ID OPENVAS:1361412562310868188 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2019-03-15T00:00:00
Description
The remote host is missing an update for the
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for polkit-qt FEDORA-2014-9641
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.868188");
script_version("$Revision: 14223 $");
script_tag(name:"last_modification", value:"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $");
script_tag(name:"creation_date", value:"2014-09-20 05:59:41 +0200 (Sat, 20 Sep 2014)");
script_cve_id("CVE-2014-5033");
script_tag(name:"cvss_base", value:"6.9");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_name("Fedora Update for polkit-qt FEDORA-2014-9641");
script_tag(name:"affected", value:"polkit-qt on Fedora 20");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"FEDORA", value:"2014-9641");
script_xref(name:"URL", value:"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/137844.html");
script_tag(name:"summary", value:"The remote host is missing an update for the 'polkit-qt'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC20");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "FC20")
{
if ((res = isrpmvuln(pkg:"polkit-qt", rpm:"polkit-qt~0.112.0~1.fc20", rls:"FC20")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
{"id": "OPENVAS:1361412562310868188", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for polkit-qt FEDORA-2014-9641", "description": "The remote host is missing an update for the ", "published": "2014-09-20T00:00:00", "modified": "2019-03-15T00:00:00", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868188", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["https://lists.fedoraproject.org/pipermail/package-announce/2014-September/137844.html", "2014-9641"], "cvelist": ["CVE-2014-5033"], "lastseen": "2019-05-29T18:37:37", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-5033", "CVE-2014-9641"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3004-1:D05F2"]}, {"type": "fedora", "idList": ["FEDORA:8289D225C7", "FEDORA:76A8E222C7", "FEDORA:46CD22276E", "FEDORA:03AB2222C7", "FEDORA:509EB225C7", "FEDORA:A1943225C7", "FEDORA:6F751222C7", "FEDORA:B25BD222C7", "FEDORA:AA944220D2", "FEDORA:3676F227AC"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310868316", "OPENVAS:1361412562310868221", "OPENVAS:1361412562310868337", "OPENVAS:1361412562310868223", "OPENVAS:1361412562310868343", "OPENVAS:1361412562310868334", "OPENVAS:1361412562310868291", "OPENVAS:1361412562310868331", "OPENVAS:1361412562310868278", "OPENVAS:1361412562310868312"]}, {"type": "nessus", "idList": ["OPENSUSE-2014-485.NASL", "DEBIAN_DSA-3004.NASL", "FREEBSD_PKG_2F90556F18C611E49CC45453ED2E2B49.NASL", "CENTOS_RHSA-2014-1359.NASL", "FEDORA_2014-9641.NASL", "UBUNTU_USN-2304-1.NASL", "DEBIAN_DLA-76.NASL", "REDHAT-RHSA-2014-1359.NASL", "FEDORA_2014-11348.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:30963"]}, {"type": "freebsd", "idList": ["2F90556F-18C6-11E4-9CC4-5453ED2E2B49"]}], "modified": "2019-05-29T18:37:37", "rev": 2}, "score": {"value": 6.4, "vector": "NONE", "modified": "2019-05-29T18:37:37", "rev": 2}, "vulnersScore": 6.4}, "pluginID": "1361412562310868188", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for polkit-qt FEDORA-2014-9641\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868188\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-09-20 05:59:41 +0200 (Sat, 20 Sep 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for polkit-qt FEDORA-2014-9641\");\n script_tag(name:\"affected\", value:\"polkit-qt on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-9641\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/137844.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'polkit-qt'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"polkit-qt\", rpm:\"polkit-qt~0.112.0~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:58:25", "description": "KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and \"PID reuse race conditions.\"", "edition": 5, "cvss3": {}, "published": "2014-08-19T18:55:00", "title": "CVE-2014-5033", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-5033"], "modified": "2014-10-16T07:22:00", "cpe": ["cpe:/a:kde:kdelibs:4.12.2", "cpe:/a:kde:kdelibs:4.11.80", "cpe:/a:kde:kdelibs:4.13.1", "cpe:/a:kde:kdelibs:4.10.0", "cpe:/a:debian:kde4libs:-", "cpe:/a:kde:kdelibs:4.13.3", "cpe:/a:kde:kdelibs:4.12.80", "cpe:/a:kde:kdelibs:4.10.97", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/a:kde:kdelibs:4.11.5", "cpe:/a:kde:kdelibs:4.12.1", "cpe:/a:kde:kdelibs:4.10.2", "cpe:/a:kde:kdelibs:4.11.97", "cpe:/a:kde:kdelibs:4.13.2", "cpe:/a:kde:kdelibs:4.10.1", "cpe:/a:kde:kdelibs:4.12.5", "cpe:/a:kde:kauth:5.0", "cpe:/a:kde:kdelibs:4.12.97", "cpe:/a:kde:kdelibs:4.11.3", "cpe:/a:kde:kdelibs:4.10.3", "cpe:/a:kde:kdelibs:4.13.80", "cpe:/a:kde:kdelibs:4.11.90", "cpe:/a:kde:kdelibs:4.12.4", "cpe:/a:kde:kdelibs:4.12.0", "cpe:/a:kde:kdelibs:4.13.0", "cpe:/a:kde:kdelibs:4.13.95", "cpe:/a:kde:kdelibs:4.13.97", "cpe:/a:kde:kdelibs:4.12.90", "cpe:/a:kde:kdelibs:4.11.4", "cpe:/a:kde:kdelibs:4.11.2", "cpe:/a:kde:kdelibs:4.11.95", "cpe:/a:kde:kdelibs:4.13.90", "cpe:/a:kde:kdelibs:4.11.0", "cpe:/a:kde:kdelibs:4.10.95", "cpe:/a:kde:kdelibs:4.12.95", "cpe:/a:kde:kdelibs:4.12.3", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/a:kde:kdelibs:4.11.1"], "id": "CVE-2014-5033", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5033", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:kde:kdelibs:4.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.97:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.90:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.97:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.90:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.10.95:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:kde4libs:-:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.95:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.80:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.95:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.95:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.97:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.13.80:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.90:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kauth:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:kde:kdelibs:4.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:a:kde:kdelibs:4.11.80:*:*:*:*:*:*:*"]}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "A program for people whom it hurts to click the mouse. ", "modified": "2014-09-27T09:47:48", "published": "2014-09-27T09:47:48", "id": "FEDORA:3EDC5222C7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kmousetool-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Polkit-qt is a library that lets developers use the PolicyKit API through a nice Qt-styled API. ", "modified": "2014-09-19T10:18:49", "published": "2014-09-19T10:18:49", "id": "FEDORA:E087523459", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: polkit-qt-0.112.0-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Letter Order Game. ", "modified": "2014-09-27T09:47:44", "published": "2014-09-27T09:47:44", "id": "FEDORA:E76F5220D2", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kanagram-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "KCharSelect is a tool to select special characters from all installed fonts and copy them into the clipboard. ", "modified": "2014-09-27T09:47:44", "published": "2014-09-27T09:47:44", "id": "FEDORA:35DAB22787", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kcharselect-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Practice Fractions. ", "modified": "2014-09-27T09:47:44", "published": "2014-09-27T09:47:44", "id": "FEDORA:17EF8225C7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kbruch-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": ".NET/Mono KDE bindings. ", "modified": "2014-09-27T09:47:48", "published": "2014-09-27T09:47:48", "id": "FEDORA:E08FC222C7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kimono-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "KDE Wallet Manager is a tool to manage the passwords on your KDE system. ", "modified": "2014-09-27T09:47:50", "published": "2014-09-27T09:47:50", "id": "FEDORA:E23C022919", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kwalletmanager-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Kdeaccessibility metapackage, to ease migration to split applications. ", "modified": "2014-09-27T09:47:45", "published": "2014-09-27T09:47:45", "id": "FEDORA:C1235222C7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kdeaccessibility-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "The kdeadmin metapackage includes administrative tools including: * kcron: systemsettings module for the cron task scheduler * ksystemlog: system log viewer * kuser: user manager ", "modified": "2014-09-27T09:47:45", "published": "2014-09-27T09:47:45", "id": "FEDORA:D19E8220D2", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kdeadmin-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Program that allows people who have lost their voice to let their computer speak for them. ", "modified": "2014-09-27T09:47:48", "published": "2014-09-27T09:47:48", "id": "FEDORA:4E2F4225C7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: kmouth-4.14.1-1.fc20", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:37:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868276", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868276", "type": "openvas", "title": "Fedora Update for kopete FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kopete FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868276\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:59:17 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kopete FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kopete on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138789.