Fedora Update for kdebase-runtime FEDORA-2011-5200
2011-04-22T00:00:00
ID OPENVAS:1361412562310863043 Type openvas Reporter Copyright (c) 2011 Greenbone Networks GmbH Modified 2019-03-15T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for kdebase-runtime FEDORA-2011-5200
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_xref(name:"URL", value:"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058666.html");
script_oid("1.3.6.1.4.1.25623.1.0.863043");
script_version("$Revision: 14223 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $");
script_tag(name:"creation_date", value:"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_xref(name:"FEDORA", value:"2011-5200");
script_cve_id("CVE-2011-1168");
script_name("Fedora Update for kdebase-runtime FEDORA-2011-5200");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kdebase-runtime'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC14");
script_tag(name:"affected", value:"kdebase-runtime on Fedora 14");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "FC14")
{
if ((res = isrpmvuln(pkg:"kdebase-runtime", rpm:"kdebase-runtime~4.6.2~1.fc14", rls:"FC14")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310863043", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for kdebase-runtime FEDORA-2011-5200", "description": "The remote host is missing an update for the ", "published": "2011-04-22T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863043", "reporter": "Copyright (c) 2011 Greenbone Networks GmbH", "references": ["http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058666.html", "2011-5200"], "cvelist": ["CVE-2011-1168"], "lastseen": "2019-05-29T18:39:55", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-1168", "CVE-2011-5200"]}, {"type": "slackware", "idList": ["SSA-2011-101-02"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:100326"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11606"]}, {"type": "openvas", "idList": ["OPENVAS:863004", "OPENVAS:1361412562310863021", "OPENVAS:1361412562310863007", "OPENVAS:863036", "OPENVAS:863012", "OPENVAS:863001", "OPENVAS:1361412562310863018", "OPENVAS:1361412562310863014", "OPENVAS:1361412562310863011", "OPENVAS:863028"]}, {"type": "fedora", "idList": ["FEDORA:70190110967", "FEDORA:02F18110AE4", "FEDORA:B3D131108FC", "FEDORA:D266C110A49", "FEDORA:CB3F3110A31", "FEDORA:D645A110A62", "FEDORA:EBF8B110894", "FEDORA:D99FC110A7E", "FEDORA:DDA2C110A83", "FEDORA:E74B0110ABE"]}, {"type": "nessus", "idList": ["FEDORA_2011-5200.NASL", "SUSE_11_3_KDELIBS4-110418.NASL", "SUSE_11_4_KDELIBS4-110418.NASL", "SUSE_11_2_KDELIBS4-110418.NASL", "SUSE_11_KDELIBS4-110418.NASL", "FEDORA_2011-5221.NASL"]}], "modified": "2019-05-29T18:39:55", "rev": 2}, "score": {"value": 5.8, "vector": "NONE", "modified": "2019-05-29T18:39:55", "rev": 2}, "vulnersScore": 5.8}, "pluginID": "1361412562310863043", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdebase-runtime FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058666.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863043\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for kdebase-runtime FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdebase-runtime'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"kdebase-runtime on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdebase-runtime\", rpm:\"kdebase-runtime~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2020-10-03T11:39:25", "description": "Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through 4.6.1 allows remote attackers to inject arbitrary web script or HTML via the URI in a URL corresponding to an unavailable web site.", "edition": 3, "cvss3": {}, "published": "2011-04-18T18:55:00", "title": "CVE-2011-1168", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-1168"], "modified": "2018-10-09T19:30:00", "cpe": ["cpe:/a:kde:kde_sc:4.4.1", "cpe:/a:kde:kde_sc:4.5.1", "cpe:/a:kde:kde_sc:4.4.2", "cpe:/a:kde:kde_sc:4.4.3", "cpe:/a:kde:kde_sc:4.6.1", "cpe:/a:kde:kde_sc:4.5.4", "cpe:/a:kde:kde_sc:4.4.4", "cpe:/a:kde:kde_sc:4.5.3", "cpe:/a:kde:kde_sc:4.6", "cpe:/a:kde:kde_sc:4.5.0", "cpe:/a:kde:kde_sc:4.4.0", "cpe:/a:kde:kde_sc:4.5.2", "cpe:/a:kde:kde_sc:4.4.5", "cpe:/a:kde:kde_sc:4.5.5", "cpe:/a:kde:kde_sc:4.6.0"], "id": "CVE-2011-1168", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1168", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kde_sc:4.5.1:*:*:*:*:*:*:*"]}], "packetstorm": [{"lastseen": "2016-12-05T22:19:55", "description": "", "published": "2011-04-12T00:00:00", "type": "packetstorm", "title": "Konqueror 4.4.x / 4.5.x / 4.6.x HTML Injection", "bulletinFamily": "exploit", "cvelist": ["CVE-2011-1168"], "modified": "2011-04-12T00:00:00", "id": "PACKETSTORM:100326", "href": "https://packetstormsecurity.com/files/100326/Konqueror-4.4.x-4.5.x-4.6.x-HTML-Injection.html", "sourceData": "`-----BEGIN PGP SIGNED MESSAGE----- \nHash: SHA256 \n \nNth Dimension Security Advisory (NDSA20110321) \nDate: 21st March 2011 \nAuthor: Tim Brown <mailto:timb@nth-dimension.org.uk> \nURL: <http://www.nth-dimension.org.uk/> / <http://www.machine.org.uk/> \nProduct: Konqueror 4.4.x, 4.5.x, 4.6.x <http://konqueror.kde.org/> \nVendor: KDE <http://www.kde.org/> \nRisk: Medium \n \nSummary \n \nThe Konqueror web browser is vulnerable to HTML injection into the error \npages that are displayed when it fails to fetch the requested URL. This \ncould allow an arbitrary web site to be spoofed. \n \nAfter discussions with the vendor, CVE-2011-1168 was assigned to this \nvulnerability. \n \nTechnical Details \n \nKonqueror 4.4.x, 4.5.x and 4.6.x are affected by HTML injection which allows \nan arbitrary URL to be spoofed. Opening a fresh instance of Konqueror and \nentering the following URL causes the error page HTML to become corrupted: \n \nhttp://thisdomainwillnotresolveandrekonqerrorpagewillbeshownwithfullurlembedded.twitter.com/\"><h1>Test</h1> \n \nSince Konqueror fails to resolve the hostname it will then will display an \nerror message containing the requested URL including the HTML tags. \n \nIt is worth noting that Javascript execution does not appear to be possible \nin the context of the unresolvable hostname for two reasons. Firstly \nKonqueror disables Javascript within KHTMLPart::htmlError() (between the \ncalls to begin() and end() and secondly because the code executes in an \nempty domain preventing the cookies for the spoofed URL from being accessed. \nWhilst the first of these restrictions could be bypassed in a number of \nways (see below), no method has currently been identified to bypass the \nlatter to break Konqueror's same origin policy. \n \nIt was identified that the first restriction could be bypassed at least two \nways. Firstly a link can be injected with a URL in the form javascript:... \nand secondly an iframe can be injected with a source URL in the form \ndata:text/html,... In the first case, Konqueror only interprets the link \nat the point of clicking (after Javascript has been reenabled) whilst in \nthe latter, Konqueror does not disable Javascript during the parsing of the \nsource for this iframe (i.e. between the calls to begin() and end()). \n \nThe following URL demonstrates how HTML can be injected which both takes \ncontrol of the entire visible DOM by overriding the error page styles \nfor an arbitrary \"secure\" URL and then allows Javascript to be executed \nin the victims browser: \n \nhttps://secure.twitter.com/</title></head><body><style>body{margin: 10px 0; background:#C0DEED url(http://si0.twimg.com/sticky/error_pages/bg-clouds.png) repeat-x; color:%23333; font: 12px Lucida Grande, Arial, sans-serif; text-align:center};%23box {display: none}</style></div><br/><br/><br/><br/><br/><br/><br/><br/><br/><iframe width=25%25 height=180 frameBorder=0 src='data:text/html,<body style=\"background-color:transparent\"><img src=http://si0.twimg.com/sticky/error_pages/twitter_logo_header.png><a><form><p>Username: <input type=text></p><p>Password: <input type=password></p><input type=submit value=Login></form><script>alert(1)</script></body>'><div id=\"box\"> \n \nSolutions \n \nNth Dimension recommends that the vendor supplied patches should be applied. \n \nHistory \n \nOn 16th March 2011, Nth Dimension contacted the KDE security team to \nreport the described vulnerability. \n \nOn 17th March 2011, Harri Porten of KDE confirmed that he had recieved \nthe report and it had been escalated to Maksim Orlovich, a KDE developer \nworking on KHTML to determine the impact. \n \nNth Dimension worked with the Maksim to evaluate the full extent \nof the problem, particulary in relation to the bypass of the Javascript \nrestriction as any same origin policy implications and an interim patch \nwas produced. \n \nOn 18th March 2011, Nth Dimension contacted Josh Bressers on behalf of \nthe KDE security team to request a CVE for this vulnerability which was \nduely assigned. \n \nFollowing the assigment of a CVE for this issue, Nth Dimension and KDE \nliased to establish a date for final publication of the advisory and \npatches. \n \nCurrent \n \nAs of the 23rd March 2011, the state of the vulnerabilities is believed to \nbe as follows. A patch has been developed which it is believed successfully \nmitigates the final symptoms of this vulnerability. This patch has been \nported to 4.4.x, 4.5.x and 4.6.x branches of KDE and will be made available \nto distributions in due course. \n \nThanks \n \nNth Dimension would like to thank Maksim Orlovich and Jeff Mitchell of KDE \nand Josh Bressers of Redhat for the way they worked to resolve the issue. \n-----BEGIN PGP SIGNATURE----- \nVersion: GnuPG v1.4.11 (GNU/Linux) \n \niQIcBAEBCAAGBQJNiUQHAAoJEPJhpTVyySo7fmgP/Ak3XF7fMSjoJ+tJTb2ZwAl3 \n/6L94CTaDVS4GFhCwYjSQXajmPpUcEfkRYRyScg1ABrIDt1301s+tuA4CrR540k3 \n8eTPBSi/brbg+zsQHJZaubBanxOPV3gnZR9jBlTD3+1N1g7PZj1x3A97ijEcVDV+ \nwbWVVu2CAxrLAkpZMLebqztssPrLV87Q90JBPehJorKEx+kKVkPzyh1X/XoQC9Er \n4YLxlhc8NScATNqAci2r54mMbXKqmsXvRLA23rw299y/B1Qd0fkRtY/X72Wguedh \nO97X/aAvojJw61BQ/rzsq0otnjGQfYQUtRNAdhdoQ0Eh+v3mlea/3PFugXMjyxTr \nqNO5blYvoeJ409XpmzOXgpk5j8gfUPiOkVFcU0AgMa2e600tZjJ76BpNfmiq3m+e \ng94vHYLvu1koG7ZzuZIQHfbtK8WUfM8W+bXpkRqmsxH0a5AOYqTjbJtWdskIipvp \ngUhfQmpCazqkK7ym4IWe44N1mMx2EJX3gWXtw/LETk+S5QX+DdJOUI1igIbJVZT6 \nBpqGG6tVFdPyus8X6AjP+GyhgvZSnziiXqha6D9kvWusVCzYVsP9+56wvWSDIgCn \ndZM5eSJphEYVaEaX86tpulYOXyxLAjrYrldghX0AEcDmFk9d8qwfXG4N4xcOkSO5 \nrGKhyY/jLYu1iU4szvI3 \n=nbIX \n-----END PGP SIGNATURE----- \n`\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/100326/NDSA20110321.txt"}], "slackware": [{"lastseen": "2020-10-25T16:36:04", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "A new kdelibs package is available for Slackware 13.1 to fix a security issue.\n\n\nHere are the details from the Slackware 13.1 ChangeLog:\n\npatches/packages/kdelibs-4.4.3-i486-2_slack13.1.txz: Rebuilt.\n Patched CVE-2011-1168.\n For more information, see:\n http://www.kde.org/info/security/advisory-20110411-1.txt\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1168\n (* Security fix *)\n\nWhere to find the new package:\n\nHINT: Getting slow download speeds from ftp.slackware.com?\nGive slackware.osuosl.org a try. This is another primary FTP site\nfor Slackware that can be considerably faster than downloading\ndirectly from ftp.slackware.com.