ID OPENVAS:865975 Type openvas Reporter Copyright (c) 2013 Greenbone Networks GmbH Modified 2017-07-10T00:00:00
Description
Check for the Version of kiten
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for kiten FEDORA-2013-10182
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_affected = "kiten on Fedora 17";
tag_insight = "Japanese Reference/Study Tool.";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_id(865975);
script_version("$Revision: 6628 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-10 08:32:47 +0200 (Mon, 10 Jul 2017) $");
script_tag(name:"creation_date", value:"2013-06-18 10:38:01 +0530 (Tue, 18 Jun 2013)");
script_cve_id("CVE-2013-2120");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Fedora Update for kiten FEDORA-2013-10182");
script_xref(name: "FEDORA", value: "2013-10182");
script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109143.html");
script_summary("Check for the Version of kiten");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2013 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "FC17")
{
if ((res = isrpmvuln(pkg:"kiten", rpm:"kiten~4.10.4~1.fc17", rls:"FC17")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:865975", "bulletinFamily": "scanner", "title": "Fedora Update for kiten FEDORA-2013-10182", "description": "Check for the Version of kiten", "published": "2013-06-18T00:00:00", "modified": "2017-07-10T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865975", "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "references": ["2013-10182", "https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109143.html"], "cvelist": ["CVE-2013-2120"], "type": "openvas", "lastseen": "2017-07-25T10:51:45", "history": [{"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2013-2120"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Check for the Version of kiten", "edition": 1, "enchantments": {}, "hash": "99b91937a74254e5d52a8bfd9bcf1f138b3b982ccaf321363579546c7444f802", "hashmap": [{"hash": "98da6d012ea545a1e6678fc9f410f0cd", "key": "published"}, {"hash": "95b4824e2663c8c0da59a02ce072f287", "key": "sourceData"}, {"hash": "dc0a7bbea63c1ddc7ad6476938d06728", "key": "pluginID"}, {"hash": "9a2b77cd4f5593e15c6ce0e2754c94c1", "key": "description"}, {"hash": "b086364d7a8c525f52b4fa3fbfe67a2b", "key": "title"}, {"hash": "3b52ddb4f187a17dbac24cb856ffff86", "key": "modified"}, {"hash": "1a99a5f9a50e5bac3b749d8558d5e46b", "key": "reporter"}, {"hash": "80addae16f6c21ce5066dd87a3ca1555", "key": "cvelist"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5830142bc00dc28717adbe00bf5faeb8", "key": "href"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "20fe52ab2b5ca1833ca747c465755780", "key": "references"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=865975", "id": "OPENVAS:865975", "lastseen": "2017-07-02T21:11:08", "modified": "2016-03-18T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "865975", "published": "2013-06-18T00:00:00", "references": ["2013-10182", "https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109143.html"], "reporter": "Copyright (c) 2013 Greenbone Networks GmbH", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kiten FEDORA-2013-10182\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"kiten on Fedora 17\";\ntag_insight = \"Japanese Reference/Study Tool.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(865975);\n script_version(\"$Revision: 2889 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-03-18 12:20:44 +0100 (Fri, 18 Mar 2016) $\");\n script_tag(name:\"creation_date\", value:\"2013-06-18 10:38:01 +0530 (Tue, 18 Jun 2013)\");\n script_cve_id(\"CVE-2013-2120\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for kiten FEDORA-2013-10182\");\n\n script_xref(name: \"FEDORA\", value: \"2013-10182\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109143.html\");\n script_summary(\"Check for the Version of kiten\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"HostDetails/OS/cpe:/o:fedoraproject:fedora\", \"login/SSH/success\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"kiten\", rpm:\"kiten~4.10.4~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "title": "Fedora Update for kiten FEDORA-2013-10182", "type": "openvas", "viewCount": 0}, "differentElements": ["modified", "sourceData"], "edition": 1, "lastseen": "2017-07-02T21:11:08"}], "edition": 2, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "80addae16f6c21ce5066dd87a3ca1555"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "9a2b77cd4f5593e15c6ce0e2754c94c1"}, {"key": "href", "hash": "5830142bc00dc28717adbe00bf5faeb8"}, {"key": "modified", "hash": "0d134bf170d66438eb1e01173ee0187f"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "dc0a7bbea63c1ddc7ad6476938d06728"}, {"key": "published", "hash": "98da6d012ea545a1e6678fc9f410f0cd"}, {"key": "references", "hash": "20fe52ab2b5ca1833ca747c465755780"}, {"key": "reporter", "hash": "1a99a5f9a50e5bac3b749d8558d5e46b"}, {"key": "sourceData", "hash": "0063a146b2c5631cb230120051ba47a8"}, {"key": "title", "hash": "b086364d7a8c525f52b4fa3fbfe67a2b"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "daf5e486358c7289658bd6d8d3fdde4f867191fee578ef3e5359c49731723d23", "viewCount": 0, "enchantments": {"vulnersScore": 7.5}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kiten FEDORA-2013-10182\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\ntag_affected = \"kiten on Fedora 17\";\ntag_insight = \"Japanese Reference/Study Tool.