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kopete'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kopete\", rpm:\"kopete~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868308", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868308", "type": "openvas", "title": "Fedora Update for juk FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for juk FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868308\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:59:11 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for juk FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"juk on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138728.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'juk'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"juk\", rpm:\"juk~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868313", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868313", "type": "openvas", "title": "Fedora Update for libkdcraw FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for libkdcraw FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868313\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 17:00:15 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for libkdcraw FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"libkdcraw on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138805.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libkdcraw'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"libkdcraw\", rpm:\"libkdcraw~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868345", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868345", "type": "openvas", "title": "Fedora Update for nepomuk-widgets FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for nepomuk-widgets FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868345\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:58:28 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for nepomuk-widgets FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"nepomuk-widgets on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138816.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'nepomuk-widgets'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"nepomuk-widgets\", rpm:\"nepomuk-widgets~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868258", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868258", "type": "openvas", "title": "Fedora Update for kamera FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kamera FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868258\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:57:36 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kamera FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kamera on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138732.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kamera'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kamera\", rpm:\"kamera~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868239", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868239", "type": "openvas", "title": "Fedora Update for kdegraphics-thumbnailers FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdegraphics-thumbnailers FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868239\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:57:54 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kdegraphics-thumbnailers FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kdegraphics-thumbnailers on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138753.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdegraphics-thumbnailers'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdegraphics-thumbnailers\", rpm:\"kdegraphics-thumbnailers~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868319", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868319", "type": "openvas", "title": "Fedora Update for kmag FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kmag FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868319\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:59:37 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kmag FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kmag on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138780.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kmag'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kmag\", rpm:\"kmag~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868252", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868252", "type": "openvas", "title": "Fedora Update for kdenetwork-filesharing FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdenetwork-filesharing FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868252\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 17:00:40 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kdenetwork-filesharing FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kdenetwork-filesharing on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138760.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdenetwork-filesharing'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdenetwork-filesharing\", rpm:\"kdenetwork-filesharing~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868306", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868306", "type": "openvas", "title": "Fedora Update for kdf FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kdf FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868306\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:57:46 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kdf FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kdf on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138770.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kdf'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kdf\", rpm:\"kdf~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-10-01T00:00:00", "id": "OPENVAS:1361412562310868314", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310868314", "type": "openvas", "title": "Fedora Update for kolourpaint FEDORA-2014-11448", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kolourpaint FEDORA-2014-11448\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.868314\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-10-01 16:58:21 +0530 (Wed, 01 Oct 2014)\");\n script_cve_id(\"CVE-2014-5033\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Fedora Update for kolourpaint FEDORA-2014-11448\");\n script_tag(name:\"affected\", value:\"kolourpaint on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138784.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kolourpaint'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"kolourpaint\", rpm:\"kolourpaint~4.14.1~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-17T12:49:12", "description": "From Red Hat Security Advisory 2014:1359 :\n\nUpdated polkit-qt packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nPolkit-qt is a library that lets developers use the PolicyKit API\nthrough a Qt-styled API. The polkit-qt library is used by the KDE\nAuthentication Agent (KAuth), which is a part of kdelibs.