\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating additional FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/kdelibs-4.4.3-i486-2_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/kdelibs-4.4.3-x86_64-2_slack13.1.txz\n\n\nMD5 signatures:\n\nSlackware 13.1 package:\nf63e406339bcd61df6b2e972f6e60a15 kdelibs-4.4.3-i486-2_slack13.1.txz\n\nSlackware x86_64 13.1 package:\nc469e425ac93330cba15bd1fb2f34af2 kdelibs-4.4.3-x86_64-2_slack13.1.txz\n\n\nInstallation instructions:\n\nUpgrade the packages as root:\n > upgradepkg kdelibs-4.4.3-i486-2_slack13.1.txz", "modified": "2011-04-11T21:57:30", "published": "2011-04-11T21:57:30", "id": "SSA-2011-101-02", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.329727", "type": "slackware", "title": "[slackware-security] kdelibs", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:41", "bulletinFamily": "software", "cvelist": ["CVE-2011-1168"], "description": "Crossite scripting via error pages.", "edition": 1, "modified": "2011-04-19T00:00:00", "published": "2011-04-19T00:00:00", "id": "SECURITYVULNS:VULN:11606", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11606", "title": "KDE KHTML crossite scripting", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "The kdeadmin package includes administrative tools including: * kcron: systemsettings module for the cron task scheduler * ksystemlog: system log viewer * kuser: user manager ", "modified": "2011-04-21T05:29:37", "published": "2011-04-21T05:29:37", "id": "FEDORA:5FCBA1107A8", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 15 Update: kdeadmin-4.6.2-2.fc15", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "KDE bindings to non-C++ languages ", "modified": "2011-04-21T22:30:59", "published": "2011-04-21T22:30:59", "id": "FEDORA:D266C110A49", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: kdebindings-4.6.2-1.fc14", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "Qtpfsgui is a graphical program for assembling bracketed photos into High Dynamic Range (HDR) images. It also provides a number of tone-mapping operators for creating low dynamic range versions of HDR images. ", "modified": "2011-04-21T22:30:59", "published": "2011-04-21T22:30:59", "id": "FEDORA:02942110ACC", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: qtpfsgui-1.9.3-6.fc14", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "Libraries for KDE 4. ", "modified": "2011-04-19T19:28:33", "published": "2011-04-19T19:28:33", "id": "FEDORA:20B6111086D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 13 Update: kdelibs-4.5.5-2.fc13", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "Rawstudio is a highly specialized application for processing RAW images from digital cameras. It is not a fully featured image editing application. The RAW format is often recommended to get the best quality out of digital camera images. The format is specific to cameras and cannot be read by most image editing applications. Rawstudio makes it possible to read and manipulate RAW images, experiment with the controls to see how they affect the image, and finally export into JPEG, PNG or TIF format images from most digital cameras. ", "modified": "2011-04-21T22:30:59", "published": "2011-04-21T22:30:59", "id": "FEDORA:02AA9110ACE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: rawstudio-2.0-0.1.fc14.beta1.1", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "A collection of applications and tools used by developers, including: * cervisia: a CVS frontend * kate: advanced text editor * kcachegrind: a browser for data produced by profiling tools (e.g. cachegr ind) * kompare: diff tool * kuiviewer: displays designer's UI files * lokalize: computer-aided translation system focusing on productivity and performance * okteta: binary/hex editor * umbrello: UML modeller and UML diagram tool ", "modified": "2011-04-21T22:30:59", "published": "2011-04-21T22:30:59", "id": "FEDORA:DFEE9110A92", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: kdesdk-4.6.2-1.fc14", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "Graphics applications, including * gwenview (an image viewer) * kamera (digital camera support) * kcolorchooser (a color chooser) * kolourpaint4 (an easy-to-use paint program) * kruler (screen ruler and color measurement tool) * ksnapshot (screen capture utility) * okular (a document viewer) ", "modified": "2011-04-21T05:29:37", "published": "2011-04-21T05:29:37", "id": "FEDORA:74215110988", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 15 Update: kdegraphics-4.6.2-1.fc15", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "gipfel is a tool to find the names of mountains or points of interest on a picture. It uses a database containing names and GPS data. With the given viewpoint (the point from which the picture was taken) and two known mountains on the picture, it can compute all parameters needed to compute the positions of other mountains on the picture. gipfel can also generate (stitch) panorama images. ", "modified": "2011-04-21T22:30:59", "published": "2011-04-21T22:30:59", "id": "FEDORA:A5F14110894", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: gipfel-0.3.2-7.fc14", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "kdetoys includes: * amor: Amusing Misuse Of Resources put's comic figures above your windows * kteatime: makes sure your tea does not get too strong * ktux: Tux-in-a-Spaceship screen saver ", "modified": "2011-04-21T05:29:37", "published": "2011-04-21T05:29:37", "id": "FEDORA:818EE110A88", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 15 Update: kdetoys-4.6.2-1.fc15", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-1168"], "description": "Games for KDE 4, including: * bomber * bovo * granatier * kajongg * kapman * katomic * kblackbox * kblocks * kbounce * kbreakout * kdiamond * kfourinline * kgoldrunner * kigo * killbots * kiriki * kjumpingcube * klickety * klines * knetwalk * kolf * kollision * konquest * kreversi * ksame * kshisen * ksirk * ksnakeduel / ksnake * kspaceduel * ksquares * ksudoku * ktuberling * kubrick * lskat * naval battle * palapeli ", "modified": "2011-04-21T22:30:59", "published": "2011-04-21T22:30:59", "id": "FEDORA:D66E1110A71", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: kdegames-4.6.2-1.fc14", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:39:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310863030", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863030", "type": "openvas", "title": "Fedora Update for oxygen-icon-theme FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for oxygen-icon-theme FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058681.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863030\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for oxygen-icon-theme FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxygen-icon-theme'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"oxygen-icon-theme on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"oxygen-icon-theme\", rpm:\"oxygen-icon-theme~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310863016", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863016", "type": "openvas", "title": "Fedora Update for geeqie FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for geeqie FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058678.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863016\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for geeqie FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'geeqie'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"geeqie on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"geeqie\", rpm:\"geeqie~1.0~9.fc14.1\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310863005", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863005", "type": "openvas", "title": "Fedora Update for hugin FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for hugin FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058675.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863005\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for hugin FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'hugin'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"hugin on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"hugin\", rpm:\"hugin~2010.2.0~2.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310863028", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863028", "type": "openvas", "title": "Fedora Update for pyexiv2 FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for pyexiv2 FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058691.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863028\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for pyexiv2 FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'pyexiv2'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"pyexiv2 on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"pyexiv2\", rpm:\"pyexiv2~0.3.0~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-07-25T10:55:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "Check for the Version of kdebase", "modified": "2017-07-10T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:863015", "href": "http://plugins.openvas.org/nasl.php?oid=863015", "type": "openvas", "title": "Fedora Update for kdebase FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdebase FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdebase on Fedora 14\";\ntag_insight = \"Core applications for KDE 4.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058664.html\");\n script_id(863015);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for kdebase FEDORA-2011-5200\");\n\n script_summary(\"Check for the Version of kdebase\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdebase\", rpm:\"kdebase~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:40:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310863026", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863026", "type": "openvas", "title": "Fedora Update for kdeutils FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeutils FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058682.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863026\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for kdeutils FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdeutils'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"kdeutils on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeutils\", rpm:\"kdeutils~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2018-11-16T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310831379", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831379", "type": "openvas", "title": "Mandriva Update for kdelibs4 MDVSA-2011:075 (kdelibs4)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for kdelibs4 MDVSA-2011:075 (kdelibs4)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.mandriva.com/security-announce/2011-04/msg00020.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831379\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"MDVSA\", value:\"2011:075\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Mandriva Update for kdelibs4 MDVSA-2011:075 (kdelibs4)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdelibs4'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_(2010\\.1|2010\\.0|2009\\.0)\");\n script_tag(name:\"affected\", value:\"kdelibs4 on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\");\n script_tag(name:\"insight\", value:\"A vulnerability has been found and corrected in kdelibs4:\n\n Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError\n function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through\n 4.6.1 allows remote attackers to inject arbitrary web script or\n HTML via the URI in a URL corresponding to an unavailable web site\n (CVE-2011-1168).\n\n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. The updated packages have been patched to correct this issue.