-2.8.7-1.1mdv2008.1.i586.rpm\r\n 08620a61436b7199be2be7a9399a34bd 2008.1/i586/libwxgtk2.8-devel-2.8.7-1.1mdv2008.1.i586.rpm\r\n 891255432a74d7d58aeb026a1d3b4109 2008.1/i586/libwxgtkgl2.6-2.6.4-14.1mdv2008.1.i586.rpm\r\n a396ce4233ad2bae3d4a134abe732645 2008.1/i586/libwxgtkgl2.8-2.8.7-1.1mdv2008.1.i586.rpm\r\n 5d2773bb963bf098176a4a8dc60d365d 2008.1/i586/libwxgtkglu2.6-2.6.4-14.1mdv2008.1.i586.rpm\r\n 48bbf610793fa67426aca1299a9a164b 2008.1/i586/libwxgtkglu2.8-2.8.7-1.1mdv2008.1.i586.rpm\r\n c4714e02fa1513936752b8aa7f19a808 2008.1/i586/libwxgtku2.6-2.6.4-14.1mdv2008.1.i586.rpm\r\n ff783e25a50136dc6d3eeb68408ea30b 2008.1/i586/libwxgtku2.6-devel-2.6.4-14.1mdv2008.1.i586.rpm\r\n e99b37d7d2e75aa6f258e4c6b27a9722 2008.1/i586/libwxgtku2.8-2.8.7-1.1mdv2008.1.i586.rpm\r\n c5ed76e85ce79e03d353abccbbffbe30 2008.1/i586/libwxgtku2.8-devel-2.8.7-1.1mdv2008.1.i586.rpm\r\n 7d076f5552f8b24410d5e59d138f63bd 2008.1/i586/wxGTK2.6-2.6.4-14.1mdv2008.1.i586.rpm\r\n 08d35eef3c6dd8abaa2956f8a87ebae2 2008.1/i586/wxgtk2.8-2.8.7-1.1mdv2008.1.i586.rpm \r\n 465ff3df30f3bc8dd91e9b906b38158c 2008.1/SRPMS/wxGTK2.6-2.6.4-14.1mdv2008.1.src.rpm\r\n 9c40827bf45e99abcd306b69ee98b9ff 2008.1/SRPMS/wxgtk2.8-2.8.7-1.1mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2008.1/X86_64:\r\n 69e18858e88cdc6f7422d05164285cf0 2008.1/x86_64/lib64wxgtk2.6-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n ad79430e27c6bcc118dac5ef82b4ed77 2008.1/x86_64/lib64wxgtk2.6-devel-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n 26281d0605bab2d2a29693a5192129f9 2008.1/x86_64/lib64wxgtk2.8-2.8.7-1.1mdv2008.1.x86_64.rpm\r\n 2402b86fc51ad984a0e8e8d9467003dd 2008.1/x86_64/lib64wxgtk2.8-devel-2.8.7-1.1mdv2008.1.x86_64.rpm\r\n 2b43e583b20a4de1b41e62f9523e2d26 2008.1/x86_64/lib64wxgtkgl2.6-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n 1f76056cc2107e72f67402879513279f 2008.1/x86_64/lib64wxgtkgl2.8-2.8.7-1.1mdv2008.1.x86_64.rpm\r\n 5025b73502e69b720f8ccb0dce5fcd90 2008.1/x86_64/lib64wxgtkglu2.6-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n 8defd7f0ea46c1c503a040c0c1448f2b 2008.1/x86_64/lib64wxgtkglu2.8-2.8.7-1.1mdv2008.1.x86_64.rpm\r\n 5c3fecbd0883787eb696bc61553175fc 2008.1/x86_64/lib64wxgtku2.6-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n fe57d33c500a5f7996fa8bccf1dbc12b 2008.1/x86_64/lib64wxgtku2.6-devel-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n dd9063c83d389c68809bdd6a7647bf32 2008.1/x86_64/lib64wxgtku2.8-2.8.7-1.1mdv2008.1.x86_64.rpm\r\n 88fa100cb6e5974ca54de295f6bea515 2008.1/x86_64/lib64wxgtku2.8-devel-2.8.7-1.1mdv2008.1.x86_64.rpm\r\n 0f38542b20b1d098d98ba01ac16d6f1e 2008.1/x86_64/wxGTK2.6-2.6.4-14.1mdv2008.1.x86_64.rpm\r\n 6283212ea1ad0f35d2319e22c64b9019 2008.1/x86_64/wxgtk2.8-2.8.7-1.1mdv2008.1.x86_64.rpm \r\n 465ff3df30f3bc8dd91e9b906b38158c 2008.1/SRPMS/wxGTK2.6-2.6.4-14.1mdv2008.1.src.rpm\r\n 9c40827bf45e99abcd306b69ee98b9ff 2008.1/SRPMS/wxgtk2.8-2.8.7-1.1mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2009.0:\r\n fd90e9d6aad6676c8584a88f0d2bc814 2009.0/i586/libwxgtk2.6-2.6.4-16.1mdv2009.0.i586.rpm\r\n f7092574561340ac0feee731e68370a3 2009.0/i586/libwxgtk2.6-devel-2.6.4-16.1mdv2009.0.i586.rpm\r\n 2653b9edb82077d99ca6adb545aa33f8 2009.0/i586/libwxgtk2.8-2.8.8-1.1mdv2009.0.i586.rpm\r\n 9115da0da60f9d56cd7dd4114a185a10 2009.0/i586/libwxgtk2.8-devel-2.8.8-1.1mdv2009.0.i586.rpm\r\n 356d92dfa46d5a07cb78a9bc472de066 2009.0/i586/libwxgtkgl2.6-2.6.4-16.1mdv2009.0.i586.rpm\r\n fc14ae9b9eb4cfe94b1c5affafd81585 2009.0/i586/libwxgtkgl2.8-2.8.8-1.1mdv2009.0.i586.rpm\r\n c539553f6e8d15fa555b5e1c70fc317d 2009.0/i586/libwxgtkglu2.6-2.6.4-16.1mdv2009.0.i586.rpm\r\n 28cc63d000b8afd5332a7ce02e755656 2009.0/i586/libwxgtkglu2.8-2.8.8-1.1mdv2009.0.i586.rpm\r\n 9d6eaf37c2c5f645f14881080e369160 2009.0/i586/libwxgtku2.6-2.6.4-16.1mdv2009.0.i586.rpm\r\n 0f91c80b3ce77f51d4c1f5d36e0819f4 2009.0/i586/libwxgtku2.6-devel-2.6.4-16.1mdv2009.0.i586.rpm\r\n ff86706ea654ea7a468d6363dda6feab 2009.0/i586/libwxgtku2.8-2.8.8-1.1mdv2009.0.i586.rpm\r\n 8c68a793d4c2d757433eea4e77a60f55 2009.0/i586/libwxgtku2.8-devel-2.8.8-1.1mdv2009.0.i586.rpm\r\n f8a1e00d8b94a7db2609d8a71462f0df 2009.0/i586/wxGTK2.6-2.6.4-16.1mdv2009.0.i586.rpm\r\n de0c1a62f4cf70af914191defdc7f76e 2009.0/i586/wxgtk2.8-2.8.8-1.1mdv2009.0.i586.rpm \r\n e930a36288bf2ff3b8aca22399863eba 2009.0/SRPMS/wxGTK2.6-2.6.4-16.1mdv2009.0.src.rpm\r\n 6bde57c053c58878704038b21c2d1676 2009.0/SRPMS/wxgtk2.8-2.8.8-1.1mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n cb965c0dddbe7b7e303ad0b5ebde0cc9 2009.0/x86_64/lib64wxgtk2.6-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n af54a23998cd6c032fa48f81c228c175 2009.0/x86_64/lib64wxgtk2.6-devel-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n 544d87b36b2a6f99f4435bbb9a7cb2c0 2009.0/x86_64/lib64wxgtk2.8-2.8.8-1.1mdv2009.0.x86_64.rpm\r\n 43f5f90dc44adc7d23831eb428501484 2009.0/x86_64/lib64wxgtk2.8-devel-2.8.8-1.1mdv2009.0.x86_64.rpm\r\n 561630fdbd6989c87912194b2c0777d1 2009.0/x86_64/lib64wxgtkgl2.6-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n 4262b7dc3e62e814e2f31af892d1e7d3 2009.0/x86_64/lib64wxgtkgl2.8-2.8.8-1.1mdv2009.0.x86_64.rpm\r\n 587512fe0e20bda8f15941f298398fcd 2009.0/x86_64/lib64wxgtkglu2.6-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n fcea1308febc43a1e63798d483aa9b32 2009.0/x86_64/lib64wxgtkglu2.8-2.8.8-1.1mdv2009.0.x86_64.rpm\r\n c5322379be157f028733dd0409f5f1b0 2009.0/x86_64/lib64wxgtku2.6-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n c0f8976fd1ea4753fbb35d057f7f6790 2009.0/x86_64/lib64wxgtku2.6-devel-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n a1a75543ff88ba2077ff8e97d85bb649 2009.0/x86_64/lib64wxgtku2.8-2.8.8-1.1mdv2009.0.x86_64.rpm\r\n 36ab506bcf29555c832026ef8b14d98c 2009.0/x86_64/lib64wxgtku2.8-devel-2.8.8-1.1mdv2009.0.x86_64.rpm\r\n 6d6ac31a5dece6e11bf0b1270a539b97 2009.0/x86_64/wxGTK2.6-2.6.4-16.1mdv2009.0.x86_64.rpm\r\n 370573fa244efd69c2ca1313d8b39320 2009.0/x86_64/wxgtk2.8-2.8.8-1.1mdv2009.0.x86_64.rpm \r\n e930a36288bf2ff3b8aca22399863eba 2009.0/SRPMS/wxGTK2.6-2.6.4-16.1mdv2009.0.src.rpm\r\n 6bde57c053c58878704038b21c2d1676 2009.0/SRPMS/wxgtk2.8-2.8.8-1.1mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.1:\r\n 3979d52a3bd6ccf111f4a40b64ec5eea 2009.1/i586/libwxgtk2.8-2.8.9-3.1mdv2009.1.i586.rpm\r\n d9d16a58951147f0888bb6a60b1e9d5a 2009.1/i586/libwxgtk2.8-devel-2.8.9-3.1mdv2009.1.i586.rpm\r\n 78bb27f22b501c2240edb0f82defe0a3 2009.1/i586/libwxgtkgl2.8-2.8.9-3.1mdv2009.1.i586.rpm\r\n 03cc02b50295a401f49021689439af76 2009.1/i586/libwxgtkglu2.8-2.8.9-3.1mdv2009.1.i586.rpm\r\n db1398114cde348c62e3fb56752b17fe 2009.1/i586/libwxgtku2.8-2.8.9-3.1mdv2009.1.i586.rpm\r\n 69bceb618bee5154fc1be7ebed3c36cc 2009.1/i586/libwxgtku2.8-devel-2.8.9-3.1mdv2009.1.i586.rpm\r\n 328f826b7f8981ecbad53123547e3d86 2009.1/i586/wxgtk2.8-2.8.9-3.1mdv2009.1.i586.rpm \r\n d845e40860f9222aa10525e0fdf77d49 2009.1/SRPMS/wxgtk2.8-2.8.9-3.1mdv2009.1.src.rpm\r\n\r\n Mandriva Linux 2009.1/X86_64:\r\n 3ea359aa650974fe4eade365d7735d26 2009.1/x86_64/lib64wxgtk2.8-2.8.9-3.1mdv2009.1.x86_64.rpm\r\n 0b521987ee5a1374e409a1cc480fe9ce 2009.1/x86_64/lib64wxgtk2.8-devel-2.8.9-3.1mdv2009.1.x86_64.rpm\r\n 9782e47812d647a3ee0ad8ab7a334a3a 2009.1/x86_64/lib64wxgtkgl2.8-2.8.9-3.1mdv2009.1.x86_64.rpm\r\n 837559e31c0e56ef10c722439cf911c3 2009.1/x86_64/lib64wxgtkglu2.8-2.8.9-3.1mdv2009.1.x86_64.rpm\r\n 0b92147cce6dedf0389f105648444c2a 2009.1/x86_64/lib64wxgtku2.8-2.8.9-3.1mdv2009.1.x86_64.rpm\r\n 2a29085953161be80ecf2a3b5c69352b 2009.1/x86_64/lib64wxgtku2.8-devel-2.8.9-3.1mdv2009.1.x86_64.rpm\r\n ec4d61fc4898e4786f418c3e13d84fb8 2009.1/x86_64/wxgtk2.8-2.8.9-3.1mdv2009.1.x86_64.rpm \r\n d845e40860f9222aa10525e0fdf77d49 2009.1/SRPMS/wxgtk2.8-2.8.9-3.1mdv2009.1.src.rpm\r\n\r\n Corporate 4.0:\r\n dc4c6e0a79098643d963619b60e7cd9e corporate/4.0/i586/libwxgtk2.6-2.6.1-1.1.20060mlcs4.i586.rpm\r\n e205de34a2ec8bb2ef63133e01e17608 corporate/4.0/i586/libwxgtk2.6-devel-2.6.1-1.1.20060mlcs4.i586.rpm\r\n 8c7ae887633a1c98883321a54fa3ca14 corporate/4.0/i586/libwxgtkgl2.6-2.6.1-1.1.20060mlcs4.i586.rpm\r\n da12877bb22222c307a15b93808aad2c corporate/4.0/i586/libwxgtkglu2.6-2.6.1-1.1.20060mlcs4.i586.rpm\r\n fe783f2a999f1ad7bd7523d39f4b5685 corporate/4.0/i586/libwxgtku2.6-2.6.1-1.1.20060mlcs4.i586.rpm\r\n ec16a26ad50a9d2b9c5743ae5fac7cae corporate/4.0/i586/libwxgtku2.6-devel-2.6.1-1.1.20060mlcs4.i586.rpm\r\n 056219b0008826fa1ac1696d1f4ff432 corporate/4.0/i586/wxGTK2.6-2.6.1-1.1.20060mlcs4.i586.rpm \r\n 8d8b3aba0a3e22d707f28cb9f8608ef4 corporate/4.0/SRPMS/wxGTK2.6-2.6.1-1.1.