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(865975);\n script_version(\"$Revision: 6628 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:32:47 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2013-06-18 10:38:01 +0530 (Tue, 18 Jun 2013)\");\n script_cve_id(\"CVE-2013-2120\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Fedora Update for kiten FEDORA-2013-10182\");\n\n script_xref(name: \"FEDORA\", value: \"2013-10182\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2013-June/109143.html\");\n script_summary(\"Check for the Version of kiten\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2013 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"kiten\", rpm:\"kiten~4.10.4~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "865975"}
{"result": {"openvas": [{"id": "OPENVAS:865888", "type": "openvas", "title": "Fedora Update for kdenetwork FEDORA-2013-10182", "description": "Check for the Version of kdenetwork", "published": "2013-06-18T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865888", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-18T11:08:54"}, {"id": "OPENVAS:865880", "type": "openvas", "title": "Fedora Update for kblocks FEDORA-2013-10182", "description": "Check for the Version of kblocks", "published": "2013-06-18T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865880", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-18T11:08:54"}, {"id": "OPENVAS:865794", "type": "openvas", "title": "Fedora Update for kdemultimedia FEDORA-2013-10130", "description": "Check for the Version of kdemultimedia", "published": "2013-06-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865794", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-23T13:09:55"}, {"id": "OPENVAS:865876", "type": "openvas", "title": "Fedora Update for libkdegames FEDORA-2013-10182", "description": "Check for the Version of libkdegames", "published": "2013-06-18T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865876", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-19T15:09:12"}, {"id": "OPENVAS:865985", "type": "openvas", "title": "Fedora Update for ruby-korundum FEDORA-2013-10182", "description": "Check for the Version of ruby-korundum", "published": "2013-06-18T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865985", "cvelist": ["CVE-2013-2120"], "lastseen": "2017-07-25T10:51:51"}, {"id": "OPENVAS:865803", "type": "openvas", "title": "Fedora Update for kfourinline FEDORA-2013-10130", "description": "Check for the Version of kfourinline", "published": "2013-06-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865803", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-19T15:09:27"}, {"id": "OPENVAS:865746", "type": "openvas", "title": "Fedora Update for kjumpingcube FEDORA-2013-10130", "description": "Check for the Version of kjumpingcube", "published": "2013-06-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865746", "cvelist": ["CVE-2013-2120"], "lastseen": "2017-07-25T10:52:12"}, {"id": "OPENVAS:866005", "type": "openvas", "title": "Fedora Update for palapeli FEDORA-2013-10182", "description": "Check for the Version of palapeli", "published": "2013-06-18T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=866005", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-19T15:08:50"}, {"id": "OPENVAS:865724", "type": "openvas", "title": "Fedora Update for libkcompactdisc FEDORA-2013-10130", "description": "Check for the Version of libkcompactdisc", "published": "2013-06-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865724", "cvelist": ["CVE-2013-2120"], "lastseen": "2018-01-24T11:09:30"}, {"id": "OPENVAS:865822", "type": "openvas", "title": "Fedora Update for kdegraphics FEDORA-2013-10130", "description": "Check for the Version of kdegraphics", "published": "2013-06-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=865822", "cvelist": ["CVE-2013-2120"], "lastseen": "2017-07-25T10:51:44"}], "nessus": [{"id": "FEDORA_2013-10052.NASL", "type": "nessus", "title": "Fedora 19 : analitza-4.10.4-1.fc19 / ark-4.10.4-1.fc19 / audiocd-kio-4.10.4-1.fc19 / etc (2013-10052)", "description": "kde 4.10.4 bugfix release, see also:\nhttp://kde.org/announcements/announce-4.10.4.php\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2013-07-12T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=67265", "cvelist": ["CVE-2013-2120"], "lastseen": "2017-10-29T13:33:51"}]}}