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdelibs4-core\", rpm:\"kdelibs4-core~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdelibs4-devel\", rpm:\"kdelibs4-devel~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkde3support4\", rpm:\"libkde3support4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdecore5\", rpm:\"libkdecore5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdefakes5\", rpm:\"libkdefakes5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdesu5\", rpm:\"libkdesu5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdeui5\", rpm:\"libkdeui5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdewebkit5\", rpm:\"libkdewebkit5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdnssd4\", rpm:\"libkdnssd4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkfile4\", rpm:\"libkfile4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkhtml5\", rpm:\"libkhtml5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkimproxy4\", rpm:\"libkimproxy4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkio5\", rpm:\"libkio5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjs4\", rpm:\"libkjs4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjsapi4\", rpm:\"libkjsapi4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjsembed4\", rpm:\"libkjsembed4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkmediaplayer4\", rpm:\"libkmediaplayer4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknewstuff2_4\", rpm:\"libknewstuff2_4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknewstuff34\", rpm:\"libknewstuff34~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknotifyconfig4\", rpm:\"libknotifyconfig4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkntlm4\", rpm:\"libkntlm4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkparts4\", rpm:\"libkparts4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkpty4\", rpm:\"libkpty4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrosscore4\", rpm:\"libkrosscore4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrossui4\", rpm:\"libkrossui4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libktexteditor4\", rpm:\"libktexteditor4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkunitconversion4\", rpm:\"libkunitconversion4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkunittest4\", rpm:\"libkunittest4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkutils4\", rpm:\"libkutils4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnepomuk4\", rpm:\"libnepomuk4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnepomukquery4\", rpm:\"libnepomukquery4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libplasma3\", rpm:\"libplasma3~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsolid4\", rpm:\"libsolid4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libthreadweaver4\", rpm:\"libthreadweaver4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdelibs4\", rpm:\"kdelibs4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kde3support4\", rpm:\"lib64kde3support4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdecore5\", rpm:\"lib64kdecore5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdefakes5\", rpm:\"lib64kdefakes5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdesu5\", rpm:\"lib64kdesu5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdeui5\", rpm:\"lib64kdeui5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdewebkit5\", rpm:\"lib64kdewebkit5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdnssd4\", rpm:\"lib64kdnssd4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kfile4\", rpm:\"lib64kfile4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64khtml5\", rpm:\"lib64khtml5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kimproxy4\", rpm:\"lib64kimproxy4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kio5\", rpm:\"lib64kio5~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjs4\", rpm:\"lib64kjs4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjsapi4\", rpm:\"lib64kjsapi4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjsembed4\", rpm:\"lib64kjsembed4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kmediaplayer4\", rpm:\"lib64kmediaplayer4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knewstuff2_4\", rpm:\"lib64knewstuff2_4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knewstuff34\", rpm:\"lib64knewstuff34~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knotifyconfig4\", rpm:\"lib64knotifyconfig4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kntlm4\", rpm:\"lib64kntlm4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kparts4\", rpm:\"lib64kparts4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kpty4\", rpm:\"lib64kpty4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krosscore4\", rpm:\"lib64krosscore4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krossui4\", rpm:\"lib64krossui4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64ktexteditor4\", rpm:\"lib64ktexteditor4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kunitconversion4\", rpm:\"lib64kunitconversion4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kunittest4\", rpm:\"lib64kunittest4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kutils4\", rpm:\"lib64kutils4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nepomuk4\", rpm:\"lib64nepomuk4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nepomukquery4\", rpm:\"lib64nepomukquery4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64plasma3\", rpm:\"lib64plasma3~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64solid4\", rpm:\"lib64solid4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64threadweaver4\", rpm:\"lib64threadweaver4~4.4.5~0.3mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdelibs4-core\", rpm:\"kdelibs4-core~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdelibs4-devel\", rpm:\"kdelibs4-devel~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkde3support4\", rpm:\"libkde3support4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdecore5\", rpm:\"libkdecore5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdefakes5\", rpm:\"libkdefakes5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdesu5\", rpm:\"libkdesu5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdeui5\", rpm:\"libkdeui5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdnssd4\", rpm:\"libkdnssd4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkfile4\", rpm:\"libkfile4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkhtml5\", rpm:\"libkhtml5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkimproxy4\", rpm:\"libkimproxy4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkio5\", rpm:\"libkio5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjs4\", rpm:\"libkjs4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjsapi4\", rpm:\"libkjsapi4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjsembed4\", rpm:\"libkjsembed4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkmediaplayer4\", rpm:\"libkmediaplayer4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknewstuff2_4\", rpm:\"libknewstuff2_4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknotifyconfig4\", rpm:\"libknotifyconfig4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkntlm4\", rpm:\"libkntlm4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkparts4\", rpm:\"libkparts4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkpty4\", rpm:\"libkpty4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrosscore4\", rpm:\"libkrosscore4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrossui4\", rpm:\"libkrossui4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libktexteditor4\", rpm:\"libktexteditor4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkunittest4\", rpm:\"libkunittest4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkutils4\", rpm:\"libkutils4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnepomuk4\", rpm:\"libnepomuk4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libplasma3\", rpm:\"libplasma3~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsolid4\", rpm:\"libsolid4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libthreadweaver4\", rpm:\"libthreadweaver4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdelibs4\", rpm:\"kdelibs4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kde3support4\", rpm:\"lib64kde3support4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdecore5\", rpm:\"lib64kdecore5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdefakes5\", rpm:\"lib64kdefakes5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdesu5\", rpm:\"lib64kdesu5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdeui5\", rpm:\"lib64kdeui5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdnssd4\", rpm:\"lib64kdnssd4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kfile4\", rpm:\"lib64kfile4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64khtml5\", rpm:\"lib64khtml5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kimproxy4\", rpm:\"lib64kimproxy4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kio5\", rpm:\"lib64kio5~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjs4\", rpm:\"lib64kjs4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjsapi4\", rpm:\"lib64kjsapi4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjsembed4\", rpm:\"lib64kjsembed4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kmediaplayer4\", rpm:\"lib64kmediaplayer4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knewstuff2_4\", rpm:\"lib64knewstuff2_4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knotifyconfig4\", rpm:\"lib64knotifyconfig4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kntlm4\", rpm:\"lib64kntlm4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kparts4\", rpm:\"lib64kparts4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kpty4\", rpm:\"lib64kpty4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krosscore4\", rpm:\"lib64krosscore4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krossui4\", rpm:\"lib64krossui4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64ktexteditor4\", rpm:\"lib64ktexteditor4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kunittest4\", rpm:\"lib64kunittest4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kutils4\", rpm:\"lib64kutils4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nepomuk4\", rpm:\"lib64nepomuk4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64plasma3\", rpm:\"lib64plasma3~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64solid4\", rpm:\"lib64solid4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64threadweaver4\", rpm:\"lib64threadweaver4~4.3.5~0.27mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdelibs4-core\", rpm:\"kdelibs4-core~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdelibs4-devel\", rpm:\"kdelibs4-devel~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkde3support4\", rpm:\"libkde3support4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdecore5\", rpm:\"libkdecore5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdefakes5\", rpm:\"libkdefakes5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdesu5\", rpm:\"libkdesu5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdeui5\", rpm:\"libkdeui5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkdnssd4\", rpm:\"libkdnssd4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkfile4\", rpm:\"libkfile4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkhtml5\", rpm:\"libkhtml5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkimproxy4\", rpm:\"libkimproxy4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkio5\", rpm:\"libkio5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjs4\", rpm:\"libkjs4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjsapi4\", rpm:\"libkjsapi4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkjsembed4\", rpm:\"libkjsembed4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkmediaplayer4\", rpm:\"libkmediaplayer4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknewstuff2_4\", rpm:\"libknewstuff2_4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libknotifyconfig4\", rpm:\"libknotifyconfig4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkntlm4\", rpm:\"libkntlm4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkparts4\", rpm:\"libkparts4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkpty4\", rpm:\"libkpty4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrosscore4\", rpm:\"libkrosscore4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrossui4\", rpm:\"libkrossui4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libktexteditor4\", rpm:\"libktexteditor4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkunittest4\", rpm:\"libkunittest4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkutils4\", rpm:\"libkutils4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libnepomuk4\", rpm:\"libnepomuk4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libplasma3\", rpm:\"libplasma3~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsolid4\", rpm:\"libsolid4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libthreadweaver4\", rpm:\"libthreadweaver4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kdelibs4\", rpm:\"kdelibs4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