\n\nIt was found that polkit-qt handled authorization requests with\nPolicyKit via a D-Bus API that is vulnerable to a race condition. A\nlocal user could use this flaw to bypass intended PolicyKit\nauthorizations. This update modifies polkit-qt to communicate with\nPolicyKit via a different API that is not vulnerable to the race\ncondition. (CVE-2014-5033)\n\nAll polkit-qt users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.", "edition": 21, "published": "2014-10-07T00:00:00", "title": "Oracle Linux 7 : polkit-qt (ELSA-2014-1359)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "modified": "2014-10-07T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:polkit-qt-devel", "p-cpe:/a:oracle:linux:polkit-qt-doc", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:polkit-qt"], "id": "ORACLELINUX_ELSA-2014-1359.NASL", "href": "https://www.tenable.com/plugins/nessus/78072", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2014:1359 and \n# Oracle Linux Security Advisory ELSA-2014-1359 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78072);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-5033\");\n script_bugtraq_id(68771);\n script_xref(name:\"RHSA\", value:\"2014:1359\");\n\n script_name(english:\"Oracle Linux 7 : polkit-qt (ELSA-2014-1359)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2014:1359 :\n\nUpdated polkit-qt packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nPolkit-qt is a library that lets developers use the PolicyKit API\nthrough a Qt-styled API. The polkit-qt library is used by the KDE\nAuthentication Agent (KAuth), which is a part of kdelibs.\n\nIt was found that polkit-qt handled authorization requests with\nPolicyKit via a D-Bus API that is vulnerable to a race condition. A\nlocal user could use this flaw to bypass intended PolicyKit\nauthorizations. This update modifies polkit-qt to communicate with\nPolicyKit via a different API that is not vulnerable to the race\ncondition. (CVE-2014-5033)\n\nAll polkit-qt users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2014-October/004508.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected polkit-qt packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:polkit-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:polkit-qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:polkit-qt-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"polkit-qt-0.103.0-10.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"polkit-qt-devel-0.103.0-10.el7_0\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"polkit-qt-doc-0.103.0-10.el7_0\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"polkit-qt / polkit-qt-devel / polkit-qt-doc\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:13:07", "description": "updated to the new release of polkit-qt\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-09-22T00:00:00", "title": "Fedora 19 : polkit-qt-0.112.0-1.fc19 (2014-9602)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "modified": "2014-09-22T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:polkit-qt"], "id": "FEDORA_2014-9602.NASL", "href": "https://www.tenable.com/plugins/nessus/77771", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-9602.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77771);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-5033\");\n script_bugtraq_id(68771);\n script_xref(name:\"FEDORA\", value:\"2014-9602\");\n\n script_name(english:\"Fedora 19 : polkit-qt-0.112.0-1.fc19 (2014-9602)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"updated to the new release of polkit-qt\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1094890\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/137764.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?52ff9bf4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected polkit-qt package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:polkit-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"polkit-qt-0.112.0-1.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"polkit-qt\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:12:04", "description": "KDE released updates for its Applications and Development Platform,\nthe first in a series of monthly stabilization updates to the 4.14\nseries. This update also includes the latest stable calligra-2.8.6 and\ndigikam-4.3.0 releases. See also http://kde.org/announcements/4.14/ ,\nhttp://kde.org/announcements/announce-4.14.1.php ,\nhttps://www.calligra.org/news/calligra-2-8-6-released/ ,\nhttps://www.digikam.org/node/718\n\nThe update also addresses CVE-2014-5033, fixed in kdelibs ' 4.14.0:\nKAuth was calling PolicyKit 1 (polkit) in an insecure way.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 15, "published": "2014-09-29T00:00:00", "title": "Fedora 20 : akonadi-1.13.0-2.fc20 / amor-4.14.1-1.fc20 / analitza-4.14.1-1.fc20 / ark-4.14.1-1.fc20 / etc (2014-11448)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "modified": "2014-09-29T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:akonadi", "p-cpe:/a:fedoraproject:fedora:calligra-l10n", "p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme", "p-cpe:/a:fedoraproject:fedora:kuser", "p-cpe:/a:fedoraproject:fedora:kde-runtime", "p-cpe:/a:fedoraproject:fedora:kdetoys", "p-cpe:/a:fedoraproject:fedora:baloo-widgets", "p-cpe:/a:fedoraproject:fedora:kphotoalbum", "p-cpe:/a:fedoraproject:fedora:pykde4", "p-cpe:/a:fedoraproject:fedora:subsurface", "p-cpe:/a:fedoraproject:fedora:kfilemetadata", "p-cpe:/a:fedoraproject:fedora:konsole", "p-cpe:/a:fedoraproject:fedora:kmousetool", "p-cpe:/a:fedoraproject:fedora:kdepimlibs", "p-cpe:/a:fedoraproject:fedora:kanagram", "p-cpe:/a:fedoraproject:fedora:ruby-korundum", "p-cpe:/a:fedoraproject:fedora:kmouth", "p-cpe:/a:fedoraproject:fedora:libkexiv2", "p-cpe:/a:fedoraproject:fedora:kruler", "p-cpe:/a:fedoraproject:fedora:kimono", "p-cpe:/a:fedoraproject:fedora:kde-base-artwork", "p-cpe:/a:fedoraproject:fedora:libkgapi", "p-cpe:/a:fedoraproject:fedora:kdeplasma-addons", "p-cpe:/a:fedoraproject:fedora:kcolorchooser", "p-cpe:/a:fedoraproject:fedora:kdeedu", "p-cpe:/a:fedoraproject:fedora:kdemultimedia", "p-cpe:/a:fedoraproject:fedora:kdegraphics-thumbnailers", "p-cpe:/a:fedoraproject:fedora:kcalc", "p-cpe:/a:fedoraproject:fedora:rocs", "p-cpe:/a:fedoraproject:fedora:kde-print-manager", "p-cpe:/a:fedoraproject:fedora:analitza", "p-cpe:/a:fedoraproject:fedora:kwordquiz", "p-cpe:/a:fedoraproject:fedora:libkolab", "p-cpe:/a:fedoraproject:fedora:kget", "p-cpe:/a:fedoraproject:fedora:libkdeedu", "p-cpe:/a:fedoraproject:fedora:kturtle", "p-cpe:/a:fedoraproject:fedora:audiocd-kio", "p-cpe:/a:fedoraproject:fedora:qyoto", "p-cpe:/a:fedoraproject:fedora:ruby-qt", "p-cpe:/a:fedoraproject:fedora:kteatime", "p-cpe:/a:fedoraproject:fedora:kdf", "p-cpe:/a:fedoraproject:fedora:kamera", "p-cpe:/a:fedoraproject:fedora:kdeaccessibility", "p-cpe:/a:fedoraproject:fedora:libkcompactdisc", "p-cpe:/a:fedoraproject:fedora:superkaramba", "p-cpe:/a:fedoraproject:fedora:kross-interpreters", "p-cpe:/a:fedoraproject:fedora:kate", "p-cpe:/a:fedoraproject:fedora:gwenview", "p-cpe:/a:fedoraproject:fedora:juk", "p-cpe:/a:fedoraproject:fedora:kdenetwork", "p-cpe:/a:fedoraproject:fedora:smokekde", "p-cpe:/a:fedoraproject:fedora:okular", "p-cpe:/a:fedoraproject:fedora:svgpart", "p-cpe:/a:fedoraproject:fedora:kdelibs", "p-cpe:/a:fedoraproject:fedora:kdegraphics-mobipocket", "p-cpe:/a:fedoraproject:fedora:kiten", "p-cpe:/a:fedoraproject:fedora:ksaneplugin", "p-cpe:/a:fedoraproject:fedora:kmplot", "p-cpe:/a:fedoraproject:fedora:kdepim", "p-cpe:/a:fedoraproject:fedora:kdeadmin", "p-cpe:/a:fedoraproject:fedora:step", "p-cpe:/a:fedoraproject:fedora:kdenetwork-strigi-analyzers", "p-cpe:/a:fedoraproject:fedora:filelight", "p-cpe:/a:fedoraproject:fedora:kopete", "p-cpe:/a:fedoraproject:fedora:klettres", "p-cpe:/a:fedoraproject:fedora:libkipi", "p-cpe:/a:fedoraproject:fedora:ksystemlog", "p-cpe:/a:fedoraproject:fedora:kdepim-runtime", "p-cpe:/a:fedoraproject:fedora:krfb", "p-cpe:/a:fedoraproject:fedora:kwalletmanager", "p-cpe:/a:fedoraproject:fedora:smokegen", "p-cpe:/a:fedoraproject:fedora:kalgebra", "p-cpe:/a:fedoraproject:fedora:digikam", "p-cpe:/a:fedoraproject:fedora:dragon", "p-cpe:/a:fedoraproject:fedora:krdc", "p-cpe:/a:fedoraproject:fedora:kde-baseapps", "p-cpe:/a:fedoraproject:fedora:marble", "p-cpe:/a:fedoraproject:fedora:pairs", "cpe:/o:fedoraproject:fedora:20", "p-cpe:/a:fedoraproject:fedora:sweeper", "p-cpe:/a:fedoraproject:fedora:amor", "p-cpe:/a:fedoraproject:fedora:kdnssd", "p-cpe:/a:fedoraproject:fedora:kgpg", "p-cpe:/a:fedoraproject:fedora:kremotecontrol", "p-cpe:/a:fedoraproject:fedora:kaccessible", "p-cpe:/a:fedoraproject:fedora:kalzium", "p-cpe:/a:fedoraproject:fedora:blinken", "p-cpe:/a:fedoraproject:fedora:kig", "p-cpe:/a:fedoraproject:fedora:smokeqt", "p-cpe:/a:fedoraproject:fedora:ark", "p-cpe:/a:fedoraproject:fedora:kdegraphics-strigi-analyzer", "p-cpe:/a:fedoraproject:fedora:kdenetwork-filesharing", "p-cpe:/a:fedoraproject:fedora:kmix", "p-cpe:/a:fedoraproject:fedora:cantor", "p-cpe:/a:fedoraproject:fedora:ktouch", "p-cpe:/a:fedoraproject:fedora:kdeutils", "p-cpe:/a:fedoraproject:fedora:kppp", "p-cpe:/a:fedoraproject:fedora:kscd", "p-cpe:/a:fedoraproject:fedora:kgamma", "p-cpe:/a:fedoraproject:fedora:kde-wallpapers", "p-cpe:/a:fedoraproject:fedora:kdeartwork", "p-cpe:/a:fedoraproject:fedora:ksnapshot", "p-cpe:/a:fedoraproject:fedora:kstars", "p-cpe:/a:fedoraproject:fedora:kcron", "p-cpe:/a:fedoraproject:fedora:kde-l10n", "p-cpe:/a:fedoraproject:fedora:nepomuk-core", "p-cpe:/a:fedoraproject:fedora:kqtquickcharts", "p-cpe:/a:fedoraproject:fedora:baloo", "p-cpe:/a:fedoraproject:fedora:libksane", "p-cpe:/a:fedoraproject:fedora:ktux", "p-cpe:/a:fedoraproject:fedora:libkdcraw", "p-cpe:/a:fedoraproject:fedora:kolourpaint", "p-cpe:/a:fedoraproject:fedora:kbruch", "p-cpe:/a:fedoraproject:fedora:nepomuk-widgets", "p-cpe:/a:fedoraproject:fedora:kdegraphics", "p-cpe:/a:fedoraproject:fedora:khangman", "p-cpe:/a:fedoraproject:fedora:ktimer", "p-cpe:/a:fedoraproject:fedora:kmag", "p-cpe:/a:fedoraproject:fedora:libkcddb", "p-cpe:/a:fedoraproject:fedora:kgeography", "p-cpe:/a:fedoraproject:fedora:parley", "p-cpe:/a:fedoraproject:fedora:kdebindings", "p-cpe:/a:fedoraproject:fedora:calligra", "p-cpe:/a:fedoraproject:fedora:kfloppy", "p-cpe:/a:fedoraproject:fedora:kcharselect", "p-cpe:/a:fedoraproject:fedora:jovie"], "id": "FEDORA_2014-11448.NASL", "href": "https://www.tenable.com/plugins/nessus/77937", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-11448.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77937);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-5033\");\n script_xref(name:\"FEDORA\", value:\"2014-11448\");\n\n script_name(english:\"Fedora 20 : akonadi-1.13.0-2.fc20 / amor-4.14.1-1.fc20 / analitza-4.14.1-1.fc20 / ark-4.14.1-1.fc20 / etc (2014-11448)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"KDE released updates for its Applications and Development Platform,\nthe first in a series of monthly stabilization updates to the 4.14\nseries. This update also includes the latest stable calligra-2.8.6 and\ndigikam-4.3.0 releases. See also http://kde.org/announcements/4.14/ ,\nhttp://kde.org/announcements/announce-4.14.1.php ,\nhttps://www.calligra.org/news/calligra-2-8-6-released/ ,\nhttps://www.digikam.org/node/718\n\nThe update also addresses CVE-2014-5033, fixed in kdelibs ' 4.14.0:\nKAuth was calling PolicyKit 1 (polkit) in an insecure way.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://kde.org/announcements/4.14/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.kde.org/announcements/4.14/\"\n );\n # http://kde.org/announcements/announce-4.14.1.php\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.kde.org/announcements/announce-4.14.1.php\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1094890\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138716.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b518859a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138717.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5a252844\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138718.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ef8f4a10\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138719.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?153a8387\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138720.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4fc30846\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138721.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1f917ff9\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138722.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ad2ddd1b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138723.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0b8652ea\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138724.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0a9d0bd3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138725.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ca4522ed\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138726.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?80f43699\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138727.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9b85978c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138728.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4771d573\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138729.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c32b8114\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138730.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c1dbe597\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138731.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e7395d5b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138732.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f0913cfa\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138733.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fc9d5c49\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138734.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d06d389a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138735.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?16212af1\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138736.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0b96cc30\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138737.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?de6c6c5c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138738.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8e993943\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138739.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?670e4cb7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138740.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2123b04a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138741.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?43969367\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138742.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7206044d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138743.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?46591924\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138744.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?40a20ec5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138745.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7d6fd5cc\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138746.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9cbb25e3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138747.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1a0b6e44\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138748.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e283ecd2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138749.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cf2d6811\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138750.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?af01871b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138751.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?af91d95a\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138752.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f15c8d81\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138753.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4e4d12dc\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138754.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dbd714a5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138755.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ee5ad235\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138756.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?349c71a4\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138757.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0746419\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138758.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f5cc7fdc\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138759.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7dadb060\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138760.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7b997288\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138761.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d9f83123\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138762.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5d445cdd\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138763.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?93e29e75\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138764.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7e062257\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138765.