ID OPENVAS:1361412562310865411 Type openvas Reporter Copyright (c) 2013 Greenbone Networks GmbH Modified 2019-03-15T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for ptlib FEDORA-2013-2998
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_xref(name:"URL", value:"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html");
script_oid("1.3.6.1.4.1.25623.1.0.865411");
script_version("$Revision: 14223 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $");
script_tag(name:"creation_date", value:"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)");
script_cve_id("CVE-2012-5621");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_xref(name:"FEDORA", value:"2013-2998");
script_name("Fedora Update for ptlib FEDORA-2013-2998");
script_tag(name:"summary", value:"The remote host is missing an update for the 'ptlib'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC18");
script_tag(name:"affected", value:"ptlib on Fedora 18");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "FC18")
{
if ((res = isrpmvuln(pkg:"ptlib", rpm:"ptlib~2.10.10~1.fc18", rls:"FC18")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310865411", "bulletinFamily": "scanner", "title": "Fedora Update for ptlib FEDORA-2013-2998", "description": "The remote host is missing an update for the ", "published": "2013-03-05T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865411", "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "references": ["2013-2998", "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"], "cvelist": ["CVE-2012-5621"], "type": "openvas", "lastseen": "2019-05-29T18:38:22", "history": [{"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2012-5621"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Check for the Version of ptlib", "edition": 1, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "b9f101077975055b2fd2fb7a48c724eaa622835110181550607002e609647e3f", "hashmap": [{"hash": "55139fc86ae5197178849c4826b43a41", "key": "references"}, {"hash": "714f76d42e909aea591715a0bf0d482d", "key": "description"}, {"hash": "20f9bd939f7407bd49241475ba57a99d", "key": "href"}, {"hash": "25ff2c85b3f16e34abd008c140321c41", "key": "cvelist"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "3c7707be146b41ec7ff94e1d26566508", "key": "pluginID"}, {"hash": "a241aea514fd2502e7f53782a9a12484", "key": "sourceData"}, {"hash": "1a99a5f9a50e5bac3b749d8558d5e46b", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "60319fd1e64a7735f3d2cc1055b7f9fb", "key": "published"}, {"hash": "5fdd130cacb94393e74f470bf361d761", "key": "title"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865411", "id": "OPENVAS:1361412562310865411", "lastseen": "2018-04-06T11:21:47", "modified": "2018-04-06T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310865411", "published": "2013-03-05T00:00:00", "references": ["2013-2998", "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"], "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PTLib (Portable Tools Library) is a moderately large class library that\n has it's genesis many years ago as PWLib (portable Windows Library), a\n method to product applications to run on both Microsoft Windows and Unix\n systems. It has also been ported to other systems such as Mac OSX, VxWorks\n and other embedded systems.\n\n It is supplied mainly to support the OPAL project, but that shouldn't stop\n you from using it in whatever project you have in mind if you so desire.\";\n\n\ntag_affected = \"ptlib on Fedora 18\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865411\");\n script_version(\"$Revision: 9353 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:14:20 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2998\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2998\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of ptlib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "title": "Fedora Update for ptlib FEDORA-2013-2998", "type": "openvas", "viewCount": 1}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2018-04-06T11:21:47"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2012-5621"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "Check for the Version of ptlib", "edition": 3, "enchantments": {"dependencies": {"modified": "2018-09-01T23:57:39", "references": [{"idList": ["EKIGA_4_0_0.NASL", "SOLARIS11_EKIGA_20130716.NASL", "FEDORA_2013-2998.NASL", "FEDORA_2013-2890.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:1361412562310865418", "OPENVAS:1361412562310865414", "OPENVAS:865422", "OPENVAS:1361412562310865412", "OPENVAS:865418", "OPENVAS:865411", "OPENVAS:865408", "OPENVAS:1361412562310865408", "OPENVAS:1361412562310865422", "OPENVAS:865414"], "type": "openvas"}, {"idList": ["CVE-2012-5621"], "type": "cve"}]}, "score": {"value": 7.5, "vector": "NONE"}}, "hash": "b9f101077975055b2fd2fb7a48c724eaa622835110181550607002e609647e3f", "hashmap": [{"hash": "55139fc86ae5197178849c4826b43a41", "key": "references"}, {"hash": "714f76d42e909aea591715a0bf0d482d", "key": "description"}, {"hash": "20f9bd939f7407bd49241475ba57a99d", "key": "href"}, {"hash": "25ff2c85b3f16e34abd008c140321c41", "key": "cvelist"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "3c7707be146b41ec7ff94e1d26566508", "key": "pluginID"}, {"hash": "a241aea514fd2502e7f53782a9a12484", "key": "sourceData"}, {"hash": "1a99a5f9a50e5bac3b749d8558d5e46b", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "60319fd1e64a7735f3d2cc1055b7f9fb", "key": "published"}, {"hash": "5fdd130cacb94393e74f470bf361d761", "key": "title"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865411", "id": "OPENVAS:1361412562310865411", "lastseen": "2018-09-01T23:57:39", "modified": "2018-04-06T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310865411", "published": "2013-03-05T00:00:00", "references": ["2013-2998", "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"], "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PTLib (Portable Tools Library) is a moderately large class library that\n has it's genesis many years ago as PWLib (portable Windows Library), a\n method to product applications to run on both Microsoft Windows and Unix\n systems. It has also been ported to other systems such as Mac OSX, VxWorks\n and other embedded systems.