kde3support4\", rpm:\"lib64kde3support4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdecore5\", rpm:\"lib64kdecore5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdefakes5\", rpm:\"lib64kdefakes5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdesu5\", rpm:\"lib64kdesu5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdeui5\", rpm:\"lib64kdeui5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kdnssd4\", rpm:\"lib64kdnssd4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kfile4\", rpm:\"lib64kfile4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64khtml5\", rpm:\"lib64khtml5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kimproxy4\", rpm:\"lib64kimproxy4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kio5\", rpm:\"lib64kio5~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjs4\", rpm:\"lib64kjs4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjsapi4\", rpm:\"lib64kjsapi4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kjsembed4\", rpm:\"lib64kjsembed4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kmediaplayer4\", rpm:\"lib64kmediaplayer4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knewstuff2_4\", rpm:\"lib64knewstuff2_4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64knotifyconfig4\", rpm:\"lib64knotifyconfig4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kntlm4\", rpm:\"lib64kntlm4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kparts4\", rpm:\"lib64kparts4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kpty4\", rpm:\"lib64kpty4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krosscore4\", rpm:\"lib64krosscore4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krossui4\", rpm:\"lib64krossui4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64ktexteditor4\", rpm:\"lib64ktexteditor4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kunittest4\", rpm:\"lib64kunittest4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64kutils4\", rpm:\"lib64kutils4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64nepomuk4\", rpm:\"lib64nepomuk4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64plasma3\", rpm:\"lib64plasma3~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64solid4\", rpm:\"lib64solid4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64threadweaver4\", rpm:\"lib64threadweaver4~4.2.4~0.4mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:1361412562310863015", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863015", "type": "openvas", "title": "Fedora Update for kdebase FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdebase FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058664.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863015\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for kdebase FEDORA-2011-5200\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdebase'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"kdebase on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdebase\", rpm:\"kdebase~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-07-25T10:55:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "Check for the Version of kdesdk", "modified": "2017-07-10T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:863045", "href": "http://plugins.openvas.org/nasl.php?oid=863045", "type": "openvas", "title": "Fedora Update for kdesdk FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdesdk FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdesdk on Fedora 14\";\ntag_insight = \"A collection of applications and tools used by developers, including:\n * cervisia: a CVS frontend\n * kate: advanced text editor\n * kcachegrind: a browser for data produced by profiling tools (e.g. cachegrind)\n * kompare: diff tool\n * kuiviewer: displays designer's UI files\n * lokalize: computer-aided translation system focusing on productivity and performance\n * okteta: binary/hex editor\n * umbrello: UML modeller and UML diagram tool\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058685.html\");\n script_id(863045);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for kdesdk FEDORA-2011-5200\");\n\n script_summary(\"Check for the Version of kdesdk\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdesdk\", rpm:\"kdesdk~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-25T10:55:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "description": "Check for the Version of kdeplasma-addons", "modified": "2017-07-10T00:00:00", "published": "2011-04-22T00:00:00", "id": "OPENVAS:863002", "href": "http://plugins.openvas.org/nasl.php?oid=863002", "type": "openvas", "title": "Fedora Update for kdeplasma-addons FEDORA-2011-5200", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdeplasma-addons FEDORA-2011-5200\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"kdeplasma-addons on Fedora 14\";\ntag_insight = \"Additional plasmoids for KDE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058676.html\");\n script_id(863002);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-04-22 16:44:44 +0200 (Fri, 22 Apr 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2011-5200\");\n script_cve_id(\"CVE-2011-1168\");\n script_name(\"Fedora Update for kdeplasma-addons FEDORA-2011-5200\");\n\n script_summary(\"Check for the Version of kdeplasma-addons\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdeplasma-addons\", rpm:\"kdeplasma-addons~4.6.2~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2021-01-12T10:09:32", "description": "This update is the second in a series of monthly stabilization updates\nto the 4.6 series. 4.6.2 brings many bugfixes and translation updates\non top of the latest edition in the 4.6 series and is a recommended\nupdate for everyone running 4.6.1 or earlier versions. See also:\nhttp://kde.org/announcements/announce-4.6.2.php\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2011-04-22T00:00:00", "title": "Fedora 15 : kde-l10n-4.6.2-1.fc15.1 / kdeaccessibility-4.6.2-1.fc15 / kdeadmin-4.6.2-2.fc15 / etc (2011-5221)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2011-04-22T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme", "p-cpe:/a:fedoraproject:fedora:kdetoys", "p-cpe:/a:fedoraproject:fedora:kdegames", "p-cpe:/a:fedoraproject:fedora:kdepimlibs", "p-cpe:/a:fedoraproject:fedora:kdeplasma-addons", "p-cpe:/a:fedoraproject:fedora:kdeedu", "p-cpe:/a:fedoraproject:fedora:kdemultimedia", "p-cpe:/a:fedoraproject:fedora:kdesdk", "p-cpe:/a:fedoraproject:fedora:kdeaccessibility", "p-cpe:/a:fedoraproject:fedora:kdebase", "p-cpe:/a:fedoraproject:fedora:kdenetwork", "p-cpe:/a:fedoraproject:fedora:kdelibs", "p-cpe:/a:fedoraproject:fedora:kdeadmin", "p-cpe:/a:fedoraproject:fedora:kdebase-workspace", "p-cpe:/a:fedoraproject:fedora:kdeutils", "cpe:/o:fedoraproject:fedora:15", "p-cpe:/a:fedoraproject:fedora:kdeartwork", "p-cpe:/a:fedoraproject:fedora:kde-l10n", "p-cpe:/a:fedoraproject:fedora:kdebase-runtime", "p-cpe:/a:fedoraproject:fedora:kdegraphics", "p-cpe:/a:fedoraproject:fedora:kdebindings"], "id": "FEDORA_2011-5221.NASL", "href": "https://www.tenable.com/plugins/nessus/53520", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-5221.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53520);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2011-1168\");\n script_bugtraq_id(47304);\n script_xref(name:\"FEDORA\", value:\"2011-5221\");\n\n script_name(english:\"Fedora 15 : kde-l10n-4.6.2-1.fc15.1 / kdeaccessibility-4.6.2-1.fc15 / kdeadmin-4.6.2-2.fc15 / etc (2011-5221)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update is the second in a series of monthly stabilization updates\nto the 4.6 series. 4.6.2 brings many bugfixes and translation updates\non top of the latest edition in the 4.6 series and is a recommended\nupdate for everyone running 4.6.1 or earlier versions. See also:\nhttp://kde.org/announcements/announce-4.6.2.php\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://kde.org/announcements/announce-4.6.2.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.kde.org/announcements/announce-4.6.2.php\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=695398\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058590.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?64727e05\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058591.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34961c79\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058592.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5d50cdd0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058593.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b876a992\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058594.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e8c6ac2b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058595.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?420a19f3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058596.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2045445e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058597.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fe65a561\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058598.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9102980b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058599.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?24e4ba54\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058600.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8db9e8d7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058601.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e47e477f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058602.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?902e3561\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058603.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a53d59de\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058604.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8bb1dfe2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058605.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cd01af66\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058606.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?264fe26b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058607.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ec5cb4a0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058608.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?486d2f8c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058609.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?65e4f831\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeaccessibility\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeartwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebase\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebase-runtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebase-workspace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebindings\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeedu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegames\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegraphics\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdelibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdemultimedia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdenetwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdepimlibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeplasma-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdesdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdetoys\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeutils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/04/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/04/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"kde-l10n-4.6.2-1.fc15.1\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdeaccessibility-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdeadmin-4.6.2-2.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdeartwork-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdebase-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdebase-runtime-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdebase-workspace-4.6.2-2.