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6f181b0b\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138766.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cbd8d25e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138767.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?70995636\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138768.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a96ddfb8\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138769.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d3abbfc4\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138770.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8098ebc0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138771.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e9160704\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138772.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d3c400f3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138773.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?88db7340\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138774.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?24c5d0c0\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138775.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e31c3220\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138776.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fcc70153\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138777.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f7dbabee\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138778.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?13b4e399\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138779.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?25daa1f3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138780.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1fee9070\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138781.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4642ecd6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138782.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c7704492\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138783.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?049fb483\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138784.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1af39b2c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138785.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4067c53f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138786.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?04c1247f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138787.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?80f995cd\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138788.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2a9f3862\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138789.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?815ec671\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138790.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ccb2279e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138791.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?51545f22\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138792.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b6351810\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138793.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?97657f11\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138794.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7ce5f92d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138795.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1427af38\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138796.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?8333cb50\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138797.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3e102ba6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138798.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?67601181\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138799.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7764a10e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138800.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1d401aa4\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138801.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f8117bb2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138802.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d491bee6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138803.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fe960c35\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138804.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9b1f85e2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138805.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?643110a6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138806.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?05f9887f\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138807.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?49fbe200\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138808.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1447e99e\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138809.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b5fe8720\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138810.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f865dba2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138811.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5a77d7f9\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138812.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ce0b7293\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138813.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b1dccb2\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138814.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?08735a07\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138815.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2a60e608\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138816.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5d327508\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138817.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2802bae8\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138818.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f602b0e6\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138819.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?45c4adb7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138820.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3beeac68\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138821.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4ce67a87\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138822.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0927ac23\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138823.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e33dc719\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138824.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?541f75e5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138825.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5c41b715\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138826.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?444ee8aa\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138827.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?aeb5c5d9\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138828.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dc0a75ee\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138829.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fa5490c5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138830.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5476a2de\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138831.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?20dc171d\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138832.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7afadda7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138833.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a6a36014\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138834.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?33d92ef5\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138835.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6ad23d37\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138836.