\n\n It is supplied mainly to support the OPAL project, but that shouldn't stop\n you from using it in whatever project you have in mind if you so desire.\";\n\n\ntag_affected = \"ptlib on Fedora 18\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865411\");\n script_version(\"$Revision: 9353 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:14:20 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2998\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2998\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of ptlib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "title": "Fedora Update for ptlib FEDORA-2013-2998", "type": "openvas", "viewCount": 1}, "differentElements": ["description", "modified", "sourceData"], "edition": 3, "lastseen": "2018-09-01T23:57:39"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2012-5621"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "The remote host is missing an update for the ", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-03-18T14:39:50", "references": [{"idList": ["OPENVAS:1361412562310865418", "OPENVAS:865412", "OPENVAS:1361412562310865414", "OPENVAS:865422", "OPENVAS:1361412562310865412", "OPENVAS:865418", "OPENVAS:865411", "OPENVAS:865408", "OPENVAS:1361412562310865408", "OPENVAS:1361412562310865422"], "type": "openvas"}, {"idList": ["EKIGA_4_0_0.NASL", "SOLARIS11_EKIGA_20130716.NASL", "FEDORA_2013-2998.NASL", "FEDORA_2013-2890.NASL"], "type": "nessus"}, {"idList": ["CVE-2012-5621"], "type": "cve"}]}, "score": {"value": 7.5, "vector": "NONE"}}, "hash": "68ab79161100c7cb243088c1a03f8ff81a709d4e045e85ec898e8cb5b4db5c0f", "hashmap": [{"hash": "55139fc86ae5197178849c4826b43a41", "key": "references"}, {"hash": "1693b96dcccf4fbcd463bf8baaa2bf3f", "key": "description"}, {"hash": "20f9bd939f7407bd49241475ba57a99d", "key": "href"}, {"hash": "25ff2c85b3f16e34abd008c140321c41", "key": "cvelist"}, {"hash": "252f141159dce5e6c49b346363b83c87", "key": "sourceData"}, {"hash": "3c7707be146b41ec7ff94e1d26566508", "key": "pluginID"}, {"hash": "1a99a5f9a50e5bac3b749d8558d5e46b", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "60319fd1e64a7735f3d2cc1055b7f9fb", "key": "published"}, {"hash": "5fdd130cacb94393e74f470bf361d761", "key": "title"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "4525bc09d1c4c408a417a5eb7b850972", "key": "modified"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865411", "id": "OPENVAS:1361412562310865411", "lastseen": "2019-03-18T14:39:50", "modified": "2019-03-15T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310865411", "published": "2013-03-05T00:00:00", "references": ["2013-2998", "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"], "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865411\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2998\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2998\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ptlib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n script_tag(name:\"affected\", value:\"ptlib on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "title": "Fedora Update for ptlib FEDORA-2013-2998", "type": "openvas", "viewCount": 1}, "differentElements": ["cvss"], "edition": 4, "lastseen": "2019-03-18T14:39:50"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2012-5621"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Check for the Version of ptlib", "edition": 2, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "03f2ab9114ff0facd0ff42db055d2cf8c168926d53bd6f10fbb3e1ec98221cd2", "hashmap": [{"hash": "55139fc86ae5197178849c4826b43a41", "key": "references"}, {"hash": "714f76d42e909aea591715a0bf0d482d", "key": "description"}, {"hash": "20f9bd939f7407bd49241475ba57a99d", "key": "href"}, {"hash": "25ff2c85b3f16e34abd008c140321c41", "key": "cvelist"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "3c7707be146b41ec7ff94e1d26566508", "key": "pluginID"}, {"hash": "a241aea514fd2502e7f53782a9a12484", "key": "sourceData"}, {"hash": "1a99a5f9a50e5bac3b749d8558d5e46b", "key": "reporter"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "60319fd1e64a7735f3d2cc1055b7f9fb", "key": "published"}, {"hash": "5fdd130cacb94393e74f470bf361d761", "key": "title"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865411", "id": "OPENVAS:1361412562310865411", "lastseen": "2018-08-30T19:25:08", "modified": "2018-04-06T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "1361412562310865411", "published": "2013-03-05T00:00:00", "references": ["2013-2998", "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html"], "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PTLib (Portable Tools Library) is a moderately large class library that\n has it's genesis many years ago as PWLib (portable Windows Library), a\n method to product applications to run on both Microsoft Windows and Unix\n systems. It has also been ported to other systems such as Mac OSX, VxWorks\n and other embedded systems.