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdebindings-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdeedu-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdegames-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdegraphics-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdelibs-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdemultimedia-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdenetwork-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdepimlibs-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdeplasma-addons-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdesdk-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdetoys-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"kdeutils-4.6.2-1.fc15\")) flag++;\nif (rpm_check(release:\"FC15\", reference:\"oxygen-icon-theme-4.6.2-1.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kde-l10n / kdeaccessibility / kdeadmin / kdeartwork / kdebase / etc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T05:53:43", "description": "A XSS vulnerability in the way KHTML handles error pages has been\nfixed. CVE-2011-1168 has been assigned to this issue.", "edition": 23, "published": "2011-05-13T00:00:00", "title": "openSUSE Security Update : kdelibs4 (openSUSE-SU-2011:0480-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libkde4-devel", "p-cpe:/a:novell:opensuse:libkdecore4-devel", "p-cpe:/a:novell:opensuse:libkde4-32bit", "cpe:/o:novell:opensuse:11.2", "p-cpe:/a:novell:opensuse:libkdecore4-32bit", "p-cpe:/a:novell:opensuse:kdelibs4-core", "p-cpe:/a:novell:opensuse:kdelibs4-branding-upstream", "p-cpe:/a:novell:opensuse:libkde4", "p-cpe:/a:novell:opensuse:libkdecore4", "p-cpe:/a:novell:opensuse:kdelibs4"], "id": "SUSE_11_2_KDELIBS4-110418.NASL", "href": "https://www.tenable.com/plugins/nessus/53884", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update kdelibs4-4406.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(53884);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/10/25 13:36:40\");\n\n script_cve_id(\"CVE-2011-1168\");\n\n script_name(english:\"openSUSE Security Update : kdelibs4 (openSUSE-SU-2011:0480-1)\");\n script_summary(english:\"Check for the kdelibs4-4406 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A XSS vulnerability in the way KHTML handles error pages has been\nfixed. CVE-2011-1168 has been assigned to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=686652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-05/msg00026.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdelibs4 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kdelibs4-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kdelibs4-branding-upstream-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"kdelibs4-core-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libkde4-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libkde4-devel-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libkdecore4-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libkdecore4-devel-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", cpu:\"x86_64\", reference:\"libkde4-32bit-4.3.5-0.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", cpu:\"x86_64\", reference:\"libkdecore4-32bit-4.3.5-0.5.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdelibs4\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T10:09:31", "description": "This update is the second in a series of monthly stabilization updates\nto the 4.6 series. 4.6.2 brings many bugfixes and translation updates\non top of the latest edition in the 4.6 series and is a recommended\nupdate for everyone running 4.6.1 or earlier versions. See also:\nhttp://kde.org/announcements/announce-4.6.2.php\n\nAlso included is a new exiv2-0.21.x release, see:\nhttp://exiv2.org/whatsnew.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2011-04-22T00:00:00", "title": "Fedora 14 : darktable-0.8-7.fc14.1 / exiv2-0.21.1-1.fc14 / geeqie-1.0-9.fc14.1 / gipfel-0.3.2-7.fc14 / etc (2011-5200)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2011-04-22T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme", "p-cpe:/a:fedoraproject:fedora:kdetoys", "p-cpe:/a:fedoraproject:fedora:kphotoalbum", "p-cpe:/a:fedoraproject:fedora:kdegames", "p-cpe:/a:fedoraproject:fedora:darktable", "p-cpe:/a:fedoraproject:fedora:libgexiv2", "p-cpe:/a:fedoraproject:fedora:gpscorrelate", "p-cpe:/a:fedoraproject:fedora:immix", "p-cpe:/a:fedoraproject:fedora:ufraw", "p-cpe:/a:fedoraproject:fedora:kdepimlibs", "p-cpe:/a:fedoraproject:fedora:kdeplasma-addons", "p-cpe:/a:fedoraproject:fedora:kdeedu", "p-cpe:/a:fedoraproject:fedora:kdemultimedia", "p-cpe:/a:fedoraproject:fedora:kdesdk", "p-cpe:/a:fedoraproject:fedora:pyexiv2", "p-cpe:/a:fedoraproject:fedora:gthumb", "p-cpe:/a:fedoraproject:fedora:kdeaccessibility", "p-cpe:/a:fedoraproject:fedora:strigi", "p-cpe:/a:fedoraproject:fedora:kdebase", "p-cpe:/a:fedoraproject:fedora:kdenetwork", "p-cpe:/a:fedoraproject:fedora:kdelibs", "p-cpe:/a:fedoraproject:fedora:krename", "p-cpe:/a:fedoraproject:fedora:exiv2", "cpe:/o:fedoraproject:fedora:14", "p-cpe:/a:fedoraproject:fedora:kdeadmin", "p-cpe:/a:fedoraproject:fedora:gnome-commander", "p-cpe:/a:fedoraproject:fedora:kdebase-workspace", "p-cpe:/a:fedoraproject:fedora:hugin", "p-cpe:/a:fedoraproject:fedora:koffice", "p-cpe:/a:fedoraproject:fedora:merkaartor", "p-cpe:/a:fedoraproject:fedora:kdeutils", "p-cpe:/a:fedoraproject:fedora:rawstudio", "p-cpe:/a:fedoraproject:fedora:kdeartwork", "p-cpe:/a:fedoraproject:fedora:kde-l10n", "p-cpe:/a:fedoraproject:fedora:qtpfsgui", "p-cpe:/a:fedoraproject:fedora:gipfel", "p-cpe:/a:fedoraproject:fedora:geeqie", "p-cpe:/a:fedoraproject:fedora:libextractor", "p-cpe:/a:fedoraproject:fedora:kdebase-runtime", "p-cpe:/a:fedoraproject:fedora:kdegraphics", "p-cpe:/a:fedoraproject:fedora:shotwell", "p-cpe:/a:fedoraproject:fedora:kdebindings"], "id": "FEDORA_2011-5200.NASL", "href": "https://www.tenable.com/plugins/nessus/53519", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-5200.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53519);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2011-1168\");\n script_bugtraq_id(47304);\n script_xref(name:\"FEDORA\", value:\"2011-5200\");\n\n script_name(english:\"Fedora 14 : darktable-0.8-7.fc14.1 / exiv2-0.21.1-1.fc14 / geeqie-1.0-9.fc14.1 / gipfel-0.3.2-7.fc14 / etc (2011-5200)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update is the second in a series of monthly stabilization updates\nto the 4.6 series. 4.6.2 brings many bugfixes and translation updates\non top of the latest edition in the 4.6 series and is a recommended\nupdate for everyone running 4.6.1 or earlier versions. See also:\nhttp://kde.org/announcements/announce-4.6.2.php\n\nAlso included is a new exiv2-0.21.x release, see:\nhttp://exiv2.org/whatsnew.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://exiv2.org/whatsnew.html\"\n );\n # http://kde.org/announcements/announce-4.6.2.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.kde.org/announcements/announce-4.6.2.php\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=695398\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058659.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?996554bd\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058660.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?04deee3b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058661.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?34b0082a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058662.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?39774ff5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058663.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d88bc0d6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058664.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5b46347c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058665.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?334c8e15\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058666.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7a9e7265\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058667.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b179171e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058668.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0153dbae\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058669.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fe90356d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058670.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a3d6be03\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058671.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?80430da4\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058672.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?931a21f6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058673.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d04c9410\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058674.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?66abbf55\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058675.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?192117a3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058676.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3573b908\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058677.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dab15031\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058678.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7d107994\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058679.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0e12449f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058680.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?97df43a2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058681.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c008b398\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058682.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?31692b73\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058683.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2509af09\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058684.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9092685a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058685.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2155c5eb\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058686.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bd68d8a2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058687.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a77f359d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058688.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?355c594f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058689.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?57a4bb05\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058690.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4bd81d0c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058691.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?02b21af7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058692.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?671b3d96\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058693.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?640bc83a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058694.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0779f00b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058695.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?979b2d11\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058696.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?aa630147\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058697.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f003a56a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058698.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?024bcd3b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-April/058699.