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0fa6cebb\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138837.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2e89575c\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138838.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?38db91a3\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138839.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2ea5fad7\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/138840.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78eabe9f\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.calligra.org/news/calligra-2-8-6-released/\"\n );\n # https://www.digikam.org/node/718\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.digikam.org/node/718/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:akonadi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:amor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:analitza\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:audiocd-kio\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:baloo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:baloo-widgets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:blinken\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:calligra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:calligra-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:cantor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:digikam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:dragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:filelight\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:gwenview\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:jovie\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:juk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kaccessible\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kalgebra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kalzium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kamera\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kanagram\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kate\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kbruch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kcalc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kcharselect\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kcolorchooser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kcron\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-base-artwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-baseapps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-l10n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-print-manager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-runtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kde-wallpapers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeaccessibility\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeartwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdebindings\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeedu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegraphics\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegraphics-mobipocket\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegraphics-strigi-analyzer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdegraphics-thumbnailers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdelibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdemultimedia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdenetwork\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdenetwork-filesharing\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdenetwork-strigi-analyzers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdepim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdepim-runtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdepimlibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeplasma-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdetoys\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdeutils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kdnssd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kfilemetadata\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kfloppy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kgamma\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kgeography\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kget\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kgpg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:khangman\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kimono\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kiten\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:klettres\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kmag\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kmix\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kmousetool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kmouth\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kmplot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kolourpaint\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:konsole\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kopete\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kphotoalbum\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kppp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kqtquickcharts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:krdc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kremotecontrol\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:krfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kross-interpreters\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kruler\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ksaneplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kscd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ksnapshot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kstars\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ksystemlog\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kteatime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ktimer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ktouch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kturtle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ktux\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kuser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kwalletmanager\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kwordquiz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkcddb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkcompactdisc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkdcraw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkdeedu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkexiv2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkgapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkipi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libkolab\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:libksane\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:marble\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:nepomuk-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:nepomuk-widgets\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:okular\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pairs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:parley\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:pykde4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qyoto\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:rocs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby-korundum\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:smokegen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:smokekde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:smokeqt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:step\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:subsurface\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:superkaramba\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:svgpart\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:sweeper\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"akonadi-1.13.0-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"amor-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"analitza-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ark-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"audiocd-kio-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"baloo-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"baloo-widgets-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"blinken-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"calligra-2.8.6-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"calligra-l10n-2.8.6-