Lucene search

K

Mandriva Update for drakconf MDVA-2010:068 (drakconf)

πŸ—“οΈΒ 19 Feb 2010Β 00:00:00Reported byΒ Copyright (c) 2010 Greenbone Networks GmbHTypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 35Β Views

Mandriva Update for drakconf MDVA-2010:068 (drakconf) provides extended maintenance access support to drakconf. Packages for 2008.0 are available for Corporate Desktop 2008.0 customers and official 2008.0 updates

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
F5 Networks
SOL12156 - PHP xmlrpc vulnerability - CVE-2010-0397
14 Oct 201000:00
–f5
F5 Networks
K12156 : PHP xmlrpc vulnerability - CVE-2010-0397
3 Jul 201300:00
–f5
securityvulns
[SECURITY] [DSA-2018-1] New php5 packages fix null pointer dereference
21 Mar 201000:00
–securityvulns
securityvulns
PHP DoS
21 Mar 201000:00
–securityvulns
securityvulns
[USN-989-1] PHP vulnerabilities
27 Sep 201000:00
–securityvulns
securityvulns
About the security content of Mac OS X v10.6.5 and Security Update 2010-007
18 Nov 201000:00
–securityvulns
Veracode
Denial Of Service (DoS)
10 Apr 202000:53
–veracode
NVD
CVE-2010-0397
16 Mar 201019:30
–nvd
UbuntuCve
CVE-2010-0397
16 Mar 201000:00
–ubuntucve
OpenVAS
Debian: Security Advisory (DSA-2018-1)
8 Mar 202300:00
–openvas
Rows per page
###############################################################################
# OpenVAS Vulnerability Test
#
# Mandriva Update for drakconf MDVA-2010:068 (drakconf)
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

include("revisions-lib.inc");
tag_insight = "The new drakconf packages adds extended maintenance access support
  to drakconf.

  Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers
  as well as for official 2008.0 updates.";

tag_affected = "drakconf on Mandriva Linux 2008.0,
  Mandriva Linux 2008.0/X86_64,
  Mandriva Linux 2009.0,
  Mandriva Linux 2009.0/X86_64,
  Mandriva Linux 2010.0,
  Mandriva Linux 2010.0/X86_64";
tag_solution = "Please Install the Updated Packages.";



if(description)
{
  script_xref(name : "URL" , value : "http://lists.mandriva.com/security-announce/2010-02/msg00029.php");
  script_oid("1.3.6.1.4.1.25623.1.0.830881");
  script_version("$Revision: 8447 $");
  script_cve_id("CVE-2010-0397");
  script_tag(name:"last_modification", value:"$Date: 2018-01-17 17:12:19 +0100 (Wed, 17 Jan 2018) $");
  script_tag(name:"creation_date", value:"2010-02-19 13:38:15 +0100 (Fri, 19 Feb 2010)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_xref(name: "MDVA", value: "2010:068");
  script_name("Mandriva Update for drakconf MDVA-2010:068 (drakconf)");

  script_tag(name: "summary" , value: "Check for the Version of drakconf");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (c) 2010 Greenbone Networks GmbH");
  script_family("Mandrake Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/mandriva_mandrake_linux", "ssh/login/release");
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}


include("pkg-lib-rpm.inc");

release = get_kb_item("ssh/login/release");


res = "";
if(release == NULL){
  exit(0);
}

if(release == "MNDK_2008.0")
{

  if ((res = isrpmvuln(pkg:"drakconf", rpm:"drakconf~10.11.4~1.1mdv2008.0", rls:"MNDK_2008.0")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"drakconf-icons", rpm:"drakconf-icons~10.11.4~1.1mdv2008.0", rls:"MNDK_2008.0")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}


if(release == "MNDK_2010.0")
{

  if ((res = isrpmvuln(pkg:"drakconf", rpm:"drakconf~12.18.3~1.1mdv2010.0", rls:"MNDK_2010.0")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"drakconf-icons", rpm:"drakconf-icons~12.18.3~1.1mdv2010.0", rls:"MNDK_2010.0")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}


if(release == "MNDK_2009.0")
{

  if ((res = isrpmvuln(pkg:"drakconf", rpm:"drakconf~11.9.3~1.1mdv2009.0", rls:"MNDK_2009.0")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"drakconf-icons", rpm:"drakconf-icons~11.9.3~1.1mdv2009.0", rls:"MNDK_2009.0")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99); # Not vulnerable.
  exit(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
19 Feb 2010 00:00Current
9.6High risk
Vulners AI Score9.6
EPSS0.06042
35
.json
Report