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?27dd45d9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:darktable\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:exiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:geeqie\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gipfel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gnome-commander\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gpscorrelate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gthumb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:hugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:immix\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeaccessibility\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeartwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebase\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebase-runtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebase-workspace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebindings\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeedu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegames\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegraphics\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdelibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdemultimedia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdenetwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdepimlibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeplasma-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdesdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdetoys\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeutils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:koffice\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kphotoalbum\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:krename\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libextractor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libgexiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:merkaartor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pyexiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qtpfsgui\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rawstudio\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:shotwell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:strigi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ufraw\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:14\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/04/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/04/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^14([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 14.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC14\", reference:\"darktable-0.8-7.fc14.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"exiv2-0.21.1-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"geeqie-1.0-9.fc14.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"gipfel-0.3.2-7.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"gnome-commander-1.2.8.10-1.fc14.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"gpscorrelate-1.6.1-3.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"gthumb-2.12.2-1.fc14.2\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"hugin-2010.2.0-2.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"immix-1.3.2-10.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kde-l10n-4.6.2-1.fc14.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdeaccessibility-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdeadmin-4.6.2-2.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdeartwork-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdebase-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdebase-runtime-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdebase-workspace-4.6.2-2.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdebindings-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdeedu-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdegames-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdegraphics-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdelibs-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdemultimedia-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdenetwork-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdepimlibs-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdeplasma-addons-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdesdk-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdetoys-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kdeutils-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"koffice-2.3.3-1.fc14.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"kphotoalbum-4.1.1-8.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"krename-4.0.7-2.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"libextractor-0.6.2-1402.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"libgexiv2-0.2.2-2.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"merkaartor-0.17.2-2.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"oxygen-icon-theme-4.6.2-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"pyexiv2-0.3.0-1.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"qtpfsgui-1.9.3-6.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"rawstudio-2.0-0.1.fc14.beta1.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"shotwell-0.8.1-3.fc14\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"strigi-0.7.2-5.fc14.1\")) flag++;\nif (rpm_check(release:\"FC14\", reference:\"ufraw-0.18-2.fc14.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"darktable / exiv2 / geeqie / gipfel / gnome-commander / etc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T05:56:25", "description": "A XSS vulnerability in the way KHTML handles error pages has been\nfixed. CVE-2011-1168 has been assigned to this issue.", "edition": 23, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : kdelibs4 (openSUSE-SU-2011:0480-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libkde4-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libksuseinstall1-debuginfo", "p-cpe:/a:novell:opensuse:libkdecore4-devel-debuginfo", "p-cpe:/a:novell:opensuse:kdelibs4-doc-debuginfo", "p-cpe:/a:novell:opensuse:libksuseinstall1-32bit", "p-cpe:/a:novell:opensuse:libkde4-devel", "p-cpe:/a:novell:opensuse:libkdecore4-debuginfo", "p-cpe:/a:novell:opensuse:libksuseinstall1-debuginfo-32bit", "cpe:/o:novell:opensuse:11.4", "p-cpe:/a:novell:opensuse:libkdecore4-devel", "p-cpe:/a:novell:opensuse:libkde4-32bit", "p-cpe:/a:novell:opensuse:libksuseinstall1", "p-cpe:/a:novell:opensuse:libkdecore4-32bit", "p-cpe:/a:novell:opensuse:kdelibs4-core-debuginfo", "p-cpe:/a:novell:opensuse:libkde4-debuginfo", "p-cpe:/a:novell:opensuse:kdelibs4-core", "p-cpe:/a:novell:opensuse:libkdecore4-debuginfo-32bit", "p-cpe:/a:novell:opensuse:kdelibs4-debuginfo", "p-cpe:/a:novell:opensuse:kdelibs4-branding-upstream", "p-cpe:/a:novell:opensuse:libksuseinstall-devel", "p-cpe:/a:novell:opensuse:kdelibs4-debugsource", "p-cpe:/a:novell:opensuse:libkde4", "p-cpe:/a:novell:opensuse:libkdecore4", "p-cpe:/a:novell:opensuse:kdelibs4"], "id": "SUSE_11_4_KDELIBS4-110418.NASL", "href": "https://www.tenable.com/plugins/nessus/75877", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update kdelibs4-4406.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75877);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/10/25 13:36:42\");\n\n script_cve_id(\"CVE-2011-1168\");\n\n script_name(english:\"openSUSE Security Update : kdelibs4 (openSUSE-SU-2011:0480-1)\");\n script_summary(english:\"Check for the kdelibs4-4406 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A XSS vulnerability in the way KHTML handles error pages has been\nfixed. CVE-2011-1168 has been assigned to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=686652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-05/msg00026.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdelibs4 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-core-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-doc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall1-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.4)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.4\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-branding-upstream-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-core-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-core-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-debugsource-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"kdelibs4-doc-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkde4-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkde4-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkde4-devel-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkdecore4-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkdecore4-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkdecore4-devel-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libkdecore4-devel-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libksuseinstall-devel-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libksuseinstall1-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"libksuseinstall1-debuginfo-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", cpu:\"x86_64\", reference:\"libkde4-32bit-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", cpu:\"x86_64\", reference:\"libkde4-debuginfo-32bit-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", cpu:\"x86_64\", reference:\"libkdecore4-32bit-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", cpu:\"x86_64\", reference:\"libkdecore4-debuginfo-32bit-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", cpu:\"x86_64\", reference:\"libksuseinstall1-32bit-4.6.0-6.15.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", cpu:\"x86_64\", reference:\"libksuseinstall1-debuginfo-32bit-4.6.0-6.15.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdelibs4\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T05:59:39", "description": "This update fixes a cross-site scripting (XSS) vulnerability in the\nway KHTML handles error pages. (CVE-2011-1168)", "edition": 22, "published": "2011-05-27T00:00:00", "title": "SuSE 11.1 Security Update : kdelibs4 (SAT Patch Number 4407)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:libkdecore4", "p-cpe:/a:novell:suse_linux:11:kdelibs4-core", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:libkde4", "p-cpe:/a:novell:suse_linux:11:libkdecore4-32bit", "p-cpe:/a:novell:suse_linux:11:libkde4-32bit", "p-cpe:/a:novell:suse_linux:11:kdelibs4-doc", "p-cpe:/a:novell:suse_linux:11:kdelibs4"], "id": "SUSE_11_KDELIBS4-110418.NASL", "href": "https://www.tenable.com/plugins/nessus/54840", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(54840);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/25 13:36:42\");\n\n script_cve_id(\"CVE-2011-1168\");\n\n script_name(english:\"SuSE 11.1 Security Update : kdelibs4 (SAT Patch Number 4407)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a cross-site scripting (XSS) vulnerability in the\nway KHTML handles error pages. (CVE-2011-1168)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=686652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-1168.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 4407.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:kdelibs4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:kdelibs4-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:kdelibs4-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libkde4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libkde4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libkdecore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libkdecore4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, \"SuSE 11.1\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"kdelibs4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"kdelibs4-core-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"libkde4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"i586\", reference:\"libkdecore4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"kdelibs4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"kdelibs4-core-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libkde4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libkde4-32bit-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libkdecore4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:1, cpu:\"x86_64\", reference:\"libkdecore4-32bit-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"kdelibs4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"kdelibs4-core-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"kdelibs4-doc-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"libkde4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"libkdecore4-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"s390x\", reference:\"libkde4-32bit-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"s390x\", reference:\"libkdecore4-32bit-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"x86_64\", reference:\"libkde4-32bit-4.3.5-0.6.