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"cantor-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"digikam-4.3.0-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"dragon-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"filelight-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"gwenview-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"jovie-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"juk-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kaccessible-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kalgebra-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kalzium-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kamera-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kanagram-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kate-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kbruch-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kcalc-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kcharselect-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kcolorchooser-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kcron-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kde-base-artwork-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kde-baseapps-4.14.1-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kde-l10n-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kde-print-manager-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kde-runtime-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kde-wallpapers-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdeaccessibility-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdeadmin-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdeartwork-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdebindings-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdeedu-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdegraphics-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdegraphics-mobipocket-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdegraphics-strigi-analyzer-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdegraphics-thumbnailers-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdelibs-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdemultimedia-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdenetwork-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdenetwork-filesharing-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdenetwork-strigi-analyzers-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdepim-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdepim-runtime-4.14.1-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdepimlibs-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdeplasma-addons-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdetoys-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdeutils-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdf-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kdnssd-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kfilemetadata-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kfloppy-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kgamma-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kgeography-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kget-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kgpg-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"khangman-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kig-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kimono-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kiten-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"klettres-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kmag-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kmix-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kmousetool-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kmouth-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kmplot-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kolourpaint-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"konsole-4.14.1-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kopete-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kphotoalbum-4.5-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kppp-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kqtquickcharts-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"krdc-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kremotecontrol-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"krfb-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kross-interpreters-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kruler-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ksaneplugin-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kscd-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ksnapshot-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kstars-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ksystemlog-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kteatime-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ktimer-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ktouch-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kturtle-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ktux-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kuser-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kwalletmanager-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"kwordquiz-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkcddb-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkcompactdisc-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkdcraw-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkdeedu-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkexiv2-4.14.1-2.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkgapi-2.2.0-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkipi-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libkolab-0.5.2-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"libksane-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"marble-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"nepomuk-core-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"nepomuk-widgets-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"okular-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"oxygen-icon-theme-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"pairs-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"parley-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"pykde4-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"qyoto-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"rocs-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ruby-korundum-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"ruby-qt-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"smokegen-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"smokekde-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"smokeqt-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"step-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"subsurface-4.2-1.fc20.1\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"superkaramba-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"svgpart-4.14.1-1.fc20\")) flag++;\nif (rpm_check(release:\"FC20\", reference:\"sweeper-4.14.1-1.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"akonadi / amor / analitza / ark / audiocd-kio / baloo / etc\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:13:08", "description": "updated to the new release of polkit-qt\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-09-22T00:00:00", "title": "Fedora 20 : polkit-qt-0.112.0-1.fc20 (2014-9641)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "modified": "2014-09-22T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:polkit-qt", "cpe:/o:fedoraproject:fedora:20"], "id": "FEDORA_2014-9641.NASL", "href": "https://www.tenable.com/plugins/nessus/77772", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-9641.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77772);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-5033\");\n script_bugtraq_id(68771);\n script_xref(name:\"FEDORA\", value:\"2014-9641\");\n\n script_name(english:\"Fedora 20 : polkit-qt-0.112.0-1.fc20 (2014-9641)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"updated to the new release of polkit-qt\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1094890\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-September/137844.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?27852492\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected polkit-qt package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:polkit-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/09/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"polkit-qt-0.112.0-1.