Check for Solaris 9 patch 116462-0
Reporter | Title | Published | Views | Family All 67 |
---|---|---|---|---|
d2 | DSquare Exploit Pack: D2SEC_KRB5_TELNETD | 6 Apr 200701:19 | – | d2 |
Tenable Nessus | Kerberos telnet Crafted Username Remote Authentication Bypass | 5 Apr 200700:00 | – | nessus |
Tenable Nessus | Solaris 5.9 (x86) : 119796-04 | 6 Nov 200600:00 | – | nessus |
Tenable Nessus | SuSE 10 Security Update : krb5-apps-servers (ZYPP Patch Number 3022) | 13 Dec 200700:00 | – | nessus |
Tenable Nessus | Solaris 5.9 (sparc) : 119796-04 | 23 Apr 200900:00 | – | nessus |
Tenable Nessus | openSUSE 10 Security Update : krb5-apps-servers (krb5-apps-servers-3021) | 17 Oct 200700:00 | – | nessus |
Tenable Nessus | GLSA-200704-02 : MIT Kerberos 5: Arbitrary remote code execution | 5 Apr 200700:00 | – | nessus |
Tenable Nessus | CentOS 3 / 4 : krb5 (CESA-2007:0095) | 5 Apr 200700:00 | – | nessus |
Tenable Nessus | Mandrake Linux Security Advisory : krb5 (MDKSA-2007:077-1) | 5 Apr 200700:00 | – | nessus |
Tenable Nessus | RHEL 2.1 / 3 / 4 / 5 : krb5 (RHSA-2007:0095) | 5 Apr 200700:00 | – | nessus |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
getupdates | www.getupdates.oracle.com/readme/116462-06 |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text in this plugin was
# extracted from the Oracle SunOS Patch Updates.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(23517);
script_version("1.20");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2007-0956");
script_name(english:"Solaris 9 (sparc) : 116462-06");
script_summary(english:"Check for patch 116462-06");
script_set_attribute(
attribute:"synopsis",
value:"The remote host is missing Sun Security Patch number 116462-06"
);
script_set_attribute(
attribute:"description",
value:
"SEAM 1.0.2: patch for Solaris 9.
Date this patch was last updated by Sun : Apr/03/07"
);
script_set_attribute(
attribute:"see_also",
value:"https://getupdates.oracle.com/readme/116462-06"
);
script_set_attribute(
attribute:"solution",
value:"You should install this patch for your system to be up-to-date."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
script_set_attribute(attribute:"patch_publication_date", value:"2007/04/03");
script_set_attribute(attribute:"plugin_publication_date", value:"2006/11/06");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.");
script_family(english:"Solaris Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("solaris.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"116462-06", obsoleted_by:"", package:"SUNWkr5sv", version:"5.9.0,REV=2002.06.03.20.48") < 0) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report());
else security_hole(0);
exit(0);
}
audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo