About the security content of Mac OS X v10.6.7 and Security Update 2011-001
Last Modified: March 21, 2011
Article: HT4581
Email this article
Print this page
Summary
This document describes the security content of Mac OS X v10.6.7 and Security Update 2011-001, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates."
Products Affected
Mac OS X 10.6, Product Security
Mac OS X v10.6.7 and Security Update 2011-001
AirPort
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset
Description: A divide by zero issue existed in the handling of Wi-Fi frames. When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0172
Apache
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in Apache 2.2.15
Description: Apache is updated to version 2.2.17 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/
CVE-ID
CVE-2010-1452
CVE-2010-2068
AppleScript
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution
Description: A format string issue existed in AppleScript Studio's generic dialog commands ("display dialog" and "display alert"). Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0173 : Alexander Strange
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: A heap buffer overflow issue existed in the handling of OpenType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0174
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling of TrueType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0175 : Christoph Diehl of Mozilla, Felix Grobert of the Google Security Team, Marc Schoenefeld of Red Hat Security Response Team, Tavis Ormandy and Will Drewry of Google Security Team
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling of Type 1 fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0176 : Felix Grobert of the Google Security Team, geekable working with TippingPoint's Zero Day Initiative
ATS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: Multiple buffer overflow issues existed in the handling of SFNT tables. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0177 : Marc Schoenefeld of Red Hat Security Response Team
bzip2
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in bzip2's handling of bzip2 compressed files. Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-0405
CarbonCore
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Applications that use FSFindFolder() with the kTemporaryFolderType flag may be vulnerable to a local information disclosure
Description: When used with the kTemporaryFolderType flag, the FSFindFolder() API returns a directory that is world readable. This issue is addressed by returning a directory that is only readable by the user that the process is running as.
CVE-ID
CVE-2011-0178
ClamAV
Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6.6
Impact: Multiple vulnerabilities in ClamAV
Description: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.96.5. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/
CVE-ID
CVE-2010-0405
CVE-2010-3434
CVE-2010-4260
CVE-2010-4261
CVE-2010-4479
CoreText
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution
Description: A memory corruption issue existed in CoreText's handling of font files. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.
CVE-ID
CVE-2011-0179 : Christoph Diehl of Mozilla
File Quarantine
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Definition added
Description: The OSX.OpinionSpy definition has been added to the malware check within File Quarantine.
HFS
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem
Description: An integer overflow issue existed in the handling of the F_READBOOTSTRAP ioctl. A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem.
CVE-ID
CVE-2011-0180 : Dan Rosenberg of Virtual Security Research
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A heap buffer overflow issue existed in ImageIO's handling of JPEG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0170 : Andrzej Dyjak working with iDefense VCP
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in ImageIO's handling of XBM images. Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0181 : Harry Sintonen
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libTIFF's handling of JPEG encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0191 : Apple
ImageIO
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libTIFF's handling of CCITT Group 4 encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0192 : Apple
ImageIO
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted JPEG-encoded TIFF image may result in an unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in ImageIO's handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0194 : Dominic Chell of NGS Secure
Image RAW
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution
Description: Multiple buffer overflow issues existed in Image RAW's handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0193 : Paul Harrington of NGS Secure
Installer
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to the installation of an agent that contacts an arbitrary server when the user logs in, and mislead the user into thinking that the connection is with Apple
Description: A URL processing issue in Install Helper may lead to the installation of an agent that contacts an arbitrary server when the user logs in. The dialog resulting from a connection failure may lead the user to believe that the connection was attempted with Apple. This issue is addressed by removing Install Helper.
CVE-ID
CVE-2011-0190 : Aaron Sigel of vtty.com
Kerberos
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in MIT Kerberos 5
Description: Multiple cryptographic issues existed in MIT Kerberos 5. Only CVE-2010-1323 affects Mac OS X v10.5. Further information on the issues and the patches applied is available via the MIT Kerberos website at http://web.mit.edu/Kerberos/
CVE-ID
CVE-2010-1323
CVE-2010-1324
CVE-2010-4020
CVE-2010-4021
Kernel
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A privilege checking issue existed in the i386_set_ldt system call's handling of call gates. A local user may be able to execute arbitrary code with system privileges. This issue is addressed by disallowing creation of call gate entries via i386_set_ldt().
CVE-ID
CVE-2011-0182 : Jeff Mears
Libinfo
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: A remote attacker may be able to cause a denial of service on hosts that export NFS file systems
Description: An integer truncation issue existed in Libinfo's handling of NFS RPC packets. A remote attacker may be able to cause NFS RPC services such as lockd, statd, mountd, and portmap to become unresponsive.
CVE-ID
CVE-2011-0183 : Peter Schwenk of the University of Delaware
libxml
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in libxml's XPath handling. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-4008 : Bui Quang Minh from Bkis (www.bkis.com)
libxml
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A double free issue existed in libxml's handling of XPath expressions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2010-4494 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences
Mailman
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in Mailman 2.1.13
Description: Multiple cross-site scripting issues existed in Mailman 2.1.13. These issues are addressed by updating Mailman to version 2.1.14. Further information is available via the Mailman site at http://mail.python.org/pipermail/mailman-announce/2010-September/000154.html
CVE-ID
CVE-2010-3089
PHP
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in PHP 5.3.3
Description: PHP is updated to version 5.3.4 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/
CVE-ID
CVE-2006-7243
CVE-2010-2950
CVE-2010-3709
CVE-2010-3710
CVE-2010-3870
CVE-2010-4150
CVE-2010-4409
PHP
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8
Impact: Multiple vulnerabilities in PHP 5.2.14
Description: PHP is updated to version 5.2.15 to address multiple vulnerabilities, the most serious of which may lead to arbitary code execution. Further information is available via the PHP website at http://www.php.net/
CVE-ID
CVE-2010-3436
CVE-2010-3709
CVE-2010-4150
QuickLook
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickLook's handling of Excel files. Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0184 : Tobias Klein working with Verisign iDefense Labs
QuickLook
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-1417 : Charlie Miller and Dion Blazakis, working with TippingPoint's Zero Day Initiative
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime's handling of JPEG2000 images. Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0186 : Will Dormann of the CERT/CC
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: An integer overflow existed in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-4009 : Honggang Ren of Fortinet's FortiGuard Labs
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-3801 : Damian Put working with TippingPoint's Zero Day Initiative, and Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Visiting a maliciously crafted website may lead to the disclosure of video data from another site
Description: A cross-origin issue existed in QuickTime plug-in's handling of cross-site redirects. Visiting a maliciously crafted website may lead to the disclosure of video data from another site. This issue is addressed by preventing QuickTime from following cross-site redirects.
CVE-ID
CVE-2011-0187 : Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR)
QuickTime
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.
CVE-ID
CVE-2010-3802 : an anonymous researcher working with TippingPoint's Zero Day Initiative
Ruby
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution
Description: An integer truncation issue existed in Ruby's BigDecimal class. Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution. This issue only affects 64-bit Ruby processes.
CVE-ID
CVE-2011-0188 : Apple
Samba
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution
Description: A stack buffer overflow existed in Samba's handling of Windows Security IDs. If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution.
CVE-ID
CVE-2010-3069
Subversion
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Subversion servers that use the non-default "SVNPathAuthz short_circuit" mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository
Description: Subversion servers that use the non-default "SVNPathAuthz short_circuit" mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository. This issue is addressed by updating Subversion to version 1.6.13. This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2010-3315
Terminal
Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version
Description: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version. This issue is addressed by changing the default protocol version to "Automatic". This issue does not affect systems prior to Mac OS X v10.6.
CVE-ID
CVE-2011-0189 : Matt Warren of HNW Inc.
X11
Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6
Impact: Multiple vulnerabilities in FreeType
Description: Multiple vulnerabilities existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. These issues are addressed by updating FreeType to version 2.4.3. Further information is available via the FreeType site at http://www.freetype.org/
CVE-ID
CVE-2010-3814