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n 32e416f12f857045a2745d61b3f90f5d corporate/4.0/x86_64/lib64wxgtk2.6-2.6.1-1.1.20060mlcs4.x86_64.rpm\r\n 861a866b3c5aa376930190e9046e4eb3 corporate/4.0/x86_64/lib64wxgtk2.6-devel-2.6.1-1.1.20060mlcs4.x86_64.rpm\r\n 77f2d6060c1eb83e06533537984d194b corporate/4.0/x86_64/lib64wxgtkgl2.6-2.6.1-1.1.20060mlcs4.x86_64.rpm\r\n be0a40d1a42feb11f1186b43d5c24e6d corporate/4.0/x86_64/lib64wxgtkglu2.6-2.6.1-1.1.20060mlcs4.x86_64.rpm\r\n 61b49d21b5da866d3e85626073f102b9 corporate/4.0/x86_64/lib64wxgtku2.6-2.6.1-1.1.20060mlcs4.x86_64.rpm\r\n ab88d380ffd073f308b155066fb85523 corporate/4.0/x86_64/lib64wxgtku2.6-devel-2.6.1-1.1.20060mlcs4.x86_64.rpm\r\n 35f808f8cd59723580659ceb2ff81800 corporate/4.0/x86_64/wxGTK2.6-2.6.1-1.1.20060mlcs4.x86_64.rpm \r\n 8d8b3aba0a3e22d707f28cb9f8608ef4 corporate/4.0/SRPMS/wxGTK2.6-2.6.1-1.1.20060mlcs4.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n b9949389f8c2f255f7c08d4deee8a205 mes5/i586/libwxgtk2.8-2.8.8-1.1mdvmes5.i586.rpm\r\n 62e01f7fac4ddcad704dcc44d8a20f18 mes5/i586/libwxgtk2.8-devel-2.8.8-1.1mdvmes5.i586.rpm\r\n ac213b138398076f018d0c3f22138d26 mes5/i586/libwxgtkgl2.8-2.8.8-1.1mdvmes5.i586.rpm\r\n 1007cc1c288d2dd0ea49a11a69314744 mes5/i586/libwxgtkglu2.8-2.8.8-1.1mdvmes5.i586.rpm\r\n 55ca51004e86b7393efe71e21a1cbc4b mes5/i586/libwxgtku2.8-2.8.8-1.1mdvmes5.i586.rpm\r\n 76ad64e12a1785e5344003ad93262dbb mes5/i586/libwxgtku2.8-devel-2.8.8-1.1mdvmes5.i586.rpm\r\n 26fa6078f737e69ab3024047c1591a4a mes5/i586/wxgtk2.8-2.8.8-1.1mdvmes5.i586.rpm \r\n 8d25aab35d794053627efec49dc73b50 mes5/SRPMS/wxgtk2.8-2.8.8-1.1mdvmes5.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 685a0e502184adff3ebb251eb0f65d7f mes5/x86_64/lib64wxgtk2.8-2.8.8-1.1mdvmes5.x86_64.rpm\r\n 461ec9738183f7474f3765aefddff47e mes5/x86_64/lib64wxgtk2.8-devel-2.8.8-1.1mdvmes5.x86_64.rpm\r\n 78c67aaacdf55179d499fbba0b742de0 mes5/x86_64/lib64wxgtkgl2.8-2.8.8-1.1mdvmes5.x86_64.rpm\r\n 88ed2a84aeed286a2e6234e7740d5fd3 mes5/x86_64/lib64wxgtkglu2.8-2.8.8-1.1mdvmes5.x86_64.rpm\r\n f40bcaac3f32956e83d85ed7ba318c79 mes5/x86_64/lib64wxgtku2.8-2.8.8-1.1mdvmes5.x86_64.rpm\r\n 4087d948db042660433e8f231b893b42 mes5/x86_64/lib64wxgtku2.8-devel-2.8.8-1.1mdvmes5.x86_64.rpm\r\n 1566dd6943961d3e43027716539ba072 mes5/x86_64/wxgtk2.8-2.8.8-1.1mdvmes5.x86_64.rpm \r\n 8d25aab35d794053627efec49dc73b50 mes5/SRPMS/wxgtk2.8-2.8.8-1.1mdvmes5.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFKiHKwmqjQ0CJFipgRApvpAKDOu03RiPsa87evchns6DdzX4qznQCfYKbn\r\naNUc9rmakeIt34fk4FfpC4Y=\r\n=Pna2\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2009-08-17T00:00:00", "published": "2009-08-17T00:00:00", "id": "SECURITYVULNS:DOC:22334", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22334", "title": "[ MDVSA-2009:204 ] wxgtk", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:33", "bulletinFamily": "software", "cvelist": ["CVE-2009-2369"], "description": "Buffer overflow on JPEG parsing.", "edition": 1, "modified": "2009-08-17T00:00:00", "published": "2009-08-17T00:00:00", "id": "SECURITYVULNS:VULN:10158", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10158", "title": "wxWidgets buffer overflow", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:24", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2369"], "edition": 1, "description": "### Background\n\nwxGTK is the GTK+ version of wxWidgets, a cross-platform C++ GUI toolkit. \n\n### Description\n\nwxGTK is prone to an integer overflow error in the wxImage::Create() function in src/common/image.cpp, possibly leading to a heap-based buffer overflow. \n\n### Impact\n\nA remote attacker might entice a user to open a specially crafted JPEG file using a program that uses wxGTK, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll wxGTK 2.6 users should upgrade to an updated version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=x11-libs/wxGTK-2.6.4.0-r5\"\n\nAll wxGTK 2.8 users should upgrade to an updated version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=x11-libs/wxGTK-2.8.10.1-r1\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are available since August 9, 2009. It is likely that your system is already no longer affected by this issue.", "modified": "2010-09-02T00:00:00", "published": "2010-09-02T00:00:00", "id": "GLSA-201009-01", "href": "https://security.gentoo.org/glsa/201009-01", "type": "gentoo", "title": "wxGTK: User-assisted execution of arbitrary code", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2020-11-11T13:24:29", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2369"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1890-1 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nSeptember 19, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackages : wxwindows2.4 wxwidgets2.6 wxwidgets2.8\nVulnerability : integer overflow\nProblem type : remote\nDebian-specific: no\nCVE Id : CVE-2009-2369\n\n\nTielei Wang has discovered an integer overflow in wxWidgets, the wxWidgets\nCross-platform C++ GUI toolkit, which allows the execution of arbitrary\ncode via a crafted JPEG file.\n\nFor the oldstable distribution (etch), this problem has been fixed in version\n2.4.5.1.1+etch1 for wxwindows2.4 and version 2.6.3.2.1.5+etch1 for\nwxwidgets2.6.\n\nFor the stable distribution (lenny), this problem has been fixed in version\n2.6.3.2.2-3+lenny1 for wxwidgets2.6 and version 2.8.7.1-1.1+lenny1 for\nwxwidgets2.8.\n\nFor the testing distribution (squeeze), this problem will be fixed soon.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.8.7.1-2 for wxwidgets2.8 and will be fixed soon for\nwxwidgets2.6.\n\n\nWe recommend that you upgrade your wxwidgets packages.\n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian (oldstable)\n- ------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wxwidgets2.6_2.6.3.2.1.5+etch1.dsc\n Size/MD5 checksum: 1070 122f76e514a09e27a2efeb83972508bf\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wxwindows2.4_2.4.5.1.1+etch1.tar.gz\n Size/MD5 checksum: 11008448 56e09f548341a24faab4e2494ccf3c2e\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wxwindows2.4_2.4.5.1.1+etch1.dsc\n Size/MD5 checksum: 1088 956079f1b2e0639fdd5edab2112c528a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wxwidgets2.6_2.6.3.2.1.5+etch1.tar.gz\n Size/MD5 checksum: 15785194 de6ed02cb129ce6393d132452999cd17\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-i18n_2.6.3.2.1.5+etch1_all.deb\n Size/MD5 checksum: 664476 ab249de067119db66091ecc4a4412d35\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxtools_2.6.3.2.1.5+etch1_all.deb\n Size/MD5 checksum: 17782 f176eaeafccacf0b965c68d3b61a0253\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-examples_2.6.3.2.1.5+etch1_all.deb\n Size/MD5 checksum: 3633304 e2b5d8c1c0edcd2287a35a327576ebdd\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-doc_2.6.3.2.1.5+etch1_all.deb\n Size/MD5 checksum: 1252698 cb859a2500031b5cd6d4397f7bfd5eb3\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-i18n_2.4.5.1.1+etch1_all.deb\n Size/MD5 checksum: 372546 988d0727d645d9c75f4ae8509abd719b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxversion_2.6.3.2.1.5+etch1_all.deb\n Size/MD5 checksum: 21782 a704638d51c4ef98ec5a2f9473ae68a7\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-doc_2.4.5.1.1+etch1_all.deb\n Size/MD5 checksum: 1076678 e6271674af7b940be14ebfb52e23b92d\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-examples_2.4.5.1.1+etch1_all.deb\n Size/MD5 checksum: 2709008 c7028e976a32f5244ebb27693db064c6\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 2713910 ba15f692945dbefedb47bae998f013c3\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 25074 21e8730a7006310d0a84c407e4f2ae0e\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 564238 2370397d7591b72fc7609ce02f7f4f84\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 19992954 db418cf6e2847b9907ef6a538f70adcc\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 50328 be45b6149b0c116e803fdd38e5572cef\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 36444 2eae2b26e38100bf60a474e520bf0b99\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 25134 1c888b3cc0a33b76336db7df6ae2d0c0\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 2255974 