\n\n It is supplied mainly to support the OPAL project, but that shouldn't stop\n you from using it in whatever project you have in mind if you so desire.\";\n\n\ntag_affected = \"ptlib on Fedora 18\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865411\");\n script_version(\"$Revision: 9353 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:14:20 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2998\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2998\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of ptlib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "title": "Fedora Update for ptlib FEDORA-2013-2998", "type": "openvas", "viewCount": 1}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T19:25:08"}], "edition": 5, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "25ff2c85b3f16e34abd008c140321c41"}, {"key": "cvss", "hash": "41b62a8aa1ee5c40897717cadc30784a"}, {"key": "description", "hash": "1693b96dcccf4fbcd463bf8baaa2bf3f"}, {"key": "href", "hash": "20f9bd939f7407bd49241475ba57a99d"}, {"key": "modified", "hash": "4525bc09d1c4c408a417a5eb7b850972"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "3c7707be146b41ec7ff94e1d26566508"}, {"key": "published", "hash": "60319fd1e64a7735f3d2cc1055b7f9fb"}, {"key": "references", "hash": "55139fc86ae5197178849c4826b43a41"}, {"key": "reporter", "hash": "1a99a5f9a50e5bac3b749d8558d5e46b"}, {"key": "sourceData", "hash": "252f141159dce5e6c49b346363b83c87"}, {"key": "title", "hash": "5fdd130cacb94393e74f470bf361d761"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "8627acf554d617269eb1d915796c73799d0642e29139b0e36a437bf184f915c2", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-5621"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310865422", "OPENVAS:1361412562310865412", "OPENVAS:865411", "OPENVAS:865422", "OPENVAS:865418", "OPENVAS:1361412562310865408", "OPENVAS:865414", "OPENVAS:1361412562310865414", "OPENVAS:1361412562310865418", "OPENVAS:865412"]}, {"type": "nessus", "idList": ["FEDORA_2013-2890.NASL", "SOLARIS11_EKIGA_20130716.NASL", "EKIGA_4_0_0.NASL", "FEDORA_2013-2998.NASL"]}], "modified": "2019-05-29T18:38:22"}, "score": {"value": 5.9, "vector": "NONE", "modified": "2019-05-29T18:38:22"}, "vulnersScore": 5.9}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865411\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2998\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2998\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ptlib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n script_tag(name:\"affected\", value:\"ptlib on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "1361412562310865411", "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:12:26", "bulletinFamily": "NVD", "description": "lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.", "modified": "2017-08-29T01:32:00", "id": "CVE-2012-5621", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5621", "published": "2014-09-29T22:55:00", "title": "CVE-2012-5621", "type": "cve", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:38:06", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-03-05T00:00:00", "id": "OPENVAS:1361412562310865422", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865422", "title": "Fedora Update for ekiga FEDORA-2013-2890", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ekiga FEDORA-2013-2890\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099570.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865422\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:41:52 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2890\");\n script_name(\"Fedora Update for ekiga FEDORA-2013-2890\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ekiga'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"ekiga on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"ekiga\", rpm:\"ekiga~4.0.1~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:37:49", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-03-05T00:00:00", "id": "OPENVAS:1361412562310865412", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865412", "title": "Fedora Update for opal FEDORA-2013-2998", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for opal FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865412\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:55 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2998\");\n script_name(\"Fedora Update for opal FEDORA-2013-2998\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'opal'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n script_tag(name:\"affected\", value:\"opal on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"opal\", rpm:\"opal~3.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-25T10:51:54", "bulletinFamily": "scanner", "description": "Check for the Version of ekiga", "modified": "2017-07-10T00:00:00", "published": "2013-03-05T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=865418", "id": "OPENVAS:865418", "title": "Fedora Update for ekiga FEDORA-2013-2998", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ekiga FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"ekiga on Fedora 18\";\ntag_insight = \"Ekiga is a tool to communicate with video and audio over the internet.\n It uses the standard SIP and H323 protocols.