CVE-2010-3855
{"id": "SECURITYVULNS:DOC:25963", "vendorId": null, "type": "securityvulns", "bulletinFamily": "software", "title": "About the security content of Mac OS X v10.6.7 and Security Update 2011-001", "description": "About the security content of Mac OS X v10.6.7 and Security Update 2011-001\r\n\r\n Last Modified: March 21, 2011\r\n Article: HT4581\r\n\r\nEmail this article\r\nPrint this page\r\nSummary\r\n\r\nThis document describes the security content of Mac OS X v10.6.7 and Security Update 2011-001, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.\r\n\r\nFor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.\r\n\r\nFor information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."\r\n\r\nWhere possible, CVE IDs are used to reference the vulnerabilities for further information.\r\n\r\nTo learn about other Security Updates, see "Apple Security Updates."\r\nProducts Affected\r\n\r\nMac OS X 10.6, Product Security\r\nMac OS X v10.6.7 and Security Update 2011-001\r\n\r\n AirPort\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset\r\n\r\n Description: A divide by zero issue existed in the handling of Wi-Fi frames. When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0172\r\n\r\n Apache\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in Apache 2.2.15\r\n\r\n Description: Apache is updated to version 2.2.17 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-1452\r\n\r\n CVE-2010-2068\r\n\r\n AppleScript\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A format string issue existed in AppleScript Studio's generic dialog commands ("display dialog" and "display alert"). Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0173 : Alexander Strange\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: A heap buffer overflow issue existed in the handling of OpenType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0174\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in the handling of TrueType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0175 : Christoph Diehl of Mozilla, Felix Grobert of the Google Security Team, Marc Schoenefeld of Red Hat Security Response Team, Tavis Ormandy and Will Drewry of Google Security Team\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in the handling of Type 1 fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0176 : Felix Grobert of the Google Security Team, geekable working with TippingPoint's Zero Day Initiative\r\n\r\n ATS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in the handling of SFNT tables. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0177 : Marc Schoenefeld of Red Hat Security Response Team\r\n\r\n bzip2\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in bzip2's handling of bzip2 compressed files. Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-0405\r\n\r\n CarbonCore\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Applications that use FSFindFolder() with the kTemporaryFolderType flag may be vulnerable to a local information disclosure\r\n\r\n Description: When used with the kTemporaryFolderType flag, the FSFindFolder() API returns a directory that is world readable. This issue is addressed by returning a directory that is only readable by the user that the process is running as.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0178\r\n\r\n ClamAV\r\n\r\n Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in ClamAV\r\n\r\n Description: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.96.5. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-0405\r\n\r\n CVE-2010-3434\r\n\r\n CVE-2010-4260\r\n\r\n CVE-2010-4261\r\n\r\n CVE-2010-4479\r\n\r\n CoreText\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in CoreText's handling of font files. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0179 : Christoph Diehl of Mozilla\r\n\r\n File Quarantine\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Definition added\r\n\r\n Description: The OSX.OpinionSpy definition has been added to the malware check within File Quarantine.\r\n\r\n HFS\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem\r\n\r\n Description: An integer overflow issue existed in the handling of the F_READBOOTSTRAP ioctl. A local user may be able to read arbitrary files from an HFS, HFS+, or HFS+J filesystem.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0180 : Dan Rosenberg of Virtual Security Research\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A heap buffer overflow issue existed in ImageIO's handling of JPEG images. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n \r\n\r\n CVE-ID\r\n\r\n CVE-2011-0170 : Andrzej Dyjak working with iDefense VCP\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in ImageIO's handling of XBM images. Viewing a maliciously crafted XBM image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0181 : Harry Sintonen\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow existed in libTIFF's handling of JPEG encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0191 : Apple\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: A buffer overflow existed in libTIFF's handling of CCITT Group 4 encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0192 : Apple\r\n\r\n ImageIO\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted JPEG-encoded TIFF image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow issue existed in ImageIO's handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0194 : Dominic Chell of NGS Secure\r\n\r\n Image RAW\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution\r\n\r\n Description: Multiple buffer overflow issues existed in Image RAW's handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0193 : Paul Harrington of NGS Secure\r\n\r\n Installer\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to the installation of an agent that contacts an arbitrary server when the user logs in, and mislead the user into thinking that the connection is with Apple\r\n\r\n Description: A URL processing issue in Install Helper may lead to the installation of an agent that contacts an arbitrary server when the user logs in. The dialog resulting from a connection failure may lead the user to believe that the connection was attempted with Apple. This issue is addressed by removing Install Helper.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0190 : Aaron Sigel of vtty.com\r\n\r\n Kerberos\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in MIT Kerberos 5\r\n\r\n Description: Multiple cryptographic issues existed in MIT Kerberos 5. Only CVE-2010-1323 affects Mac OS X v10.5. Further information on the issues and the patches applied is available via the MIT Kerberos website at http://web.mit.edu/Kerberos/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-1323\r\n\r\n CVE-2010-1324\r\n\r\n CVE-2010-4020\r\n\r\n CVE-2010-4021\r\n\r\n Kernel\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: A local user may be able to execute arbitrary code with system privileges\r\n\r\n Description: A privilege checking issue existed in the i386_set_ldt system call's handling of call gates. A local user may be able to execute arbitrary code with system privileges. This issue is addressed by disallowing creation of call gate entries via i386_set_ldt().\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0182 : Jeff Mears\r\n\r\n Libinfo\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: A remote attacker may be able to cause a denial of service on hosts that export NFS file systems\r\n\r\n Description: An integer truncation issue existed in Libinfo's handling of NFS RPC packets. A remote attacker may be able to cause NFS RPC services such as lockd, statd, mountd, and portmap to become unresponsive.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0183 : Peter Schwenk of the University of Delaware\r\n\r\n libxml\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in libxml's XPath handling. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4008 : Bui Quang Minh from Bkis (www.bkis.com)\r\n\r\n libxml\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A double free issue existed in libxml's handling of XPath expressions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4494 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences\r\n\r\n Mailman\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in Mailman 2.1.13\r\n\r\n Description: Multiple cross-site scripting issues existed in Mailman 2.1.13. These issues are addressed by updating Mailman to version 2.1.14. Further information is available via the Mailman site at http://mail.python.org/pipermail/mailman-announce/2010-September/000154.html\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3089\r\n\r\n PHP\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in PHP 5.3.3\r\n\r\n Description: PHP is updated to version 5.3.4 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/\r\n\r\n CVE-ID\r\n\r\n CVE-2006-7243\r\n\r\n CVE-2010-2950\r\n\r\n CVE-2010-3709\r\n\r\n CVE-2010-3710\r\n\r\n CVE-2010-3870\r\n\r\n CVE-2010-4150\r\n\r\n CVE-2010-4409\r\n\r\n PHP\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8\r\n\r\n Impact: Multiple vulnerabilities in PHP 5.2.14\r\n\r\n Description: PHP is updated to version 5.2.15 to address multiple vulnerabilities, the most serious of which may lead to arbitary code execution. Further information is available via the PHP website at http://www.php.net/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3436\r\n\r\n CVE-2010-3709\r\n\r\n CVE-2010-4150\r\n\r\n QuickLook\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickLook's handling of Excel files. Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0184 : Tobias Klein working with Verisign iDefense Labs\r\n\r\n QuickLook\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-1417 : Charlie Miller and Dion Blazakis, working with TippingPoint's Zero Day Initiative\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: Multiple memory corruption issues existed in QuickTime's handling of JPEG2000 images. Viewing a maliciously crafted JPEG2000 image with QuickTime may lead to an unexpected application termination or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0186 : Will Dormann of the CERT/CC\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer overflow existed in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-4009 : Honggang Ren of Fortinet's FortiGuard Labs\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickTime's handling of FlashPix images. Viewing a maliciously crafted FlashPix image may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3801 : Damian Put working with TippingPoint's Zero Day Initiative, and Rodrigo Rubira Branco from the Check Point Vulnerability Discovery Team\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Visiting a maliciously crafted website may lead to the disclosure of video data from another site\r\n\r\n Description: A cross-origin issue existed in QuickTime plug-in's handling of cross-site redirects. Visiting a maliciously crafted website may lead to the disclosure of video data from another site. This issue is addressed by preventing QuickTime from following cross-site redirects.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0187 : Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR)\r\n\r\n QuickTime\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: A memory corruption issue existed in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3802 : an anonymous researcher working with TippingPoint's Zero Day Initiative\r\n\r\n Ruby\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution\r\n\r\n Description: An integer truncation issue existed in Ruby's BigDecimal class. Running a Ruby script that uses untrusted input to create a BigDecimal object may lead to an unexpected application termination or arbitrary code execution. This issue only affects 64-bit Ruby processes.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0188 : Apple\r\n\r\n Samba\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution\r\n\r\n Description: A stack buffer overflow existed in Samba's handling of Windows Security IDs. If SMB file sharing is enabled, a remote attacker may cause a denial of service or arbitrary code execution.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3069\r\n\r\n Subversion\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Subversion servers that use the non-default "SVNPathAuthz short_circuit" mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository\r\n\r\n Description: Subversion servers that use the non-default "SVNPathAuthz short_circuit" mod_dav_svn configuration setting may allow unauthorized users to access portions of the repository. This issue is addressed by updating Subversion to version 1.6.13. This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3315\r\n\r\n Terminal\r\n\r\n Available for: Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version\r\n\r\n Description: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version. This issue is addressed by changing the default protocol version to "Automatic". This issue does not affect systems prior to Mac OS X v10.6.\r\n\r\n CVE-ID\r\n\r\n CVE-2011-0189 : Matt Warren of HNW Inc.\r\n\r\n X11\r\n\r\n Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.6, Mac OS X Server v10.6 through v10.6.6\r\n\r\n Impact: Multiple vulnerabilities in FreeType\r\n\r\n Description: Multiple vulnerabilities existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. These issues are addressed by updating FreeType to version 2.4.3. Further information is available via the FreeType site at http://www.freetype.org/\r\n\r\n CVE-ID\r\n\r\n CVE-2010-3814\r\n\r\n