33e6409ca72ad7e06d8e51d3b0b441ae\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 10382526 97c9fa30e8f06e2124147c3da791dca2\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 1744166 9258be03adf61cee4096427744bf3d72\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 3122808 8798c58b18d973c828fc0532dadae0bd\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 2994732 3e0e2b05ade2d712bd2b221716305ae0\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 418058 1be528a83831f1053ea7445ff65e4f6e\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 129500 8d7e41600461d9e7dcf88f61cddfac8a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 573704 962572e88d9f806285e8d715f0d43c54\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_alpha.deb\n Size/MD5 checksum: 1060216 ed2e453c29311d1cb624c61c33e66727\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 36152 f3a1938031a731389e71ab87485e7484\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 880292 04937eb0bc960233e3db4cdc83833bdb\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_alpha.deb\n Size/MD5 checksum: 3166630 bd7580a32d48fadc7ad77c6599ee6c6a\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 35432 d6dc4be2899ac614ab033a0641701967\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 2200652 4990091299a0435e72ecd315c5136988\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 3088892 6691c732c9c64f04dff2506915818086\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 383188 46e3e229986e669893d8b4aa8485f8de\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 25078 d041624e0c575a994ee1fb45e60cdd87\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 19585974 59ad06678d566851793a9d202352ddf6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 861842 eec540875fb15b54190cae49646c893d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 538252 7e0ec08346d07dbfac71410b14ef757a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 2766236 f35271fa3e7a74978102639297f259f8\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 2649224 bd86a4f68d5a551eb31be75cac5b4fb8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 35118 c9f8e2b355e28788ff0cff45b2162040\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 3249154 b4d5545e576b4c85e6ddc4bac3fc99d4\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 961580 e66b01a4d4d5dcca20fe08aa1d98bf7c\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 129502 ed482f320cc2dc917e7125916d1fe4b6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_amd64.deb\n Size/MD5 checksum: 48858 0d59fccaea55d84e0b18e8bdba0b0e37\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 10113802 ef1a21ab6825bbb43ee8869a108d6134\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 564250 82207cde2195164b17947ab828869a0d\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 25128 cb64f1042206042bd12d8561c9d847e4\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_amd64.deb\n Size/MD5 checksum: 1576566 33b4bd212d168b00a0f6f11db95c6375\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 2940536 bdbfb90ee6321e941ccd53aeb8224233\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 881070 9afc4d7a0cf6fd2195f2235f5151a09b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 19561158 96c4cf2a6fe636f371e2fba708af6903\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 3117144 9f32b39ffb0172e421d427a4b7c48b5c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 49582 a72236022efa01d6a92e8f21b506fec5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 551774 d5b4b9b3d0f1c5b869b47be2828bc807\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 2834408 ea466f0a1f0fb23296db73bcad02a206\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 35164 61b43a1cad0c37df6267a43914eefc06\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_arm.deb\n Size/MD5 checksum: 35502 91ff9f6e1b6cc114d0ecd1ee772bc701\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 463458 6c692c1a88e97e7c546cea1b6f3fcab1\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 129860 b6b520bdae2f9f8b0693375d83ba3f3e\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 1969118 0069d5b2b63246c4d443f5f179145dac\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 2291160 ffa500c7ee6f54823fb57e6a3aa1360d\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 3031780 19da65cb38bb15f923c5b11dfa37cdc2\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 25116 56a6b0367f16c92673b6201d2df1cf25\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 1178074 0c0307380f914a94b01914929bf7bf66\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 576610 457ae5df7daaa957aef0f8f2708562c6\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 10444966 2afbc00ac251f73fcc52d7927d51c7b7\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_hppa.deb\n Size/MD5 checksum: 25060 b24d32721901d698d93dcaead7af16d8\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 25090 43188da924e4e9e3156b9adeece249ca\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 986754 965a6364e26386a719079a26b63bfbc2\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 9957302 f9483f97e9addd595e2ff8818c8e6cff\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 881502 ed73fd1abbb84eefa307cd323e899e89\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 3061220 ed8b02f0c25dd190a4d116d8d2b6087c\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 575154 8b7365566880a2ca5eab54d4387f9072\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 36466 7e75987ded64d3b46c057b1864384947\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 25034 7862f56e3c5417275645960c1bca14f2\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 544362 db33ec1ccf1d6d46e92df4d334527bf8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 2803438 0eac1a3cb3d3098ac47c229cbf8f12b9\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 2173966 3777e0b10bf92021cc14e975ed25b6b6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 2860208 de95315ef381be85013e8411607e4222\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 130308 37610a7a98f0090dbe23e4af4a608dd4\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 2455510 ea676189434af5b7cdfb04f50ab09f89\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 393564 06d60b973d02c4555e8b46f5035eda8c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 36154 e78feae70d41af8658604932b69d218a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 48452 22d00c5d0631c440e667a1d9b8263a1e\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_i386.deb\n Size/MD5 checksum: 1596890 d57aa08eafc18180208bbf5d95faca57\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_i386.deb\n Size/MD5 checksum: 19372156 08bbc1c962082d0f06a3b4fc06e80328\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 2285958 d57c1016cdceac9f470bab438a35f9ab\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 1316754 871bfc8083b685241dc7cc6b4e8af50f\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 495922 2e433973185bc869ad91f57cb130e657\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 861876 2724647400cd49e17a4b9e37f6c7aed5\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 3114788 729c3dea5dd56a1e15474a191ec73384\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 10520598 40a234f8dd309e40fd3a454f102d6618\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 55780 5a54361d8c6a0ac273e60737c8d321ba\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 3715304 20ed601ef974a57be1562eaad2dd46e0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 20252286 cc42bf82f74d6826b46dc974b0292932\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 700600 342ed3819dbadf63a6dcef7a3f1f3bf6\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 2138830 3436db0d3588bccaa96fa7af84c97dbc\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 3708808 01be3f4f2e8c414a2b9fc0da046e554f\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 25068 e04583c4c667b5c4365955c30d525c84\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 35440 4bfb183198f25c33fbb980f4f4502bed\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 3221778 fac9e2f7f05baa2c984a6078321ad7f0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_ia64.deb\n Size/MD5 checksum: 35116 9a7a78379b02d990110671fede35a316\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 564236 c59379b91813df554c4006788526386f\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 25132 