ID SUSE_SA_2007_025.NASL
Type nessus
Reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
Modified 2007-06-04T00:00:00
Description
The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:025
#
if ( ! defined_func("bn_random") ) exit(0);
include("compat.inc");
if(description)
{
script_id(25414);
script_version ("1.9");
name["english"] = "SUSE-SA:2007:025: krb5";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5)." );
script_set_attribute(attribute:"solution", value:
"http://www.novell.com/linux/security/advisories/2007_25_krb5.html" );
script_set_attribute(attribute:"risk_factor", value:"High" );
script_set_attribute(attribute:"plugin_publication_date", value: "2007/06/04");
script_end_attributes();
summary["english"] = "Check for the version of the krb5 package";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
family["english"] = "SuSE Local Security Checks";
script_family(english:family["english"]);
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/SuSE/rpm-list");
exit(0);
}
include("rpm.inc");
if ( rpm_check( reference:"krb5-1.4.1-5.5", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-apps-servers-1.4.1-5.5", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-devel-1.4.1-5.5", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-server-1.4.1-5.5", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-1.4-16.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-apps-servers-1.4-16.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-devel-1.4-16.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"krb5-server-1.4-16.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
{"id": "SUSE_SA_2007_025.NASL", "bulletinFamily": "scanner", "title": "SUSE-SA:2007:025: krb5", "description": "The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).", "published": "2007-06-04T00:00:00", "modified": "2007-06-04T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/25414", "reporter": "This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.", "references": [], "cvelist": [], "type": "nessus", "lastseen": "2019-10-28T21:22:08", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).", "edition": 2, "enchantments": {"dependencies": {"modified": "2018-08-02T08:03:57", "references": []}, "score": {"modified": "2018-08-02T08:03:57", "value": -0.0, "vector": "NONE"}}, "hash": "3b25886082cf9d7f9bda3908b1ad241e2fda82a8a976a22095fd76eef2a2e1c1", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "62ceef3c888a65e3fa3be13abd7458ff", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dedacf1615c66d5fcd7126df8cbefb46", "key": "pluginID"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "45497716ef5c6abf41bf37788cdd1ca5", "key": "title"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "modified"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "f729924e01c995c22e76d2f64eb16c09", "key": "href"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "published"}, {"hash": "e770cc1a2b169b71158db245d9840b2a", "key": "sourceData"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=25414", "id": "SUSE_SA_2007_025.NASL", "lastseen": "2018-08-02T08:03:57", "modified": "2007-06-04T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.3", "pluginID": "25414", "published": "2007-06-04T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:025\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(25414);\n script_version (\"1.6\");\n \n name[\"english\"] = \"SUSE-SA:2007:025: krb5\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.novell.com/linux/security/advisories/2007_25_krb5.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/06/04\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the krb5 package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"krb5-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-apps-servers-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-devel-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-server-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-apps-servers-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-devel-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-server-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "title": "SUSE-SA:2007:025: krb5", "type": "nessus", "viewCount": 0}, "differentElements": ["reporter", "sourceData", "href"], "edition": 2, "lastseen": "2018-08-02T08:03:57"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).", "edition": 1, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}}, "hash": "502caa7f3d986796c1d18be0fd2f3d5e1797e16dbe6580c658f855ee4bea3f17", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "62ceef3c888a65e3fa3be13abd7458ff", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dedacf1615c66d5fcd7126df8cbefb46", "key": "pluginID"}, {"hash": "9942f63e378343c96045f46509b80b9b", "key": "sourceData"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "45497716ef5c6abf41bf37788cdd1ca5", "key": "title"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "modified"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "f729924e01c995c22e76d2f64eb16c09", "key": "href"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=25414", "id": "SUSE_SA_2007_025.NASL", "lastseen": "2016-09-26T17:25:12", "modified": "2007-06-04T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.2", "pluginID": "25414", "published": "2007-06-04T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:025\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(25414);\n script_version (\"$Revision: 1.5 $\");\n \n name[\"english\"] = \"SUSE-SA:2007:025: krb5\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.novell.com/linux/security/advisories/2007_25_krb5.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/06/04\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the krb5 package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2007-2010 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"krb5-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-apps-servers-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-devel-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-server-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-apps-servers-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-devel-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-server-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "title": "SUSE-SA:2007:025: krb5", "type": "nessus", "viewCount": 0}, "differentElements": ["sourceData"], "edition": 1, "lastseen": "2016-09-26T17:25:12"}], "edition": 3, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "62ceef3c888a65e3fa3be13abd7458ff"}, {"key": "href", "hash": "c9ea83b54483fbde8f653108bae27f9c"}, {"key": "modified", "hash": "6d5585d86e942a264b3de9e85b76bf52"}, {"key": "naslFamily", "hash": "71a40666da62ba38d22539c8277870c7"}, {"key": "pluginID", "hash": "dedacf1615c66d5fcd7126df8cbefb46"}, {"key": "published", "hash": "6d5585d86e942a264b3de9e85b76bf52"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "b6bb6e87c49273664b08b5039cd37f22"}, {"key": "sourceData", "hash": "5842f0451a791f64c326bb867f598e3b"}, {"key": "title", "hash": "45497716ef5c6abf41bf37788cdd1ca5"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "0f1db3054c773a55339ffa1f2546f8d464969d602851bce3a78a029cb992b35a", "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2019-10-28T21:22:08"}, "score": {"value": -0.0, "vector": "NONE", "modified": "2019-10-28T21:22:08"}, "vulnersScore": -0.0}, "objectVersion": "1.3", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:025\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(25414);\n script_version (\"1.9\");\n \n name[\"english\"] = \"SUSE-SA:2007:025: krb5\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2007:025 (krb5).\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.novell.com/linux/security/advisories/2007_25_krb5.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/06/04\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the krb5 package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"krb5-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-apps-servers-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-devel-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-server-1.4.1-5.5\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-apps-servers-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-devel-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"krb5-server-1.4-16.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "25414", "cpe": [], "scheme": null}
{}