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099555.html\");\n script_id(865418);\n script_version(\"$Revision: 6628 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:32:47 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:41:37 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2998\");\n script_name(\"Fedora Update for ekiga FEDORA-2013-2998\");\n\n script_summary(\"Check for the Version of ekiga\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ekiga\", rpm:\"ekiga~4.0.1~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-19T15:08:57", "bulletinFamily": "scanner", "description": "Check for the Version of ptlib", "modified": "2018-01-19T00:00:00", "published": "2013-03-05T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=865411", "id": "OPENVAS:865411", "title": "Fedora Update for ptlib FEDORA-2013-2998", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PTLib (Portable Tools Library) is a moderately large class library that\n has it's genesis many years ago as PWLib (portable Windows Library), a\n method to product applications to run on both Microsoft Windows and Unix\n systems. It has also been ported to other systems such as Mac OSX, VxWorks\n and other embedded systems.\n\n It is supplied mainly to support the OPAL project, but that shouldn't stop\n you from using it in whatever project you have in mind if you so desire.\";\n\n\ntag_affected = \"ptlib on Fedora 18\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\");\n script_id(865411);\n script_version(\"$Revision: 8466 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-19 07:58:30 +0100 (Fri, 19 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:54 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2998\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2998\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of ptlib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-26T11:09:54", "bulletinFamily": "scanner", "description": "Check for the Version of ekiga", "modified": "2018-01-26T00:00:00", "published": "2013-03-05T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=865422", "id": "OPENVAS:865422", "title": "Fedora Update for ekiga FEDORA-2013-2890", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ekiga FEDORA-2013-2890\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"ekiga on Fedora 17\";\ntag_insight = \"Ekiga is a tool to communicate with video and audio over the internet.\n It uses the standard SIP and H323 protocols.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099570.html\");\n script_id(865422);\n script_version(\"$Revision: 8542 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-26 07:57:28 +0100 (Fri, 26 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:41:52 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2890\");\n script_name(\"Fedora Update for ekiga FEDORA-2013-2890\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of ekiga\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"ekiga\", rpm:\"ekiga~4.0.1~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:22", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-03-05T00:00:00", "id": "OPENVAS:1361412562310865408", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865408", "title": "Fedora Update for ptlib FEDORA-2013-2890", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ptlib FEDORA-2013-2890\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099571.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865408\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:48 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2890\");\n script_name(\"Fedora Update for ptlib FEDORA-2013-2890\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ptlib'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"ptlib on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"ptlib\", rpm:\"ptlib~2.10.10~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:38:28", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-03-05T00:00:00", "id": "OPENVAS:1361412562310865414", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865414", "title": "Fedora Update for opal FEDORA-2013-2890", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for opal FEDORA-2013-2890\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099572.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865414\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:40:05 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2890\");\n script_name(\"Fedora Update for opal FEDORA-2013-2890\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'opal'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"opal on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"opal\", rpm:\"opal~3.10.10~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2018-01-18T11:08:45", "bulletinFamily": "scanner", "description": "Check for the Version of opal", "modified": "2018-01-17T00:00:00", "published": "2013-03-05T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=865414", "id": "OPENVAS:865414", "title": "Fedora Update for opal FEDORA-2013-2890", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for opal FEDORA-2013-2890\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"opal on Fedora 17\";\ntag_insight = \"Open Phone Abstraction Library, implementation of the ITU H.323\n teleconferencing protocol, and successor of the openh323 library.