7d6ff4e7cd550b2733fcf19529c7af55\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_ia64.deb\n Size/MD5 checksum: 129496 bfe2a19f2a3527e6acb77719c24a02be\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 2262548 0f6f64cd171a777ae1d5e06e70bf49b6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 20047338 166778e728501d6294a91a209d783e62\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 972448 e0d823eb16e434a3c4edb61aa9e747a6\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 381772 ae416bc731817d96b5c59074900a1f62\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 2715892 d256c80f5a0fb318e32ee5163bf3fbd2\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 861986 41719481aa94d103ab1775f9d0df72e0\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 2438550 f2a1066496278f673696085058d90efd\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 48400 f83da106fd94f197f878663fd98e40bc\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 1597516 81d29066a482ab8ec5b3ee0604a2ab34\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 3174222 97889bbc7b3e5535589665e4fcf9a9d6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 35444 38c67189dea7f39442d4bda5165c3de9\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 25080 a4d8e09a288290e3bd6982227d12c52e\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 10390776 dff7a80e132e27d2806b2c003f95ca96\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 564252 aa51071fd1d691dd9169235ce20a2cd2\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 2766836 924d6f2062c29107246d1594b4a40412\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 129516 ae21047fa423614a17902eb2e4744b51\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 532864 d08e5a8869bbfbed2bae0532a06c6caf\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_mips.deb\n Size/MD5 checksum: 35118 2a7fd94ac98a58c274f92b2560d77871\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_mips.deb\n Size/MD5 checksum: 25136 90b71e4e3767ffa0aea943e092148786\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 2652066 97f070586c532bb00671ead4843b377c\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 10099422 0442a03b57c9335923ad6babe5ecbb42\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 1562412 9a6e328251ef614bb57e8d232a56ceaf\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 19584630 7b3b1a065c75ec578155d627ae7c32cf\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 2376518 cdc569e8419834843d8f42e43139059b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 861942 8602e76ba2a89a45d89257a173a766ef\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 958254 8416f87fdd451ecb95b12a71636c1ac7\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 2714280 0051b3ac131e1646e6432943ff1782c5\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 2192378 132df0a2c16bb44a3b71ec43fd199a65\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 522628 675a6fb9029846942011bd7fc9328768\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 129522 63beedd88ca1faf7b47c43071afe91f7\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 48160 c24f40a8d3e4f386c688a6298b4ef235\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 374550 e6245491d2d7b1acf0262487b1aac240\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 25056 9d8e3153513582195711b2458e08731b\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 25124 9c31c88ffc3f9ed731bc84fd07c72011\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 3082134 a6c6bbe06263afee4c1d81a73442fbc4\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 35432 45a532c57d1871017e64fe7b01ae50de\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_mipsel.deb\n Size/MD5 checksum: 564244 42e709769f06b61175a500fabc29481c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_mipsel.deb\n Size/MD5 checksum: 35100 0f7a2ea2f26c4480de1be18734d00a15\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-1_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 400418 12f606662dc5e0326dbb3b5ba7db8d75\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1-contrib_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 1005798 eb595466b4038d46ceaedc3fedfe2965\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 35442 49b6835d4faaa4a0daecf54cec783370\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 861990 157683dea1c9bf4a5a492f0a94bd9e56\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 557120 7155d76589cd2a9a0a79bff7b10c2071\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dev_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 25128 49e02683e44d367bc7cf1ec0a79202dc\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 35106 f759ce8cea26515395b51000ca371b2a\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/python-wxgtk2.4_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 2684448 1348fe57fb9a358fda03f7123ee3521d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 3014722 c096881fac6a399b5fc670effa63f276\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 49488 d9f0ea3bb27c64d7c59845589b1c9d42\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-1_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 1652596 589be72d9819e43a44129390febf795f\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-contrib-dev_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 129550 89b0ec9bb640280918b936a139b31aa6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 2866846 67736e6b71529fb5004ec6ea93edeb3c\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dbg_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 2247354 d9cfaff30d98e5f4c638ea18d5cdc150\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 3144452 089a65bfcfbb47d9182494e60fb4beed\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxgtk2.4-dbg_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 10276544 8a9db5a32b18aa26a3883d04a8a2dd5b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.1.5+etch1_powerpc.deb\n Size/MD5 checksum: 19864144 27926de24ffff47ae9511074b7b1b744\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/wx2.4-headers_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 564256 54ba668b1fb7a5f2c01486f098fcc245\n http://security.debian.org/pool/updates/main/w/wxwindows2.4/libwxbase2.4-dev_2.4.5.1.1+etch1_powerpc.deb\n Size/MD5 checksum: 25070 d675175e2a330b9eb5632c441eeb2b81\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wxwidgets2.8_2.8.7.1-1.1+lenny1.dsc\n Size/MD5 checksum: 1797 33a581cfe33271a4b4106f6e8ec83da4\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wxwidgets2.6_2.6.3.2.2-3+lenny1.dsc\n Size/MD5 checksum: 1582 e375d8ab0c7603bf7920325d9ba81af7\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wxwidgets2.8_2.8.7.1-1.1+lenny1.diff.gz\n Size/MD5 checksum: 40476 7175110c4231ee1ae2df920f545af50d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wxwidgets2.6_2.6.3.2.2-3+lenny1.diff.gz\n Size/MD5 checksum: 117286 15784243277609fbe69e759ce207202c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wxwidgets2.8_2.8.7.1.orig.tar.gz\n Size/MD5 checksum: 34856152 f75d2be063c2f2d180085b98e7775ecb\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wxwidgets2.6_2.6.3.2.2.orig.tar.gz\n Size/MD5 checksum: 15136648 c07edbcab40c4a6ebd47df0cf3337ba8\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-examples_2.6.3.2.2-3+lenny1_all.deb\n Size/MD5 checksum: 3630132 512b7502b701952bc756dccac0e44fc6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-i18n_2.8.7.1-1.1+lenny1_all.deb\n Size/MD5 checksum: 779384 4627c7e8dff7b126050e979d2f20c2d1\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxtools_2.6.3.2.2-3+lenny1_all.deb\n Size/MD5 checksum: 18820 17be0a766774f7c211129a56d713f9ea\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-doc_2.8.7.1-1.1+lenny1_all.deb\n Size/MD5 checksum: 2077546 6061427a5fa642aaf032d8e92d661f9a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxversion_2.6.3.2.2-3+lenny1_all.deb\n Size/MD5 checksum: 23578 04401a9faaa01cf7c950809003bca164\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-doc_2.6.3.2.2-3+lenny1_all.deb\n Size/MD5 checksum: 1253844 d328e6b75e39de240d311b09aada31dc\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-i18n_2.6.3.2.2-3+lenny1_all.deb\n Size/MD5 checksum: 668962 f369c5bf561b02b02efc0ee869ccd0d5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-examples_2.8.7.1-1.1+lenny1_all.deb\n Size/MD5 checksum: 6606152 a441eef8c835207a1fed60aafe8c6ac2\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 