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, cpu:\"x86_64\", reference:\"libkdecore4-32bit-4.3.5-0.6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T05:55:08", "description": "A XSS vulnerability in the way KHTML handles error pages has been\nfixed. CVE-2011-1168 has been assigned to this issue.", "edition": 23, "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : kdelibs4 (openSUSE-SU-2011:0480-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libksuseinstall1-32bit", "p-cpe:/a:novell:opensuse:libkde4-devel", "p-cpe:/a:novell:opensuse:libkdecore4-devel", "p-cpe:/a:novell:opensuse:libkde4-32bit", "p-cpe:/a:novell:opensuse:libksuseinstall1", "p-cpe:/a:novell:opensuse:libkdecore4-32bit", "p-cpe:/a:novell:opensuse:kdelibs4-core", "p-cpe:/a:novell:opensuse:kdelibs4-branding-upstream", "p-cpe:/a:novell:opensuse:libksuseinstall-devel", "p-cpe:/a:novell:opensuse:libkde4", "cpe:/o:novell:opensuse:11.3", "p-cpe:/a:novell:opensuse:libkdecore4", "p-cpe:/a:novell:opensuse:kdelibs4"], "id": "SUSE_11_3_KDELIBS4-110418.NASL", "href": "https://www.tenable.com/plugins/nessus/75546", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update kdelibs4-4406.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75546);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/10/25 13:36:41\");\n\n script_cve_id(\"CVE-2011-1168\");\n\n script_name(english:\"openSUSE Security Update : kdelibs4 (openSUSE-SU-2011:0480-1)\");\n script_summary(english:\"Check for the kdelibs4-4406 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A XSS vulnerability in the way KHTML handles error pages has been\nfixed. CVE-2011-1168 has been assigned to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=686652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-05/msg00026.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdelibs4 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-branding-upstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kdelibs4-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkde4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libkdecore4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libksuseinstall1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kdelibs4-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kdelibs4-branding-upstream-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"kdelibs4-core-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libkde4-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libkde4-devel-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libkdecore4-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libkdecore4-devel-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libksuseinstall-devel-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libksuseinstall1-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", cpu:\"x86_64\", reference:\"libkde4-32bit-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", cpu:\"x86_64\", reference:\"libkdecore4-32bit-4.4.4-3.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", cpu:\"x86_64\", reference:\"libksuseinstall1-32bit-4.4.4-3.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdelibs4\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-07T11:53:12", "description": "A vulnerability has been found and corrected in kdelibs4 :\n\nCross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError\nfunction in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through\n4.6.1 allows remote attackers to inject arbitrary web script or HTML\nvia the URI in a URL corresponding to an unavailable web site\n(CVE-2011-1168).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149 products_id=490\n\nThe updated packages have been patched to correct this issue.", "edition": 24, "published": "2011-04-21T00:00:00", "title": "Mandriva Linux Security Advisory : kdelibs4 (MDVSA-2011:075)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-1168"], "modified": "2011-04-21T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:libkdefakes5", "p-cpe:/a:mandriva:linux:libkjsapi4", "p-cpe:/a:mandriva:linux:lib64kdeui5", "p-cpe:/a:mandriva:linux:lib64kde3support4", "p-cpe:/a:mandriva:linux:libkdewebkit5", "p-cpe:/a:mandriva:linux:kdelibs4-core", "p-cpe:/a:mandriva:linux:lib64nepomuk4", "p-cpe:/a:mandriva:linux:libknotifyconfig4", "p-cpe:/a:mandriva:linux:lib64kio5", "p-cpe:/a:mandriva:linux:libkimproxy4", "p-cpe:/a:mandriva:linux:lib64kmediaplayer4", "p-cpe:/a:mandriva:linux:libplasma3", "p-cpe:/a:mandriva:linux:libkutils4", "p-cpe:/a:mandriva:linux:lib64knewstuff34", "p-cpe:/a:mandriva:linux:libkntlm4", "cpe:/o:mandriva:linux:2009.0", "p-cpe:/a:mandriva:linux:libthreadweaver4", "p-cpe:/a:mandriva:linux:lib64kfile4", "p-cpe:/a:mandriva:linux:lib64kdewebkit5", "p-cpe:/a:mandriva:linux:lib64kjsembed4", "p-cpe:/a:mandriva:linux:libkdesu5", "p-cpe:/a:mandriva:linux:lib64kimproxy4", "p-cpe:/a:mandriva:linux:lib64kdnssd4", "p-cpe:/a:mandriva:linux:libnepomukquery4", "p-cpe:/a:mandriva:linux:lib64threadweaver4", "p-cpe:/a:mandriva:linux:lib64kdefakes5", "p-cpe:/a:mandriva:linux:libkrosscore4", "p-cpe:/a:mandriva:linux:libkmediaplayer4", "p-cpe:/a:mandriva:linux:lib64kdesu5", "p-cpe:/a:mandriva:linux:libkjsembed4", "p-cpe:/a:mandriva:linux:libkunittest4", "p-cpe:/a:mandriva:linux:libkde3support4", "p-cpe:/a:mandriva:linux:libknewstuff34", "p-cpe:/a:mandriva:linux:libktexteditor4", "p-cpe:/a:mandriva:linux:kdelibs4-devel", "p-cpe:/a:mandriva:linux:lib64nepomukquery4", "p-cpe:/a:mandriva:linux:libnepomuk4", "p-cpe:/a:mandriva:linux:libkunitconversion4", "p-cpe:/a:mandriva:linux:libkjs4", "p-cpe:/a:mandriva:linux:libkpty4", "p-cpe:/a:mandriva:linux:lib64plasma3", "p-cpe:/a:mandriva:linux:lib64solid4", "cpe:/o:mandriva:linux:2010.1", "p-cpe:/a:mandriva:linux:lib64knotifyconfig4", "cpe:/o:mandriva:linux:2010.0", "p-cpe:/a:mandriva:linux:lib64kutils4", "p-cpe:/a:mandriva:linux:lib64kunittest4", "p-cpe:/a:mandriva:linux:lib64krosscore4", "p-cpe:/a:mandriva:linux:lib64khtml5", "p-cpe:/a:mandriva:linux:libkio5", "p-cpe:/a:mandriva:linux:lib64ktexteditor4", "p-cpe:/a:mandriva:linux:lib64kunitconversion4", "p-cpe:/a:mandriva:linux:libkrossui4", "p-cpe:/a:mandriva:linux:lib64kparts4", "p-cpe:/a:mandriva:linux:lib64knewstuff2_4", "p-cpe:/a:mandriva:linux:lib64kntlm4", "p-cpe:/a:mandriva:linux:libkdecore5", "p-cpe:/a:mandriva:linux:libkdeui5", "p-cpe:/a:mandriva:linux:libknewstuff2_4", "p-cpe:/a:mandriva:linux:libsolid4", "p-cpe:/a:mandriva:linux:libkparts4", "p-cpe:/a:mandriva:linux:lib64krossui4", "p-cpe:/a:mandriva:linux:libkhtml5", "p-cpe:/a:mandriva:linux:lib64kjsapi4", "p-cpe:/a:mandriva:linux:lib64kdecore5", "p-cpe:/a:mandriva:linux:lib64kjs4", "p-cpe:/a:mandriva:linux:lib64kpty4", "p-cpe:/a:mandriva:linux:libkfile4", "p-cpe:/a:mandriva:linux:libkdnssd4"], "id": "MANDRIVA_MDVSA-2011-075.NASL", "href": "https://www.tenable.com/plugins/nessus/53509", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2011:075. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53509);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-1168\");\n script_bugtraq_id(47304);\n script_xref(name:\"MDVSA\", value:\"2011:075\");\n\n script_name(english:\"Mandriva Linux Security Advisory : kdelibs4 (MDVSA-2011:075)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been found and corrected in kdelibs4 :\n\nCross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError\nfunction in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through\n4.6.1 allows remote attackers to inject arbitrary web script or HTML\nvia the URI in a URL corresponding to an unavailable web site\n(CVE-2011-1168).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149 products_id=490\n\nThe updated packages have been patched to correct this issue.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kdelibs4-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kdelibs4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kde3support4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kdecore5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kdefakes5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kdesu5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kdeui5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kdewebkit5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kdnssd4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kfile4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64khtml5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kimproxy4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kio5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kjs4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kjsapi4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kjsembed4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kmediaplayer4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64knewstuff2_4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64knewstuff34\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64knotifyconfig4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kntlm4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kparts4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kpty4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64krosscore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64krossui4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64ktexteditor4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kunitconversion4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kunittest4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64kutils4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64nepomuk4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64nepomukquery4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64plasma3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64solid4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64threadweaver4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkde3support4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkdecore5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkdefakes5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkdesu5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkdeui5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkdewebkit5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkdnssd4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkfile4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkhtml5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkimproxy4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkio5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkjs4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkjsapi4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkjsembed4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkmediaplayer4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libknewstuff2_4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libknewstuff34\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libknotifyconfig4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkntlm4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkparts4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkpty4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkrosscore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkrossui4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libktexteditor4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkunitconversion4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkunittest4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkutils4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libnepomuk4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libnepomukquery4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libplasma3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsolid4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libthreadweaver4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/04/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.0\", reference:\"kdelibs4-core-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"kdelibs4-devel-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kde3support4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kdecore5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kdefakes5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kdesu5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kdeui5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kdnssd4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kfile4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64khtml5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kimproxy4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kio5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kjs4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kjsapi4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kjsembed4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kmediaplayer4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64knewstuff2_4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64knotifyconfig4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kntlm4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kparts4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kpty4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64krosscore4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64krossui4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64ktexteditor4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kunittest4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64kutils4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64nepomuk4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64plasma3-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64solid4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64threadweaver4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkde3support4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkdecore5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkdefakes5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkdesu5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkdeui5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkdnssd4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkfile4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkhtml5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkimproxy4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkio5-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkjs4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkjsapi4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkjsembed4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkmediaplayer4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libknewstuff2_4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libknotifyconfig4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkntlm4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkparts4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkpty4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkrosscore4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkrossui4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libktexteditor4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkunittest4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libkutils4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libnepomuk4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libplasma3-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libsolid4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libthreadweaver4-4.2.4-0.4mdv2009.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.0\", reference:\"kdelibs4-core-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"kdelibs4-devel-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kde3support4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kdecore5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kdefakes5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kdesu5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kdeui5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kdnssd4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kfile4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64khtml5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kimproxy4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kio5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kjs4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kjsapi4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kjsembed4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kmediaplayer4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64knewstuff2_4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64knotifyconfig4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kntlm4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kparts4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kpty4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64krosscore4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64krossui4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64ktexteditor4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kunittest4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64kutils4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64nepomuk4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64plasma3-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64solid4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64threadweaver4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkde3support4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkdecore5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkdefakes5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkdesu5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkdeui5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkdnssd4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkfile4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkhtml5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkimproxy4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkio5-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkjs4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkjsapi4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkjsembed4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkmediaplayer4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libknewstuff2_4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libknotifyconfig4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkntlm4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkparts4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkpty4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkrosscore4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkrossui4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libktexteditor4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkunittest4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libkutils4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libnepomuk4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libplasma3-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libsolid4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libthreadweaver4-4.3.5-0.27mdv2010.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.1\", reference:\"kdelibs4-core-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"kdelibs4-devel-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kde3support4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kdecore5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kdefakes5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kdesu5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kdeui5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kdewebkit5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kdnssd4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kfile4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64khtml5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kimproxy4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kio5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kjs4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kjsapi4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kjsembed4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kmediaplayer4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64knewstuff2_4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64knewstuff34-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64knotifyconfig4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kntlm4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kparts4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kpty4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64krosscore4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64krossui4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64ktexteditor4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kunitconversion4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kunittest4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64kutils4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64nepomuk4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64nepomukquery4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64plasma3-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64solid4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64threadweaver4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkde3support4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkdecore5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkdefakes5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkdesu5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkdeui5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkdewebkit5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkdnssd4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkfile4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkhtml5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkimproxy4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkio5-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkjs4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkjsapi4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkjsembed4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkmediaplayer4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libknewstuff2_4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libknewstuff34-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libknotifyconfig4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkntlm4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkparts4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkpty4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkrosscore4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkrossui4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libktexteditor4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkunitconversion4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkunittest4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libkutils4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libnepomuk4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libnepomukquery4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libplasma3-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libsolid4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libthreadweaver4-4.4.5-0.3mdv2010.2\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}