CVE-2010-3855\r\n", "published": "2011-03-23T00:00:00", "modified": "2011-03-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "cvss2": {}, "cvss3": {}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25963", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2011-0187", "CVE-2010-4008", "CVE-2011-0181", "CVE-2011-0174", "CVE-2011-0186", "CVE-2011-0182", "CVE-2011-0173", "CVE-2011-0188", "CVE-2011-0176", "CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4261", "CVE-2010-3802", "CVE-2010-3089", "CVE-2011-0175", "CVE-2006-7243", "CVE-2010-3436", "CVE-2011-0189", "CVE-2010-4021", "CVE-2011-0180", "CVE-2010-3870", "CVE-2011-0184", "CVE-2011-0190", "CVE-2011-0179", "CVE-2011-0170", "CVE-2010-4009", "CVE-2010-3801", "CVE-2010-2068", "CVE-2011-0191", "CVE-2011-0178", "CVE-2010-0405", "CVE-2011-1417", "CVE-2011-0194", "CVE-2010-3315", "CVE-2010-1452", "CVE-2010-4479", "CVE-2010-3709", "CVE-2011-0172", "CVE-2011-0193", "CVE-2010-4494", "CVE-2011-0177", "CVE-2010-3710", "CVE-2010-3855", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-3814", "CVE-2010-4409", "CVE-2010-4260", "CVE-2010-1323", "CVE-2010-3434", "CVE-2010-3069", "CVE-2011-0192", "CVE-2011-0183"], "immutableFields": [], "lastseen": "2018-08-31T11:10:39", "viewCount": 20, "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {"references": [{"type": "canvas", "idList": ["CVE_2011_0182"]}, {"type": "centos", "idList": ["CESA-2010:0659", "CESA-2010:0697", "CESA-2010:0698", "CESA-2010:0703", "CESA-2010:0889", "CESA-2010:0919", "CESA-2010:0926", "CESA-2011:0196", "CESA-2011:0307", "CESA-2011:0318", "CESA-2011:0908", "CESA-2011:0909", "CESA-2012:0017", "CESA-2012:1046", "CESA-2012:1047", "CESA-2013:0217", "CESA-2013:1307", "CESA-2013:1615", "CESA-2014:0311"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2010-317", "CPAI-2010-448"]}, {"type": "cloudlinux", "idList": ["CLSA-2020:1605798462"]}, {"type": "cve", "idList": ["CVE-2006-7243", "CVE-2009-5016", "CVE-2010-0405", "CVE-2010-1323", "CVE-2010-1324", "CVE-2010-1452", "CVE-2010-2068", "CVE-2010-2791", "CVE-2010-2950", "CVE-2010-3069", "CVE-2010-3089", "CVE-2010-3090", "CVE-2010-3315", "CVE-2010-3434", "CVE-2010-3436", "CVE-2010-3709", "CVE-2010-3710", "CVE-2010-3717", "CVE-2010-3801", "CVE-2010-3802", "CVE-2010-3814", "CVE-2010-3855", "CVE-2010-3870", "CVE-2010-4008", "CVE-2010-4009", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-4150", "CVE-2010-4200", "CVE-2010-4260", "CVE-2010-4261", "CVE-2010-4409", "CVE-2010-4479", "CVE-2010-4494", "CVE-2010-4510", "CVE-2011-0170", "CVE-2011-0172", "CVE-2011-0173", "CVE-2011-0174", "CVE-2011-0175", "CVE-2011-0176", "CVE-2011-0177", "CVE-2011-0178", "CVE-2011-0179", "CVE-2011-0180", "CVE-2011-0181", "CVE-2011-0182", "CVE-2011-0183", "CVE-2011-0184", "CVE-2011-0186", "CVE-2011-0187", "CVE-2011-0188", "CVE-2011-0189", "CVE-2011-0190", "CVE-2011-0191", "CVE-2011-0192", "CVE-2011-0193", "CVE-2011-0194", "CVE-2011-1417", "CVE-2011-1467", "CVE-2015-2348", "CVE-2015-4025", "CVE-2015-4026"]}, {"type": "debian", "idList": ["DEBIAN:BSA-003-:A9953", "DEBIAN:BSA-003:A9953", "DEBIAN:BSA-004-:1B7CA", "DEBIAN:BSA-004:1B7CA", "DEBIAN:DLA-235-1:FDEBD", "DEBIAN:DLA-307-1:2C3AB", "DEBIAN:DLA-444-1:A9010", "DEBIAN:DLA-88-1:4DC9E", "DEBIAN:DLA-88-1:B6B6B", "DEBIAN:DSA-2109-1:01088", "DEBIAN:DSA-2109-1:BC2CD", "DEBIAN:DSA-2112-1:62ADF", "DEBIAN:DSA-2112-1:F33B1", "DEBIAN:DSA-2118-1:A7BB7", "DEBIAN:DSA-2128-1:9A59D", "DEBIAN:DSA-2128-1:C1BCC", "DEBIAN:DSA-2129-1:29FDB", "DEBIAN:DSA-2129-1:84AD3", "DEBIAN:DSA-2137-1:C10DC", "DEBIAN:DSA-2155-1:1AC92", "DEBIAN:DSA-2170-1:B6E29", "DEBIAN:DSA-2195-1:4E400", "DEBIAN:DSA-2210-1:C259B", "DEBIAN:DSA-2210-2:4738C", "DEBIAN:DSA-2210-2:5A47B", "DEBIAN:DSA-2298-1:A7091", "DEBIAN:DSA-2298-1:DA864", "DEBIAN:DSA-2298-2:841EC", "DEBIAN:DSA-2298-2:8F734"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2010-0405", "DEBIANCVE:CVE-2010-1323", "DEBIANCVE:CVE-2010-1324", "DEBIANCVE:CVE-2010-1452", "DEBIANCVE:CVE-2010-2068", "DEBIANCVE:CVE-2010-2791", "DEBIANCVE:CVE-2010-3069", "DEBIANCVE:CVE-2010-3089", "DEBIANCVE:CVE-2010-3315", "DEBIANCVE:CVE-2010-3434", "DEBIANCVE:CVE-2010-3814", "DEBIANCVE:CVE-2010-3855", "DEBIANCVE:CVE-2010-4008", "DEBIANCVE:CVE-2010-4020", "DEBIANCVE:CVE-2010-4021", "DEBIANCVE:CVE-2010-4260", "DEBIANCVE:CVE-2010-4261", "DEBIANCVE:CVE-2010-4479", "DEBIANCVE:CVE-2010-4494", "DEBIANCVE:CVE-2011-0191", "DEBIANCVE:CVE-2011-0192"]}, {"type": "exploitdb", "idList": ["EDB-ID:15431", "EDB-ID:15722", "EDB-ID:17901"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:2362B3CF1283EA7F9B4BA247C2F89A6C", "EXPLOITPACK:56454A05D1777D8A4A95A5104783A7BE", "EXPLOITPACK:BB59B757E75F3F464806FB1C3734123D"]}, {"type": "f5", "idList": ["F5:K13518", "F5:K13519", "F5:K16993", "F5:K23332326", "SOL13518", "SOL13519", "SOL15878", "SOL15899", "SOL15903", "SOL16993", "SOL23332326"]}, {"type": "fedora", "idList": ["FEDORA:07D01111076", "FEDORA:0BC23110B05", "FEDORA:0CD4811064A", "FEDORA:160FF110772", "FEDORA:1E0BC10F8A8", "FEDORA:22BD3110E87", "FEDORA:23C8D110D22", "FEDORA:2D337110EEA", "FEDORA:2E68F60906AD", "FEDORA:3076E110B88", "FEDORA:328761107D7", "FEDORA:37CF11114DB", "FEDORA:3E0A910F8D1", "FEDORA:3F648110911", "FEDORA:3FA1E110C4D", "FEDORA:4D27511078F", "FEDORA:4E3F6110FC9", "FEDORA:518F8167B60", "FEDORA:6247110F93D", "FEDORA:62C2E110B16", "FEDORA:633