38775170 da19f77fe98485641bd7fdc5c20a6a46\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 51346 b8b93d3bc17e845b713eff325e8384d0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 898152 8c0d4a0ff43f9ab9fd31210a8d96d2eb\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 3836066 c3ecd63268bed566af7e3dcff60da842\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 10643878 b2b260128b5df308103c5ef41af14465\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 91796 6cc966c4a0c0df3360632637c9868370\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 36472 ab202c6786c7561eb2e8984e243a3cd2\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 1107790 c99ba2d04000c7ef07dfd48ddf6c8d3d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 20219178 8fd103bc770c03adfdb22822eabc4e92\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 92060 a0f41364bb50c3ed539c1fef17275436\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 722944 ffe404f404bb98ebeeb779328cd7ff96\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 5631054 c71b34ad927431d43d108b5a57c479e3\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 3093964 6e8cce75af4c14599a7ef272d86a444c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 27088550 b95f28de0927de65b4cd7b7f71351095\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 36204 d010752e84c26238a25f18477b1c051a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 22709848 d1bd2c606ae23db43ae31572e1dd3d7a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_alpha.deb\n Size/MD5 checksum: 4093568 2677046c88d7f3182151b2d7c3b8ead5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 3366524 a3c7800dfeebb79278e463d747937842\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_alpha.deb\n Size/MD5 checksum: 592132 b930cee997dc23034db1439c3d34adab\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 36510524 dbfaf9bd54c4e8264b42faddbfb9ff9b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 1098028 aadb0f0c7590b4b2c4861c90a868f7c9\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 3793066 6fde69ae07c4ebddb9dd59562f0320f8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 36258 f2492e3f5c991a0bf2662af123737771\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 90328 d98d1e40e297e9cd37ba1c33650e8d8e\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 551776 00fb242e2370438ce12af390d918d12d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 5479996 82de40d2da2fb97c62b39eaf8938d2f8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 18781488 4e29375c9cc92244a84013d1307d633a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 24436548 657ddce254aa7daca8765a4af58407a5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 36528 ddd96a5b7a43526473f5716300710586\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 49674 3bf1425e206a4ce71ddfdf6b396a1433\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 10868914 ed1d499923ffce52264f30b22df16c75\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 90056 eac5f135018c1bc851e7f02b59e77675\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 899218 1752d4ab699ad1377b772ea6cc93a430\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 3082988 65bd04a99521d52ea1bdb94b882d9be5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 678544 da151ccc65d250417f03aa0426fdaaf6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 2825914 5b3f543bc86423ac3a5fb66212508eb6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_amd64.deb\n Size/MD5 checksum: 3457702 9c1dd301677525b3b4629429e12d471d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_amd64.deb\n Size/MD5 checksum: 19730408 e344985cadfe1bd4045996c815a387e3\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 35895654 06dc93f2c2398fddf2e4797b3594b1eb\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 3601180 b21ae53100c48a4a9c6820c83148c7c7\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 587788 63b636375d3f66365d1e680aa065d85f\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 1099742 8cb3c3bd1ba8cf8bfeac117e960e8eff\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 3043508 0794f58f62499c31efbe700ee05979d9\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 22514948 22b4950cb193021a44f32a5395815125\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 9237702 427f9c20bdf49621ff71e7de5a8e2727\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 91552 80cb3857f2ec53037e99ad4a09b85e91\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_armel.deb\n Size/MD5 checksum: 91802 ab2aeaa16827eb12d948451fafe3c480\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 10703350 113b66c901932e18e1c26f406d6838d4\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 19349740 e15ea0cba9ee2926c18dc0358f478129\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 3253024 59d10d4deeb494f890f9f5058c431d15\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 35519310 0e216c36fe835771d6465506b6ebbb81\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 614258 7137f4f0fc270eb789cccfa5a94ef252\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 4007054 7ab99e7b1965d3fd9e8bb58b7f4b8e29\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 90756 b1120efe21064d1ebda62b3e2342bb1a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 3901514 67299497255d07e4b7c415b261d555ca\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 900098 9ee188d6329e742d00be481225a23ff4\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 750830 794a2c96f1dc93cff4c64a2eda901a90\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 3150000 53736a48a03552af79450b649aa5850d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 36722 85619806d1c425b687b93e832682a999\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 90988 5208cf19757ce3418921319ae0215007\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 1099642 47f5f7a7d10bfb7ef8521a637a46f7b5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 36472 19e5ab4f7f48f680bcb7b7163d35d223\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 50416 7735a0a26667e687d98ccf067f9e62f9\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 5957908 6fc841e4504d83d65105aa99311b78cd\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_hppa.deb\n Size/MD5 checksum: 25212340 26c10a99e5a7964e505d5455e56a3952\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_hppa.deb\n Size/MD5 checksum: 19938742 9020f4a0196451cef3e9c89813df3c00\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 3737246 79505c13aec6e91491407e1b337b370a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 91842 edbf452341ecb2702f9b5e10558e88a8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 4957894 efb4d0486379f1198553ce049fe42e8b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 676722 0eef10c25ea193e9a94301415cd3e9af\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 18693586 a793df0f92efe8acdbfc1f71b841c542\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 1099970 8d6d1fc4216988554b9d8f34d0d40469\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 2791368 f32064d8be5c08a42ff43ab7e6922f30\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 18528676 f41d3c66aa94ccd8dbf7080b20ef8ced\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 9444950 69be1c41758664b84e34d11d5b0c7f47\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 91594 3d41fd327034fdd337391219203a503c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 24102752 3af471989f1461812184e1997c2e225b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 898950 ac9485a1b970b7c0b049207adff00e8b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 3415336 4b0d9c0da7012b54fc3009740a2b8df5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_i386.deb\n Size/MD5 checksum: 34725574 9b2395d6084e2f07dc514a824d654ad0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 553214 071a1fddbf369258acc17583621241df\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 37572 de43e58b721735a10d8cacbd42335eac\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 48538 8e8dadd5bba0773aa9c6561d6c745d19\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 37312 e6f409b022f41044b3181329038e85d0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_i386.deb\n Size/MD5 checksum: 3025296 737d0f2dd26a8313785103502b23ba65\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 699846 2c788f8817121de306bc00d7fdcb9624\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 