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099572.html\");\n script_id(865414);\n script_version(\"$Revision: 8448 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:18:06 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:40:05 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2890\");\n script_name(\"Fedora Update for opal FEDORA-2013-2890\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of opal\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"opal\", rpm:\"opal~3.10.10~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:37:58", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2013-03-05T00:00:00", "id": "OPENVAS:1361412562310865418", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310865418", "title": "Fedora Update for ekiga FEDORA-2013-2998", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for ekiga FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099555.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.865418\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:41:37 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"FEDORA\", value:\"2013-2998\");\n script_name(\"Fedora Update for ekiga FEDORA-2013-2998\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ekiga'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC18\");\n script_tag(name:\"affected\", value:\"ekiga on Fedora 18\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"ekiga\", rpm:\"ekiga~4.0.1~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2017-07-25T10:51:57", "bulletinFamily": "scanner", "description": "Check for the Version of opal", "modified": "2017-07-10T00:00:00", "published": "2013-03-05T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=865412", "id": "OPENVAS:865412", "title": "Fedora Update for opal FEDORA-2013-2998", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for opal FEDORA-2013-2998\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"opal on Fedora 18\";\ntag_insight = \"Open Phone Abstraction Library, implementation of the ITU H.323\n teleconferencing protocol, and successor of the openh323 library.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html\");\n script_id(865412);\n script_version(\"$Revision: 6628 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:32:47 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-03-05 09:39:55 +0530 (Tue, 05 Mar 2013)\");\n script_cve_id(\"CVE-2012-5621\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"FEDORA\", value: \"2013-2998\");\n script_name(\"Fedora Update for opal FEDORA-2013-2998\");\n\n script_summary(\"Check for the Version of opal\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC18\")\n{\n\n if ((res = isrpmvuln(pkg:\"opal\", rpm:\"opal~3.10.10~1.fc18\", rls:\"FC18\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-11-01T02:27:08", "bulletinFamily": "scanner", "description": "New upstream ekiga 4.0.1 release\n\n - Core fixes\n\n - Fix crash when quitting ekiga while receiving presence\n information\n\n - Fix crash when quitting ekiga right after starting it\n (before STUN ending)\n\n - Fix crash when disabling an account while icons in\n roster are changing\n\n - Fix crash when receiving call a second time\n\n - Fix crash in XML parsing in case of malicious code\n (CVE-2012-5621)\n\n - Fix increasing CPU usage after hours of usage caused\n by endless OPTIONS\n\n - Several fixes for H.323 :\n\n - fix H.323 parsing\n\n - add the username in authentication\n\n - fix unregistering the gatekeeper\n\n - fix registration\n\n - assign gk_name only if success\n\n - do not propose adding an H.323 account if the protocol\n is not built-in\n\n - Fix registration for registrars accepting the last\n Contact item offered\n\n - Allow to change the REGISTER compatibility mode of an\n existing registration\n\n - Fix impossibility to hangup active call after a missed\n call\n\n - Fix busy or call forwarding on busy occuring when\n connection is released\n\n - Fix subscribing/unsubscribing when enabling and\n disabling SIP accounts\n\n - Do not show is-typing messages sent by other programs\n during chatting\n\n - Stop ongoing registration when remove account\n\n - Use meaningful names for ALSA sub-devices\n\n - Allow to enter contact addresses without host part,\n and choose the host later\n\n - Increase number of characters shown in device names\n\n - Use a better icon for call history in addressbook\n\n - Show the address instead of ", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2013-2890.NASL", "href": "https://www.tenable.com/plugins/nessus/64983", "published": "2013-03-04T00:00:00", "title": "Fedora 17 : ekiga-4.0.1-1.fc17 / opal-3.10.10-1.fc17 / ptlib-2.10.10-1.fc17 (2013-2890)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-2890.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64983);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/07/15 14:20:31\");\n\n script_cve_id(\"CVE-2012-5621\");\n script_bugtraq_id(56790);\n script_xref(name:\"FEDORA\", value:\"2013-2890\");\n\n script_name(english:\"Fedora 17 : ekiga-4.0.1-1.fc17 / opal-3.10.10-1.fc17 / ptlib-2.10.10-1.fc17 (2013-2890)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New upstream ekiga 4.0.1 release\n\n - Core fixes\n\n - Fix crash when quitting ekiga while receiving presence\n information\n\n - Fix crash when quitting ekiga right after starting it\n (before STUN ending)\n\n - Fix crash when disabling an account while icons in\n roster are changing\n\n - Fix crash when receiving call a second time\n\n - Fix crash in XML parsing in case of malicious code\n (CVE-2012-5621)\n\n - Fix increasing CPU usage after hours of usage caused\n by endless OPTIONS\n\n - Several fixes for H.323 :\n\n - fix H.323 parsing\n\n - add the username in authentication\n\n - fix unregistering