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"polkit-qt\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:15:01", "description": "Updated polkit-qt packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nPolkit-qt is a library that lets developers use the PolicyKit API\nthrough a Qt-styled API. The polkit-qt library is used by the KDE\nAuthentication Agent (KAuth), which is a part of kdelibs.\n\nIt was found that polkit-qt handled authorization requests with\nPolicyKit via a D-Bus API that is vulnerable to a race condition. A\nlocal user could use this flaw to bypass intended PolicyKit\nauthorizations. This update modifies polkit-qt to communicate with\nPolicyKit via a different API that is not vulnerable to the race\ncondition. (CVE-2014-5033)\n\nAll polkit-qt users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.", "edition": 25, "published": "2014-10-07T00:00:00", "title": "RHEL 7 : polkit-qt (RHSA-2014:1359)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "modified": "2014-10-07T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:7.4", "p-cpe:/a:redhat:enterprise_linux:polkit-qt-devel", "cpe:/o:redhat:enterprise_linux:7.7", "cpe:/o:redhat:enterprise_linux:7.5", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:7.3", "p-cpe:/a:redhat:enterprise_linux:polkit-qt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:polkit-qt", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:polkit-qt-doc"], "id": "REDHAT-RHSA-2014-1359.NASL", "href": "https://www.tenable.com/plugins/nessus/78073", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2014:1359. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(78073);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2014-5033\");\n script_xref(name:\"RHSA\", value:\"2014:1359\");\n\n script_name(english:\"RHEL 7 : polkit-qt (RHSA-2014:1359)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated polkit-qt packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available from the\nCVE link in the References section.\n\nPolkit-qt is a library that lets developers use the PolicyKit API\nthrough a Qt-styled API. The polkit-qt library is used by the KDE\nAuthentication Agent (KAuth), which is a part of kdelibs.\n\nIt was found that polkit-qt handled authorization requests with\nPolicyKit via a D-Bus API that is vulnerable to a race condition. A\nlocal user could use this flaw to bypass intended PolicyKit\nauthorizations. This update modifies polkit-qt to communicate with\nPolicyKit via a different API that is not vulnerable to the race\ncondition. (CVE-2014-5033)\n\nAll polkit-qt users are advised to upgrade to these updated packages,\nwhich contain a backported patch to correct this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2014:1359\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2014-5033\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:polkit-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:polkit-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:polkit-qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:polkit-qt-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/10/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2014:1359\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", reference:\"polkit-qt-0.103.0-10.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"polkit-qt-debuginfo-0.103.0-10.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"polkit-qt-devel-0.103.0-10.el7_0\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"polkit-qt-doc-0.103.0-10.el7_0\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"polkit-qt / polkit-qt-debuginfo / polkit-qt-devel / polkit-qt-doc\");\n }\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T15:27:39", "description": "It was discovered that kauth was using polkit in an unsafe manner. A\nlocal attacker could possibly use this issue to bypass intended polkit\nauthorizations.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 22, "published": "2014-08-01T00:00:00", "title": "Ubuntu 12.04 LTS / 14.04 LTS : kde4libs vulnerability (USN-2304-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-5033"], "modified": "2014-08-01T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:kdelibs5-plugins", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2304-1.NASL", "href": "https://www.tenable.com/plugins/nessus/76962", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2304-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76962);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-5033\");\n script_bugtraq_id(68771);\n script_xref(name:\"USN\", value:\"2304-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 14.04 LTS : kde4libs vulnerability (USN-2304-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that kauth was using polkit in an unsafe manner. A\nlocal attacker could possibly use this issue to bypass intended polkit\nauthorizations.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2304-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kdelibs5-plugins package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:kdelibs5-plugins\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/08/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2014-2020 Canonical, Inc. / NASL script (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"kdelibs5-plugins\", pkgver:\"4:4.8.5-0ubuntu0.4\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"kdelibs5-plugins\", pkgver:\"4:4.13.2a-0ubuntu0.3\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kdelibs5-plugins\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:15:49", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Package : kde4libs\nVersion : 4:4.4.5-2+squeeze4\nCVE ID : CVE-2014-5033\n\nIt was discovered that KAuth, part of kdelibs, uses polkit in a way\nthat is prone to a race condition that may allow authorization bypass.\n", "edition": 9, "modified": "2014-10-24T11:43:39", "published": "2014-10-24T11:43:39", "id": "DEBIAN:DLA-76-1:76BAE", "href": "https://lists.debian.org/debian-lts-announce/2014/debian-lts-announce-201410/msg00009.html", "title": "[SECURITY] [DLA 76-1] kde4libs security update", "type": "debian", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-12T00:59:53", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3004-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nAugust 11, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : kde4libs\nCVE ID : CVE-2014-5033\n\nSebastian Krahmer discovered that Kauth used Policykit insecurely by \nrelying on the process ID. This could result in privilege escalation.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 4:4.8.4-4+deb7u1.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 4:4.13.3-2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 4:4.13.3-2.\n\nWe recommend that you upgrade your kde4libs packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 7, "modified": "2014-08-10T22:34:59", "published": "2014-08-10T22:34:59", "id": "DEBIAN:DSA-3004-1:D05F2", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00186.html", "title": "[SECURITY] [DSA 3004-1] kde4libs security update", "type": "debian", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:35:49", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "It was discovered that kauth was using polkit in an unsafe manner. A local \nattacker could possibly use this issue to bypass intended polkit \nauthorizations.", "edition": 5, "modified": "2014-07-31T00:00:00", "published": "2014-07-31T00:00:00", "id": "USN-2304-1", "href": "https://ubuntu.com/security/notices/USN-2304-1", "title": "KDE-Libs vulnerability", "type": "ubuntu", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:44:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-5033"], "description": "Polkit-qt is a library that lets developers use the PolicyKit API through a\nQt-styled API. The polkit-qt library is used by the KDE Authentication\nAgent (KAuth), which is a part of kdelibs.\n\nIt was found that polkit-qt handled authorization requests with PolicyKit\nvia a D-Bus API that is vulnerable to a race condition. A local user could\nuse this flaw to bypass intended PolicyKit authorizations. This update\nmodifies polkit-qt to communicate with PolicyKit via a different API that\nis not vulnerable to the race condition. (CVE-2014-5033)\n\nAll polkit-qt users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.\n", "modified": "2018-04-12T03:32:50", "published": "2014-10-06T04:00:00", "id": "RHSA-2014:1359", "href": "https://access.redhat.com/errata/RHSA-2014:1359", "type": "redhat", "title": "(RHSA-2014:1359) Important: polkit-qt security update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}]}