91788 90541e3f420d257056c294d6c70376ad\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 3142112 b6c4a58f7e41e54b164153daddc2c0d4\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 1076858 0fa010de312457e034c0f76985c9fa71\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 3681572 fed3af82b68744767bee941bd01612c5\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 12102760 ed862bd8459720f74885f534c2274efe\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 43470016 9395a4d64188d998ab621cdb9260c328\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 36194 354290e08a2ab2db7a483262ba888c9c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 36474 74c99c0b026235cfbe571e33c7115d6c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 55718 3ab6935935a68c26de494988e00ef55d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 25199494 f23bc8501fbe33507b93f23488b9e65b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 3861942 0f19e1cea8236af5ff7fa856f64ef44a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 845148 206617f311d01be322535b5352a57000\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 880662 2f4ddcd706e9faa597f39d5be90a51ca\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 4551102 1f97afb3275229d5d40ea5ab5a86717e\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 6065898 06d650d16b4e32cc38f8c051c950c2c8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_ia64.deb\n Size/MD5 checksum: 92048 6fc193366e68e1bb17e8ed5bc59bc8c6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 19311602 9343db578cb9733c54a72ef66b35836b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_ia64.deb\n Size/MD5 checksum: 19977666 2cb8f8cc2be26bb5969f8f4bce54ff57\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 47556 1ee2b53a4c9ba571a7f8402ad7b9a19b\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 514306 af09ba3c89254ce762b5dad3e6c30572\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 2679274 26a3f09279ec794bc705eed2fac708c8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 36740 b5b1ae68b628ce321b64d7eb5418c565\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 4728160 990baa6ac51681a7da75e67bedbe8651\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 899584 ca4894c510d9e52ac6e28126cffa4ee1\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 18861886 cc0bc1fd3414e32dc474e2b0dd5f2b63\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 18991740 41cccf88593d9fd1b635cddcd5b259c0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 36474 bc6f1ae9b6d63206655d3d57718f20f9\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_mips.deb\n Size/MD5 checksum: 3079170 cb48091de1d5e17359058b0be53c0cdf\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6-dbg_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 20892820 38ab4b6305c81ac99f22fa82845f3a57\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/wx2.8-headers_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 1076966 7822ffadc0a0110b8f43fea6fb379b1d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx-common_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 52896 4c3d45be6fbfbdc5a0d93f032336ac75\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dbg_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 19205890 a9e371b9d5ed2d04a15a914fdaed7964\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-dev_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 36468 66569c32912cbc6975606f775e2b492d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-0_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 3683574 2b3f701ec90b6957a3f04100623fdfa7\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dbg_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 24995326 d92ce43d6645133ec3f247b80a22cba6\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8-dbg_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 38401942 d7eec7a4f4a3bbf94ba7c97bd8a80139\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/wx2.6-headers_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 880766 f901136b89997820c17dd7c9abdafb5c\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/python-wxgtk2.8_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 10150968 f76ef747e3695abbcc1508ce56ec3e00\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-0_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 592218 e10b0bddc69f758b67008bfae93336c0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-0_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 726146 9d5c64f58f7001fb77599eab606fcf46\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dev_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 36184 8f75c59f326e223efd745a7104fd62a0\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dev_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 91784 88ffaa145ea190cca544de94d4fbb76a\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxgtk2.8-dev_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 92050 f0fd19e8d991516ab0b879ddae8f5e77\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxbase2.6-dbg_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 3153668 0383b06428ef634a04c291b6f13257f8\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/python-wxgtk2.6_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 5409818 3e47ebe1b719d1834a079dcea1673b79\n http://security.debian.org/pool/updates/main/w/wxwidgets2.8/libwxbase2.8-dbg_2.8.7.1-1.1+lenny1_powerpc.deb\n Size/MD5 checksum: 3905470 1d64ab0a0a06fd2982df098e7f62025d\n http://security.debian.org/pool/updates/main/w/wxwidgets2.6/libwxgtk2.6-0_2.6.3.2.2-3+lenny1_powerpc.deb\n Size/MD5 checksum: 3024034 53d8e7198c8a81e6a54576397de727d8\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2009-09-19T08:26:28", "published": "2009-09-19T08:26:28", "id": "DEBIAN:DSA-1890-1:23404", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2009/msg00211.html", "title": "[SECURITY] [DSA 1890-1] New wxwidgets packages fix arbitrary code execution", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2369"], "description": "wxWidgets/GTK2 is the GTK2 port of the C++ cross-platform wxWidgets GUI library, offering classes for all common GUI controls as well as a comprehensive set of helper classes for most common application tasks, ranging from networking to HTML display and image manipulation. ", "modified": "2009-07-22T21:49:17", "published": "2009-07-22T21:49:17", "id": "FEDORA:80A4D10F8CA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: wxGTK-2.8.10-2.fc11", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2369"], "description": "wxWidgets/GTK2 is the GTK2 port of the C++ cross-platform wxWidgets GUI library, offering classes for all common GUI controls as well as a comprehensive set of helper classes for most common application tasks, ranging from networking to HTML display and image manipulation. ", "modified": "2009-07-19T10:24:07", "published": "2009-07-19T10:24:07", "id": "FEDORA:2788710F8B0", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: compat-wxGTK26-2.6.4-10.fc10", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2369"], "description": "wxWidgets/GTK2 is the GTK2 port of the C++ cross-platform wxWidgets GUI library, offering classes for all common GUI controls as well as a comprehensive set of helper classes for most common application tasks, ranging from networking to HTML display and image manipulation. ", "modified": "2009-07-22T22:01:03", "published": "2009-07-22T22:01:03", "id": "FEDORA:A96AC10F934", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 10 Update: wxGTK-2.8.10-2.fc10", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2009-2369"], "description": "wxWidgets/GTK2 is the GTK2 port of the C++ cross-platform wxWidgets GUI library, offering classes for all common GUI controls as well as a comprehensive set of helper classes for most common application tasks, ranging from networking to HTML display and image manipulation. ", "modified": "2009-07-19T10:19:41", "published": "2009-07-19T10:19:41", "id": "FEDORA:3E58810F89B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 11 Update: compat-wxGTK26-2.6.4-10.fc11", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-06T09:45:40", "description": "Tielei Wang has discovered an integer overflow in wxWidgets, the\nwxWidgets Cross-platform C++ GUI toolkit, which allows the execution\nof arbitrary code via a crafted JPEG file.", "edition": 25, "published": "2010-02-24T00:00:00", "title": "Debian DSA-1890-1 : wxwindows2.4 wxwidgets2.6 wxwidgets2.8 - integer overflow", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "modified": "2010-02-24T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:wxwindows2.4", "cpe:/o:debian:debian_linux:4.0", "p-cpe:/a:debian:debian_linux:wxwidgets2.8", "cpe:/o:debian:debian_linux:5.0", "p-cpe:/a:debian:debian_linux:wxwidgets2.6"], "id": "DEBIAN_DSA-1890.NASL", "href": "https://www.tenable.com/plugins/nessus/44755", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1890. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44755);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2009-2369\");\n script_bugtraq_id(35552);\n script_xref(name:\"DSA\", value:\"1890\");\n\n script_name(english:\"Debian DSA-1890-1 : wxwindows2.4 wxwidgets2.6 wxwidgets2.8 - integer overflow\");\n script_summary(english:\"Checks dpkg output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Tielei Wang has discovered an integer overflow in wxWidgets, the\nwxWidgets Cross-platform C++ GUI toolkit, which allows the execution\nof arbitrary code via a crafted JPEG file.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2009/dsa-1890\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the wxwidgets packages.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 2.4.5.1.1+etch1 for wxwindows2.4 and version 2.6.3.2.1.5+etch1\nfor wxwidgets2.6.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 2.6.3.2.2-3+lenny1 for wxwidgets2.6 and version\n2.8.7.1-1.1+lenny1 for wxwidgets2.8.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wxwidgets2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wxwidgets2.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:wxwindows2.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"libwxbase2.4-1\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxbase2.4-dbg\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxbase2.4-dev\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxbase2.6-0\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxbase2.6-dbg\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxbase2.6-dev\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.4-1\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.4-1-contrib\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.4-contrib-dev\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.4-dbg\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.4-dev\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.6-0\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.6-dbg\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libwxgtk2.6-dev\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"python-wxgtk2.4\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"python-wxgtk2.6\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"python-wxtools\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"python-wxversion\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx-common\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.4-doc\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.4-examples\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.4-headers\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.4-i18n\", reference:\"2.4.5.1.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.6-doc\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.6-examples\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.6-headers\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wx2.6-i18n\", reference:\"2.6.3.2.1.5+etch1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxbase2.6-0\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxbase2.6-dbg\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxbase2.6-dev\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxbase2.8-0\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxbase2.8-dbg\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxbase2.8-dev\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxgtk2.6-0\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxgtk2.6-dbg\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxgtk2.6-dev\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxgtk2.8-0\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxgtk2.8-dbg\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libwxgtk2.8-dev\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-wxgtk2.6\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-wxgtk2.6-dbg\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-wxgtk2.8\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-wxgtk2.8-dbg\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-wxtools\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-wxversion\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx-common\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.6-doc\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.6-examples\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.6-headers\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.6-i18n\", reference:\"2.6.3.2.2-3+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.8-doc\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.8-examples\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.8-headers\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"wx2.8-i18n\", reference:\"2.8.7.1-1.1+lenny1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:52:40", "description": "The remote host is affected by the vulnerability described in GLSA-201009-01\n(wxGTK: User-assisted execution of arbitrary code)\n\n wxGTK is prone to an integer overflow error in the wxImage::Create()\n function in src/common/image.cpp, possibly leading to a heap-based\n buffer overflow.\n \nImpact :\n\n A remote attacker might entice a user to open a specially crafted JPEG\n file using a program that uses wxGTK, possibly resulting in the remote\n execution of arbitrary code with the privileges of the user running the\n application.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "published": "2010-09-03T00:00:00", "title": "GLSA-201009-01 : wxGTK: User-assisted execution of arbitrary code", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "modified": "2010-09-03T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:wxGTK"], "id": "GENTOO_GLSA-201009-01.NASL", "href": "https://www.tenable.com/plugins/nessus/49098", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201009-01.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49098);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-2369\");\n script_xref(name:\"GLSA\", value:\"201009-01\");\n\n script_name(english:\"GLSA-201009-01 : wxGTK: User-assisted execution of arbitrary code\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201009-01\n(wxGTK: User-assisted execution of arbitrary code)\n\n wxGTK is prone to an integer overflow error in the wxImage::Create()\n function in src/common/image.cpp, possibly leading to a heap-based\n buffer overflow.\n \nImpact :\n\n A remote attacker might entice a user to open a specially crafted JPEG\n file using a program that uses wxGTK, possibly resulting in the remote\n execution of arbitrary code with the privileges of the user running the\n application.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201009-01\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All wxGTK 2.6 users should upgrade to an updated version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.6.4.0-r5'\n All wxGTK 2.8 users should upgrade to an updated version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/wxGTK-2.8.10.1-r1'\n NOTE: This is a legacy GLSA. Updates for all affected architectures are\n available since August 9, 2009. It is likely that your system is\n already no longer affected by this issue.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:wxGTK\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/09/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"x11-libs/wxGTK\", unaffected:make_list(\"rge 2.6.4.0-r5\", \"ge 2.8.10.1-r1\"), vulnerable:make_list(\"lt 2.8.10.1-r1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wxGTK\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:07:31", "description": "added fix for CVE-2009-2369\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 21, "published": "2009-07-23T00:00:00", "title": "Fedora 11 : wxGTK-2.8.10-2.fc11 (2009-7780)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "modified": "2009-07-23T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:wxGTK", "cpe:/o:fedoraproject:fedora:11"], "id": "FEDORA_2009-7780.NASL", "href": "https://www.tenable.com/plugins/nessus/40346", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-7780.