the gatekeeper\n\n - fix registration\n\n - assign gk_name only if success\n\n - do not propose adding an H.323 account if the protocol\n is not built-in\n\n - Fix registration for registrars accepting the last\n Contact item offered\n\n - Allow to change the REGISTER compatibility mode of an\n existing registration\n\n - Fix impossibility to hangup active call after a missed\n call\n\n - Fix busy or call forwarding on busy occuring when\n connection is released\n\n - Fix subscribing/unsubscribing when enabling and\n disabling SIP accounts\n\n - Do not show is-typing messages sent by other programs\n during chatting\n\n - Stop ongoing registration when remove account\n\n - Use meaningful names for ALSA sub-devices\n\n - Allow to enter contact addresses without host part,\n and choose the host later\n\n - Increase number of characters shown in device names\n\n - Use a better icon for call history in addressbook\n\n - Show the address instead of 'telephoneNumber' in\n addressbook\n\n - Deactivate NullAudio ptlib's device for audio input\n too\n\n - Do not send OPTIONS messages once the account is\n disabled\n\n - Hide the main window immediately on exit\n\n - Handle xa status as away\n\n - Fix debugging message when registering\n\n - Fix race condition leading to duplicate entry in call\n history\n\n - Fix incoming call if two INVITE's in a fork arrive\n very close together\n\n - Use correct username in OPTIONS messages\n\n - Allow to have message waiting indication even if\n asterisk's vmexten is off\n\n - Send OPTION only on the right interface\n\n - Fix buttons direction in dialpad for RTL languages\n\n - Fix aborting RTP receiver with Polycom HDX8000\n\n - Fix possible incorrect jitter calculation for RTCP\n\n - Only kill REGISTER/SUBSCRIBE forks if a 'try again'\n response is received\n\n - Various other fixes\n\n - Distributor-visible changes\n\n - Build fixes\n\n - Fix building opal when java SDK installed and swig is\n not\n\n - Some code cleanup\n\n - Translation updates\n\n - Update translations: fr, ml, pt_BR\n\n - Update help translations: pt_BR\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=883058\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099570.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b6b56499\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099571.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2eeeefa0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099572.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?43429d55\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ekiga, opal and / or ptlib packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ekiga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:opal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ptlib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:17\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/09/29\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^17([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 17.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC17\", reference:\"ekiga-4.0.1-1.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"opal-3.10.10-1.fc17\")) flag++;\nif (rpm_check(release:\"FC17\", reference:\"ptlib-2.10.10-1.fc17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ekiga / opal / ptlib\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-11-03T12:17:04", "bulletinFamily": "scanner", "description": "The remote Solaris system is missing necessary patches to address\nsecurity updates.", "modified": "2019-11-02T00:00:00", "id": "SOLARIS11_EKIGA_20130716.NASL", "href": "https://www.tenable.com/plugins/nessus/80602", "published": "2015-01-19T00:00:00", "title": "Oracle Solaris Third-Party Patch Update : ekiga (cve_2012_5621_denial_of)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Oracle Third Party software advisories.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(80602);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2018/11/15 20:50:24\");\n\n script_cve_id(\"CVE-2012-5621\");\n\n script_name(english:\"Oracle Solaris Third-Party Patch Update : ekiga (cve_2012_5621_denial_of)\");\n script_summary(english:\"Check for the 'entire' version.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Solaris system is missing a security patch for third-party\nsoftware.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote Solaris system is missing necessary patches to address\nsecurity updates.\"\n );\n # https://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4a913f44\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://blogs.oracle.com/sunsecurity/cve-2012-5621-denial-of-service-dos-vulnerability-in-ekiga\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Solaris 11.1.9.5.1.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:solaris:11.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:solaris:ekiga\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/01/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Solaris Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Solaris11/release\", \"Host/Solaris11/pkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"solaris.