B721592", "FEDORA:78C9A110DAF", "FEDORA:7C6691106BF", "FEDORA:7E3B7110DD5", "FEDORA:85B6610F928", "FEDORA:8FC086090BCB", "FEDORA:910EF11114E", "FEDORA:91EE61107B5", "FEDORA:9A557110A85", "FEDORA:9E58C10FE3D", "FEDORA:9FB0E20B43", "FEDORA:AAD0E1109EF", "FEDORA:ACB9021214", "FEDORA:B214B10F875", "FEDORA:C572C1110A3", "FEDORA:C5CF5110B0A", "FEDORA:C69E9110A82", "FEDORA:C8DE210FFBA", "FEDORA:C9FB11110D9", "FEDORA:CAB2111090C", "FEDORA:D1042111102", "FEDORA:D3AAD11111B", "FEDORA:DB0451110AA", "FEDORA:E1A0E1110CE", "FEDORA:E2CC010FA21", "FEDORA:E35C31109C3", "FEDORA:E4C4C110E5F", "FEDORA:E5BC01110D2", "FEDORA:E665E111EAB", "FEDORA:E6D8C600FD68", "FEDORA:E7E4811074C", "FEDORA:E97781110D7", "FEDORA:EB6BC111F2E", "FEDORA:F2A6D1109DB", "FEDORA:F31571111D2"]}, {"type": "freebsd", "idList": ["0D57C1D9-03F4-11E0-BF50-001A926C7637", "0DDB57A9-DA20-4E99-B048-4366092F3D31", "11BBCCBC-03EE-11E0-BCDB-001FC61C2A55", "1A0704E7-0EDF-11E0-BECC-0022156E8794", "1D193BBA-03F6-11E0-BF50-001A926C7637", "28A7310F-9855-11DF-8D36-001AA0166822", "2A41233D-10E7-11E0-BECC-0022156E8794", "31DE2E13-00D2-11E5-A072-D050996490D0", "3761DF02-0F9C-11E0-BECC-0022156E8794", "4AB29E12-E787-11DF-ADFA-00E0815B8DA8", "4CCBD40D-03F7-11E0-BF50-001A926C7637", "73634294-0FA7-11E0-BECC-0022156E8794", "9F971CEA-03F5-11E0-BF50-001A926C7637", "C623F058-10E7-11E0-BECC-0022156E8794", "F2B43905-3545-11E0-8E81-0022190034C0"]}, {"type": "freebsd_advisory", "idList": ["FREEBSD_ADVISORY:FREEBSD-SA-10:08.BZIP2"]}, {"type": "gentoo", "idList": ["GLSA-201110-06", "GLSA-201110-20", "GLSA-201110-26", "GLSA-201201-09", "GLSA-201201-13", "GLSA-201206-22", "GLSA-201206-25", "GLSA-201209-02", "GLSA-201301-05", "GLSA-201412-27"]}, {"type": "hackerone", "idList": ["H1:184877"]}, {"type": "httpd", "idList": ["HTTPD:2E324CC4C6C61757E316E26EF4DCB945", "HTTPD:C7877AFCB6DEB5CFB770011B4B04435D", "HTTPD:D20CEF41843AF7840FC99B234087D20C"]}, {"type": "ibm", "idList": ["7B8257139B880EBCD2C0C72224A31DF4EC7A424F6868F61872A5FDA6972399F8", "BCFE59AECDDB67845A4B618BFD6E41A20C550D57DD097AC67063BDCE4F60B5F5"]}, {"type": "kaspersky", "idList": ["KLA10066", "KLA10630"]}, {"type": "nessus", "idList": ["5615.PRM", "5663.PRM", "5667.PRM", "5672.PRM", "5698.PASL", "5715.PRM", "5722.PRM", "5725.PRM", "5732.PRM", "5733.PRM", "5745.PRM", "5806.PRM", "5813.PRM", "5814.PRM", "5826.PRM", "5888.PRM", "5889.PRM", "5986.PRM", "6000.PRM", "6039.PRM", "6041.PRM", "800573.PRM", "800796.PRM", "800908.PRM", "800959.PRM", "801013.PRM", "801074.PRM", "801097.PRM", "801184.PRM", "801191.PRM", "8785.PRM", "8786.PRM", "APACHE_2_0_64.NASL", "APACHE_2_2_16.NASL", "APPLE_IOS_50_CHECK.NBIN", "BLACKBERRY_ES_PNG_KB27244.NASL", "CENTOS_RHSA-2010-0659.NASL", "CENTOS_RHSA-2010-0697.NASL", "CENTOS_RHSA-2010-0698.NASL", "CENTOS_RHSA-2010-0703.NASL", "CENTOS_RHSA-2010-0889.NASL", "CENTOS_RHSA-2010-0919.NASL", "CENTOS_RHSA-2010-0926.NASL", "CENTOS_RHSA-2011-0196.NASL", "CENTOS_RHSA-2011-0307.NASL", "CENTOS_RHSA-2011-0318.NASL", "CENTOS_RHSA-2011-0908.NASL", "CENTOS_RHSA-2011-0909.NASL", "CENTOS_RHSA-2012-0017.NASL", "CENTOS_RHSA-2012-1046.NASL", "CENTOS_RHSA-2012-1047.NASL", "CENTOS_RHSA-2013-0217.NASL", "CENTOS_RHSA-2013-1307.NASL", "CENTOS_RHSA-2013-1615.NASL", "CENTOS_RHSA-2014-0311.NASL", "CLAMAV_0_96_3.NASL", "CLAMAV_0_96_5.NASL", "DEBIAN_DLA-235.NASL", "DEBIAN_DLA-307.NASL", "DEBIAN_DLA-444.NASL", "DEBIAN_DLA-88.NASL", "DEBIAN_DSA-2109.NASL", "DEBIAN_DSA-2112.NASL", "DEBIAN_DSA-2118.NASL", "DEBIAN_DSA-2128.NASL", "DEBIAN_DSA-2129.NASL", "DEBIAN_DSA-2137.NASL", "DEBIAN_DSA-2155.NASL", "DEBIAN_DSA-2170.NASL", "DEBIAN_DSA-2195.NASL", "DEBIAN_DSA-2210.NASL", "DEBIAN_DSA-2298.NASL", "F5_BIGIP_SOL13519.NASL", "F5_BIGIP_SOL15878.NASL", "F5_BIGIP_SOL16993.NASL", "F5_BIGIP_SOL23332326.NASL", "FEDORA_2010-12478.NASL", "FEDORA_2010-14627.NASL", "FEDORA_2010-14678.NASL", "FEDORA_2010-14768.NASL", "FEDORA_2010-14834.NASL", "FEDORA_2010-14877.NASL", "FEDORA_2010-15106.NASL", "FEDORA_2010-15120.NASL", "FEDORA_2010-15125.NASL", "FEDORA_2010-15443.NASL", "FEDORA_2010-16115.NASL", "FEDORA_2010-16136.NASL", "FEDORA_2010-16148.NASL", "FEDORA_2010-17439.NASL", "FEDORA_2010-17728.NASL", "FEDORA_2010-17742.NASL", "FEDORA_2010-17755.NASL", "FEDORA_2010-18409.NASL", "FEDORA_2010-18425.NASL", "FEDORA_2010-18564.NASL", "FEDORA_2010-18568.NASL", "FEDORA_2010-18976.NASL", "FEDORA_2010-19011.NASL", "FEDORA_2011-2498.NASL", "FEDORA_2011-2540.NASL", "FEDORA_2011-2697.NASL", "FEDORA_2011-2699.NASL", "FEDORA_2011-3120.NASL", "FEDORA_2011-3827.NASL", "FEDORA_2011-3836.NASL", "FEDORA_2011-4214.NASL", "FEDORA_2011-5336.NASL", "FEDORA_2015-8281.NASL", "FEDORA_2015-8370.NASL", "FEDORA_2015-8383.NASL", "FREEBSD_PKG_0D57C1D903F411E0BF50001A926C7637.NASL", "FREEBSD_PKG_0DDB57A9DA204E99B0484366092F3D31.NASL", "FREEBSD_PKG_11