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40346);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_bugtraq_id(35552);\n script_xref(name:\"FEDORA\", value:\"2009-7780\");\n\n script_name(english:\"Fedora 11 : wxGTK-2.8.10-2.fc11 (2009-7780)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"added fix for CVE-2009-2369\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=511279\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/026748.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bc9261f7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected wxGTK package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:wxGTK\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"wxGTK-2.8.10-2.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"wxGTK\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:07:31", "description": "Added rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2009-07-20T00:00:00", "title": "Fedora 11 : compat-wxGTK26-2.6.4-10.fc11 (2009-7755)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2369"], "modified": "2009-07-20T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:compat-wxGTK26", "cpe:/o:fedoraproject:fedora:11"], "id": "FEDORA_2009-7755.NASL", "href": "https://www.tenable.com/plugins/nessus/39861", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-7755.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(39861);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-2369\");\n script_bugtraq_id(35552);\n script_xref(name:\"FEDORA\", value:\"2009-7755\");\n\n script_name(english:\"Fedora 11 : compat-wxGTK26-2.6.4-10.fc11 (2009-7755)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Added rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=511279\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/026622.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?16851c90\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected compat-wxGTK26 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:compat-wxGTK26\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"compat-wxGTK26-2.6.4-10.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"compat-wxGTK26\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:07:31", "description": "The remote Fedora host is missing one or more security updates :\n\nmoin-1.8.4-2.fc11 :\n\nThis update removes the filemanager directory from the embedded\nFCKeditor, it contains code with know security vulnerabilities, even\nthough that code couldn't be invoked when Moin was used with the\ndefault settings. Moin was probably not affected, but installing this\nupdate is still recommended as a security measure. CVE-2009-2265 is\nthe related CVE identifier.\n\nwxGTK-2.8.10-2.fc10 :\n\nadded fix for CVE-2009-2369\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2009-07-20T00:00:00", "title": "Fedora 10 : wxGTK-2.8.10-2.fc10 / Fedora 11 : moin-1.8.4-2.fc11 (2009-7794)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2265", "CVE-2009-2369"], "modified": "2009-07-20T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:10", "p-cpe:/a:fedoraproject:fedora:wxGTK", "p-cpe:/a:fedoraproject:fedora:moin", "cpe:/o:fedoraproject:fedora:11"], "id": "FEDORA_2009-7794.NASL", "href": "https://www.tenable.com/plugins/nessus/39866", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-7794.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(39866);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-2265\");\n script_bugtraq_id(31812, 35552);\n script_xref(name:\"FEDORA\", value:\"2009-7794\");\n\n script_name(english:\"Fedora 10 : wxGTK-2.8.10-2.fc10 / Fedora 11 : moin-1.8.4-2.fc11 (2009-7794)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote Fedora host is missing one or more security updates :\n\nmoin-1.8.4-2.fc11 :\n\nThis update removes the filemanager directory from the embedded\nFCKeditor, it contains code with know security vulnerabilities, even\nthough that code couldn't be invoked when Moin was used with the\ndefault settings. Moin was probably not affected, but installing this\nupdate is still recommended as a security measure. CVE-2009-2265 is\nthe related CVE identifier.\n\nwxGTK-2.8.10-2.fc10 :\n\nadded fix for CVE-2009-2369\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=509924\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=511279\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/026679.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1f0cacb5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/026815.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bdc90a82\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected moin and / or wxGTK packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'ColdFusion 8.0.1 Arbitrary File Upload and Execute');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(22);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:moin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:wxGTK\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(10|11)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x / 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"wxGTK-2.8.10-2.fc10\")) flag++;\n\nif (rpm_check(release:\"FC11\", reference:\"moin-1.8.4-2.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"moin / wxGTK\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:07:31", "description": "The remote Fedora host is missing one or more security updates :\n\ncompat-wxGTK26-2.6.4-10.fc10 :\n\nAdded rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\n\nmingw32-libtiff-3.8.2-17.fc11 :\n\n - update upstream URL - Fix some more LZW decoding\n vulnerabilities (CVE-2009-2285)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2009-07-20T00:00:00", "title": "Fedora 10 : compat-wxGTK26-2.6.4-10.fc10 / Fedora 11 : mingw32-libtiff-3.8.2-17.fc11 (2009-7763)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-2285", "CVE-2009-2369"], "modified": "2009-07-20T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:10", "p-cpe:/a:fedoraproject:fedora:compat-wxGTK26", "p-cpe:/a:fedoraproject:fedora:mingw32-libtiff", "cpe:/o:fedoraproject:fedora:11"], "id": "FEDORA_2009-7763.NASL", "href": "https://www.tenable.com/plugins/nessus/39863", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-7763.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(39863);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-2285\", \"CVE-2009-2369\");\n script_bugtraq_id(35552);\n script_xref(name:\"FEDORA\", value:\"2009-7763\");\n\n script_name(english:\"Fedora 10 : compat-wxGTK26-2.6.4-10.fc10 / Fedora 11 : mingw32-libtiff-3.8.2-17.fc11 (2009-7763)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote Fedora host is missing one or more security updates :\n\ncompat-wxGTK26-2.6.4-10.fc10 :\n\nAdded rediffed fix for CVE-2009-2369 as found in wxGTK 2.8.10\n\nmingw32-libtiff-3.8.2-17.fc11 :\n\n - update upstream URL - Fix some more LZW decoding\n vulnerabilities (CVE-2009-2285)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=511015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=511279\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/026641.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?67c3ffc0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/026643.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?078bba32\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected compat-wxGTK26 and / or mingw32-libtiff packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:compat-wxGTK26\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mingw32-libtiff\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/07/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^(10|11)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x / 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"compat-wxGTK26-2.6.4-10.fc10\")) flag++;\n\nif (rpm_check(release:\"FC11\", reference:\"mingw32-libtiff-3.8.2-17.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"compat-wxGTK26 / mingw32-libtiff\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}