Lucene search

K
nessusThis script is Copyright (C) 2004-2011 Tenable Network Security, Inc.REDHAT_FIXES.NASL
HistoryJul 06, 2004 - 12:00 a.m.

Red Hat Enterprise Linux fixes

2004-07-0600:00:00
This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.
www.tenable.com
65

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.655

Percentile

97.9%

This plugin writes in the knowledge base the CVE ids that we know Red Hat enterprise Linux is not vulnerable to.

#
# (C) Tenable Network Security, Inc.
#
#

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(12512);
 script_version ("$Revision: 1.11 $");
 script_cvs_date("$Date: 2011/11/03 18:08:43 $");
			
 script_name(english: "Red Hat Enterprise Linux fixes");
 
 script_set_attribute(attribute:"synopsis", value:
"The RedHat version have been identified." );
 script_set_attribute(attribute:"description", value:
"This plugin writes in the knowledge base the CVE ids that we know
Red Hat enterprise Linux is not vulnerable to." );
 script_set_attribute(attribute:"solution", value:
"N/A" );
 script_set_attribute(attribute:"risk_factor", value:"None" );

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/06");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 script_summary(english: "Fill the KB");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.");
 script_family(english: "Red Hat Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/RedHat/rpm-list");
 exit(0);
}


include("rpm.inc");


release = get_kb_item("Host/RedHat/release");
if ( ! release ) exit(0);
if ( egrep(pattern:"Red Hat Enterprise Linux.*release 3", string:release) )
{
 set_kb_item(name:"CVE-2000-0666", value:TRUE);
 set_kb_item(name:"CVE-2003-0020", value:TRUE);
 set_kb_item(name:"CVE-2003-0192", value:TRUE);
 set_kb_item(name:"CVE-2003-0252", value:TRUE);
 set_kb_item(name:"CVE-2003-0682", value:TRUE);
 set_kb_item(name:"CVE-2003-0693", value:TRUE);
 set_kb_item(name:"CVE-2003-0695", value:TRUE);
}


if ( egrep(pattern:"Red Hat.*(Enterprise|Advanced).*release 2\.1", string:release)) 
{
 set_kb_item(name:"CVE-2000-0666", value:TRUE);
 set_kb_item(name:"CVE-2003-0020", value:TRUE);
 set_kb_item(name:"CVE-2003-0192", value:TRUE);
}

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.655

Percentile

97.9%