ID SUSE_SA_2007_027.NASL
Type nessus
Reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
Modified 2007-06-04T00:00:00
Description
The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:027
#
if ( ! defined_func("bn_random") ) exit(0);
include("compat.inc");
if(description)
{
script_id(25416);
script_version ("1.9");
name["english"] = "SUSE-SA:2007:027: XFree86, Xorg";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg)." );
script_set_attribute(attribute:"solution", value:
"http://www.novell.com/linux/security/advisories/2007_27_x.html" );
script_set_attribute(attribute:"risk_factor", value:"High" );
script_set_attribute(attribute:"plugin_publication_date", value: "2007/06/04");
script_end_attributes();
summary["english"] = "Check for the version of the XFree86, Xorg package";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
family["english"] = "SuSE Local Security Checks";
script_family(english:family["english"]);
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/SuSE/rpm-list");
exit(0);
}
include("rpm.inc");
if ( rpm_check( reference:"xorg-x11-Xnest-6.8.2-100.12", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xprt-6.8.2-100.12", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xvfb-6.8.2-100.12", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xvnc-6.8.2-100.12", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-libs-6.8.2-100.12", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-server-6.8.2-100.12", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xnest-6.8.2-30.12", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xprt-6.8.2-30.12", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xvfb-6.8.2-30.12", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-Xvnc-6.8.2-30.12", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-libs-6.8.2-30.12", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xorg-x11-server-6.8.2-30.12", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
{"id": "SUSE_SA_2007_027.NASL", "bulletinFamily": "scanner", "title": "SUSE-SA:2007:027: XFree86, Xorg", "description": "The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).", "published": "2007-06-04T00:00:00", "modified": "2007-06-04T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/25416", "reporter": "This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.", "references": [], "cvelist": [], "type": "nessus", "lastseen": "2019-10-28T21:22:08", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).", "edition": 2, "enchantments": {"dependencies": {"modified": "2018-08-02T08:13:15", "references": []}, "score": {"modified": "2018-08-02T08:13:15", "value": -0.1, "vector": "NONE"}}, "hash": "3bd0d0853b17df55bf3291f33b2aae0547e5b8bac3c1eb5992d49dc9edb7c272", "hashmap": [{"hash": "ee3f932f0aa485882c6129a72954bdc8", "key": "description"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "a2ff4e17ba86c2a807d833a664484bbe", "key": "title"}, {"hash": "15566f6bebdf483f82d521a5f0cc763d", "key": "href"}, {"hash": "383a2a1e8e4bf855f4149671967161bb", "key": "pluginID"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "modified"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "7885e067e7958de5ad7403562cc7899a", "key": "sourceData"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=25416", "id": "SUSE_SA_2007_027.NASL", "lastseen": "2018-08-02T08:13:15", "modified": "2007-06-04T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.3", "pluginID": "25416", "published": "2007-06-04T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:027\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(25416);\n script_version (\"1.6\");\n \n name[\"english\"] = \"SUSE-SA:2007:027: XFree86, Xorg\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.novell.com/linux/security/advisories/2007_27_x.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/06/04\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the XFree86, Xorg package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"xorg-x11-Xnest-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xprt-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvfb-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvnc-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-libs-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-server-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xnest-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xprt-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvfb-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvnc-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-libs-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-server-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "title": "SUSE-SA:2007:027: XFree86, Xorg", "type": "nessus", "viewCount": 0}, "differentElements": ["reporter", "sourceData", "href"], "edition": 2, "lastseen": "2018-08-02T08:13:15"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).", "edition": 1, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}}, "hash": "1914a54e307b8a17bbab6959acc922ee80f811e5735ed1294e36475146993da7", "hashmap": [{"hash": "ee3f932f0aa485882c6129a72954bdc8", "key": "description"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "a2ff4e17ba86c2a807d833a664484bbe", "key": "title"}, {"hash": "15566f6bebdf483f82d521a5f0cc763d", "key": "href"}, {"hash": "383a2a1e8e4bf855f4149671967161bb", "key": "pluginID"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "modified"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "71a40666da62ba38d22539c8277870c7", "key": "naslFamily"}, {"hash": "6d5585d86e942a264b3de9e85b76bf52", "key": "published"}, {"hash": "31d9d176c79a394cdcb665c4dcb24139", "key": "sourceData"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=25416", "id": "SUSE_SA_2007_027.NASL", "lastseen": "2016-09-26T17:25:45", "modified": "2007-06-04T00:00:00", "naslFamily": "SuSE Local Security Checks", "objectVersion": "1.2", "pluginID": "25416", "published": "2007-06-04T00:00:00", "references": [], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:027\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(25416);\n script_version (\"$Revision: 1.5 $\");\n \n name[\"english\"] = \"SUSE-SA:2007:027: XFree86, Xorg\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.novell.com/linux/security/advisories/2007_27_x.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/06/04\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the XFree86, Xorg package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2007-2010 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"xorg-x11-Xnest-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xprt-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvfb-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvnc-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-libs-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-server-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xnest-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xprt-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvfb-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvnc-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-libs-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-server-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "title": "SUSE-SA:2007:027: XFree86, Xorg", "type": "nessus", "viewCount": 0}, "differentElements": ["sourceData"], "edition": 1, "lastseen": "2016-09-26T17:25:45"}], "edition": 3, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "ee3f932f0aa485882c6129a72954bdc8"}, {"key": "href", "hash": "02c03f808e1428e3375a4c9926926652"}, {"key": "modified", "hash": "6d5585d86e942a264b3de9e85b76bf52"}, {"key": "naslFamily", "hash": "71a40666da62ba38d22539c8277870c7"}, {"key": "pluginID", "hash": "383a2a1e8e4bf855f4149671967161bb"}, {"key": "published", "hash": "6d5585d86e942a264b3de9e85b76bf52"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "b6bb6e87c49273664b08b5039cd37f22"}, {"key": "sourceData", "hash": "0eb3a17f418c6d6b2d2fc4b1d4c0b624"}, {"key": "title", "hash": "a2ff4e17ba86c2a807d833a664484bbe"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "a825273ffc030fb59507ac1b25230dbdc4515750cca37b52ac47c7d8393c0241", "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2019-10-28T21:22:08"}, "score": {"value": -0.1, "vector": "NONE", "modified": "2019-10-28T21:22:08"}, "vulnersScore": -0.1}, "objectVersion": "1.3", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2007:027\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(25416);\n script_version (\"1.9\");\n \n name[\"english\"] = \"SUSE-SA:2007:027: XFree86, Xorg\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2007:027 (XFree86, Xorg).\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.novell.com/linux/security/advisories/2007_27_x.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/06/04\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the XFree86, Xorg package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"xorg-x11-Xnest-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xprt-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvfb-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvnc-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-libs-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-server-6.8.2-100.12\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xnest-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xprt-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvfb-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-Xvnc-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-libs-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xorg-x11-server-6.8.2-30.12\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "naslFamily": "SuSE Local Security Checks", "pluginID": "25416", "cpe": [], "scheme": null}
{}