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Solaris11/release\");\nif (isnull(release)) audit(AUDIT_OS_NOT, \"Solaris11\");\npkg_list = solaris_pkg_list_leaves();\nif (isnull (pkg_list)) audit(AUDIT_PACKAGE_LIST_MISSING, \"Solaris pkg-list packages\");\n\nif (empty_or_null(egrep(string:pkg_list, pattern:\"^ekiga$\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ekiga\");\n\nflag = 0;\n\nif (solaris_check_release(release:\"0.5.11-0.175.1.9.0.5.1\", sru:\"SRU 11.1.9.5.1\") > 0) flag++;\n\nif (flag)\n{\n error_extra = 'Affected package : ekiga\\n' + solaris_get_report2();\n error_extra = ereg_replace(pattern:\"version\", replace:\"OS version\", string:error_extra);\n if (report_verbosity > 0) security_warning(port:0, extra:error_extra);\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_PACKAGE_NOT_AFFECTED, \"ekiga\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:26:12", "bulletinFamily": "scanner", "description": "According to the version in its SIP banner, the version of Ekiga\nrunning on the remote host is potentially affected by a vulnerability\nthat could allow a remote, unauthenticated attacker to cause a denial of\nservice via invalid UTF-8 characters in the remote user", "modified": "2019-11-02T00:00:00", "id": "EKIGA_4_0_0.NASL", "href": "https://www.tenable.com/plugins/nessus/64458", "published": "2013-02-04T00:00:00", "title": "Ekiga < 4.0.0 Invalid UTF-8 Character Connection Data Parsing DoS", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64458);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2018/11/15 20:50:21\");\n\n script_cve_id(\"CVE-2012-5621\");\n script_bugtraq_id(56790);\n\n script_name(english:\"Ekiga < 4.0.0 Invalid UTF-8 Character Connection Data Parsing DoS\");\n script_summary(english:\"Checks version in SIP banner\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Ekiga installed on the remote host may be affected by a\ndenial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version in its SIP banner, the version of Ekiga\nrunning on the remote host is potentially affected by a vulnerability\nthat could allow a remote, unauthenticated attacker to cause a denial of\nservice via invalid UTF-8 characters in the remote user's connection\ndata.\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Ekiga 4.0.0 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"see_also\", value:\"https://gitlab.gnome.org/GNOME/ekiga/blob/EKIGA_4_0_0/NEWS\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.gnome.org/show_bug.cgi?id=653009\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/06/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/04\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ekiga:ekiga\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Denial of Service\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ekiga_detection.nasl\");\n script_require_keys(\"ekiga/sip_detected\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"ekiga/sip_detected\");\n\n# see if we were able to get version info from the Ekiga SIP services\nekiga_kbs = get_kb_list(\"sip/ekiga/*/version\");\nif (isnull(ekiga_kbs)) exit(0, \"Could not obtain any version information from the Ekiga SIP instance(s).\");\n\n# Prevent potential false positives.\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nis_vuln = FALSE;\nnot_vuln_installs = make_list();\nerrors = make_list();\nfixed = \"4.0.0\";\n\nforeach kb_name (keys(ekiga_kbs))\n{\n matches = eregmatch(pattern:\"/(udp|tcp)/([0-9]+)/version\", string:kb_name); \n if (isnull(matches))\n {\n errors = make_list(errors, \"Unexpected error parsing port number from kb name: \"+kb_name);\n continue;\n }\n\n proto = matches[1];\n port = matches[2];\n version = ekiga_kbs[kb_name];\n\n banner = get_kb_item(\"sip/ekiga/\" + proto + \"/\" + port + \"/source\"); \n if (!banner)\n {\n # We have version but banner is missing; log error\n # and use in version-check though.\n errors = make_list(errors, \"KB item 'sip/ekiga/\" + proto + \"/\" + port + \"/source' is missing\");\n banner = 'unknown';\n }\n\n # Affected < 4.0.0\n if (version =~ \"^[0-3]\\.\")\n {\n is_vuln = TRUE;\n if (report_verbosity > 0)\n {\n report = \n '\\n Version source : ' + banner +\n '\\n Installed version : ' + version + \n '\\n Fixed version : ' + fixed + '\\n';\n security_warning(port:port, proto:proto, extra:report);\n }\n else security_warning(port:port, proto:proto);\n }\n else not_vuln_installs = make_list(not_vuln_installs, version + \" on port \" + proto + \"/\" + port);\n}\n\nif (is_vuln)\n{\n if (max_index(errors)) exit(1, \"The results may be incomplete because of one or more errors verifying installs.\");\n else exit(0);\n}\nelse\n{\n if (max_index(errors))\n {\n if (max_index(errors) == 1) errmsg = errors[0];\n else errmsg = 'Errors were encountered verifying installs : \\n ' + join(errors, sep:'\\n ');\n \n exit(1, errmsg);\n }\n\n installs = max_index(not_vuln_installs);\n if (installs == 0) audit(AUDIT_NOT_INST, \"Ekiga\");\n else if (installs == 1) audit(AUDIT_INST_VER_NOT_VULN, \"Ekiga \" + not_vuln_installs[0]);\n else exit(0, \"The Ekiga installs (\" + join(not_vuln_installs, sep:\", \") + \") are not affected.\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:27:08", "bulletinFamily": "scanner", "description": "New upstream ekiga 4.0.1 release\n\n - Core fixes\n\n - Fix crash when quitting ekiga while receiving presence\n information\n\n - Fix crash when quitting ekiga right after starting it\n (before STUN ending)\n\n - Fix crash when disabling an account while icons in\n roster are changing\n\n - Fix crash when receiving call a second time\n\n - Fix crash in XML parsing in case of malicious code\n (CVE-2012-5621)\n\n - Fix increasing CPU usage after hours of usage caused\n by endless OPTIONS\n\n - Several fixes for H.323 :\n\n - fix H.323 parsing\n\n - add the username in authentication\n\n - fix unregistering the gatekeeper\n\n - fix registration\n\n - assign gk_name only if success\n\n - do not propose adding an H.323 account if the protocol\n is not built-in\n\n - Fix registration for registrars accepting the last\n Contact item offered\n\n - Allow to change the REGISTER compatibility mode of an\n existing registration\n\n - Fix impossibility to hangup active call after a missed\n call\n\n - Fix busy or call forwarding on busy occuring when\n connection is released\n\n - Fix subscribing/unsubscribing when enabling and\n disabling SIP accounts\n\n - Do not show is-typing messages sent by other programs\n during chatting\n\n - Stop ongoing registration when remove account\n\n - Use meaningful names for ALSA sub-devices\n\n - Allow to enter contact addresses without host part,\n and choose the host later\n\n - Increase number of characters shown in device names\n\n - Use a better icon for call history in addressbook\n\n - Show the address instead of ", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2013-2998.NASL", "href": "https://www.tenable.com/plugins/nessus/64984", "published": "2013-03-04T00:00:00", "title": "Fedora 18 : ekiga-4.0.1-1.fc18 / opal-3.10.10-1.fc18 / ptlib-2.10.10-1.fc18 (2013-2998)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2013-2998.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(64984);\n script_version(\"1.12\");\n script_cvs_date(\"Date: 2019/07/15 14:20:31\");\n\n script_cve_id(\"CVE-2012-5621\", \"CVE-2013-1864\");\n script_bugtraq_id(56790);\n script_xref(name:\"FEDORA\", value:\"2013-2998\");\n\n script_name(english:\"Fedora 18 : ekiga-4.0.1-1.fc18 / opal-3.10.10-1.fc18 / ptlib-2.10.10-1.fc18 (2013-2998)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New upstream ekiga 4.0.1 release\n\n - Core fixes\n\n - Fix crash when quitting ekiga while receiving presence\n information\n\n - Fix crash when quitting ekiga right after starting it\n (before STUN ending)\n\n - Fix crash when disabling an account while icons in\n roster are changing\n\n - Fix crash when receiving call a second time\n\n - Fix crash in XML parsing in case of malicious code\n (CVE-2012-5621)\n\n - Fix increasing CPU usage after hours of usage caused\n by endless OPTIONS\n\n - Several fixes for H.323 :\n\n - fix H.323 parsing\n\n - add the username in authentication\n\n - fix unregistering the gatekeeper\n\n - fix registration\n\n - assign gk_name only if success\n\n - do not propose adding an H.323 account if the protocol\n is not built-in\n\n - Fix registration for registrars accepting the last\n Contact item offered\n\n - Allow to change the REGISTER compatibility mode of an\n existing registration\n\n - Fix impossibility to hangup active call after a missed\n call\n\n - Fix busy or call forwarding on busy occuring when\n connection is released\n\n - Fix subscribing/unsubscribing when enabling and\n disabling SIP accounts\n\n - Do not show is-typing messages sent by other programs\n during chatting\n\n - Stop ongoing registration when remove account\n\n - Use meaningful names for ALSA sub-devices\n\n - Allow to enter contact addresses without host part,\n and choose the host later\n\n - Increase number of characters shown in device names\n\n - Use a better icon for call history in addressbook\n\n - Show the address instead of 'telephoneNumber' in\n addressbook\n\n - Deactivate NullAudio ptlib's device for audio input\n too\n\n - Do not send OPTIONS messages once the account is\n disabled\n\n - Hide the main window immediately on exit\n\n - Handle xa status as away\n\n - Fix debugging message when registering\n\n - Fix race condition leading to duplicate entry in call\n history\n\n - Fix incoming call if two INVITE's in a fork arrive\n very close together\n\n - Use correct username in OPTIONS messages\n\n - Allow to have message waiting indication even if\n asterisk's vmexten is off\n\n - Send OPTION only on the right interface\n\n - Fix buttons direction in dialpad for RTL languages\n\n - Fix aborting RTP receiver with Polycom HDX8000\n\n - Fix possible incorrect jitter calculation for RTCP\n\n - Only kill REGISTER/SUBSCRIBE forks if a 'try again'\n response is received\n\n - Various other fixes\n\n - Distributor-visible changes\n\n - Build fixes\n\n - Fix building opal when java SDK installed and swig is\n not\n\n - Some code cleanup\n\n - Translation updates\n\n - Update translations: fr, ml, pt_BR\n\n - Update help translations: pt_BR\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=883058\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099553.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4d5e0df1\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099554.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ce850127\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-March/099555.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?07354ba4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ekiga, opal and / or ptlib packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ekiga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:opal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ptlib\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/05/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"ekiga-4.0.1-1.fc18\")) flag++;\nif (rpm_check(release:\"FC18\", reference:\"opal-3.10.10-1.fc18\")) flag++;\nif (rpm_check(release:\"FC18\", reference:\"ptlib-2.10.10-1.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ekiga / opal / ptlib\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}