BBCCBC03EE11E0BCDB001FC61C2A55.NASL", "FREEBSD_PKG_1A0704E70EDF11E0BECC0022156E8794.NASL", "FREEBSD_PKG_1D193BBA03F611E0BF50001A926C7637.NASL", "FREEBSD_PKG_28A7310F985511DF8D36001AA0166822.NASL", "FREEBSD_PKG_2A41233D10E711E0BECC0022156E8794.NASL", "FREEBSD_PKG_31DE2E1300D211E5A072D050996490D0.NASL", "FREEBSD_PKG_3761DF020F9C11E0BECC0022156E8794.NASL", "FREEBSD_PKG_4AB29E12E78711DFADFA00E0815B8DA8.NASL", "FREEBSD_PKG_4CCBD40D03F711E0BF50001A926C7637.NASL", "FREEBSD_PKG_736342940FA711E0BECC0022156E8794.NASL", "FREEBSD_PKG_9F971CEA03F511E0BF50001A926C7637.NASL", "FREEBSD_PKG_B2A6FC0E070F11E0A6E900215C6A37BB.NASL", "FREEBSD_PKG_C623F05810E711E0BECC0022156E8794.NASL", "FREEBSD_PKG_F2B43905354511E08E810022190034C0.NASL", "GENTOO_GLSA-201110-06.NASL", "GENTOO_GLSA-201110-20.NASL", "GENTOO_GLSA-201110-26.NASL", "GENTOO_GLSA-201201-09.NASL", "GENTOO_GLSA-201201-13.NASL", "GENTOO_GLSA-201206-22.NASL", "GENTOO_GLSA-201206-25.NASL", "GENTOO_GLSA-201209-02.NASL", "GENTOO_GLSA-201301-05.NASL", "GENTOO_GLSA-201412-27.NASL", "GOOGLE_CHROME_7_0_517_44.NASL", "GOOGLE_CHROME_8_0_552_215.NASL", "HPSMH_6_2_0_12.NASL", "HPSMH_6_3_0_22.NASL", "HPSMH_7_0_0_24.NASL", "HPUX_PHSS_41775.NASL", "ITUNES_10_2.NASL", "ITUNES_10_2_BANNER.NASL", "MACOSX_10_6_7.NASL", "MACOSX_10_7_2.NASL", "MACOSX_IWORK_9_1.NASL", "MACOSX_QUICKTIME769.NASL", "MACOSX_QUICKTIME77.NASL", "MACOSX_SAFARI5_0_4.NASL", "MACOSX_SECUPD2011-001.NASL", "MACOSX_SECUPD2011-004.NASL", "MACOSX_SECUPD2011-006.NASL", "MAILMAN_2_1_14.NASL", "MANDRIVA_MDVSA-2010-152.NASL", "MANDRIVA_MDVSA-2010-153.NASL", "MANDRIVA_MDVSA-2010-184.NASL", "MANDRIVA_MDVSA-2010-185.NASL", "MANDRIVA_MDVSA-2010-191.NASL", "MANDRIVA_MDVSA-2010-199.NASL", "MANDRIVA_MDVSA-2010-218.NASL", "MANDRIVA_MDVSA-2010-224.NASL", "MANDRIVA_MDVSA-2010-236.NASL", "MANDRIVA_MDVSA-2010-239.NASL", "MANDRIVA_MDVSA-2010-243.NASL", "MANDRIVA_MDVSA-2010-245.NASL", "MANDRIVA_MDVSA-2010-246.NASL", "MANDRIVA_MDVSA-2010-249.NASL", "MANDRIVA_MDVSA-2010-254.NASL", "MANDRIVA_MDVSA-2010-260.NASL", "MANDRIVA_MDVSA-2011-043.NASL", "MANDRIVA_MDVSA-2011-052.NASL", "MANDRIVA_MDVSA-2011-053.NASL", "MANDRIVA_MDVSA-2011-064.NASL", "MANDRIVA_MDVSA-2011-097.NASL", "NEWSTART_CGSL_NS-SA-2019-0118_HTTPD.NASL", "OPENOFFICE_33.NASL", "OPENSUSE-2012-57.NASL", "ORACLELINUX_ELSA-2010-0659.NASL", "ORACLELINUX_ELSA-2010-0697.NASL", "ORACLELINUX_ELSA-2010-0698.NASL", "ORACLELINUX_ELSA-2010-0703.NASL", "ORACLELINUX_ELSA-2010-0858.NASL", "ORACLELINUX_ELSA-2010-0860.NASL", "ORACLELINUX_ELSA-2010-0889.NASL", "ORACLELINUX_ELSA-2010-0919.NASL", "ORACLELINUX_ELSA-2010-0926.NASL", "ORACLELINUX_ELSA-2011-0195.NASL", "ORACLELINUX_ELSA-2011-0196.NASL", "ORACLELINUX_ELSA-2011-0258.NASL", "ORACLELINUX_ELSA-2011-0307.NASL", "ORACLELINUX_ELSA-2011-0308.NASL", "ORACLELINUX_ELSA-2011-0318.NASL", "ORACLELINUX_ELSA-2011-0908.NASL", "ORACLELINUX_ELSA-2011-0909.NASL", "ORACLELINUX_ELSA-2011-0910.NASL", "ORACLELINUX_ELSA-2012-0017.NASL", "ORACLELINUX_ELSA-2012-1046.NASL", "ORACLELINUX_ELSA-2012-1047.NASL", "ORACLELINUX_ELSA-2013-0217.NASL", "ORACLELINUX_ELSA-2013-1307.NASL", "ORACLELINUX_ELSA-2013-1615.NASL", "ORACLELINUX_ELSA-2014-0311.NASL", "ORACLEVM_OVMSA-2011-0015.NASL", "ORACLE_HTTP_SERVER_CPU_JUL_2013.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_JUL_2015_CPU.NASL", "PHP_5_2_15.NASL", "PHP_5_3_4.NASL", "PHP_5_4_41.NASL", "PHP_5_5_25.NASL", "PHP_5_6_9.NASL", "QUICKTIME_769.NASL", "QUICKTIME_77.NASL", "REDHAT-RHSA-2010-0659.NASL", "REDHAT-RHSA-2010-0697.NASL", "REDHAT-RHSA-2010-0698.NASL", "REDHAT-RHSA-2010-0703.NASL", "REDHAT-RHSA-2010-0858.NASL", "REDHAT-RHSA-2010-0860.NASL", "REDHAT-RHSA-2010-0889.NASL", "REDHAT-RHSA-2010-0919.NASL", "REDHAT-RHSA-2010-0925.NASL", "REDHAT-RHSA-2010-0926.NASL", "REDHAT-RHSA-2011-0195.NASL", "REDHAT-RHSA-2011-0196.NASL", "REDHAT-RHSA-2011-0258.NASL", "REDHAT-RHSA-2011-0307.NASL", "REDHAT-RHSA-2011-0308.NASL", "REDHAT-RHSA-2011-0318.NASL", "REDHAT-RHSA-2011-0908.NASL", "REDHAT-RHSA-2011-0909.NASL", "REDHAT-RHSA-2011-0910.NASL", "REDHAT-RHSA-2011-1749.NASL", "REDHAT-RHSA-2012-0017.NASL", "REDHAT-RHSA-2012-0168.NASL", "REDHAT-RHSA-2012-1046.NASL", "REDHAT-RHSA-2012-1047.NASL", "REDHAT-RHSA-2013-0217.NASL", "REDHAT-RHSA-2013-1307.NASL", "REDHAT-RHSA-2013-1615.NASL", "REDHAT-RHSA-2014-0311.NASL", "SAFARI_5_0_4.NASL", "SAMBA_3_5_5.NASL", "SECURITYCENTER_PHP_5_4_41.NASL", "SLACKWARE_SSA_2010-240-02.NASL", "SLACKWARE_SSA_2010-257-01.NASL", "SLACKWARE_SSA_2010-263-01.NASL", "SLACKWARE_SSA_2010-357-01.NASL", "SLACKWARE_SSA_2011-098-01.NASL", "SLACKWARE_SSA_2015-162-02.NASL", "SL_20100830_HTTPD_ON_SL5_X.NASL", "SL_20100914_SAMBA3X_ON_SL5_X.NASL", "SL_20100914_SAMBA_ON_SL3_X.NASL", "SL_20100920_BZIP2_ON_SL3_X__SL4_X__SL5_X.NASL", "SL_20101110_BZIP2_ON_SL6_X.NASL", "SL_20101110_SAMBA_ON_SL6_X.NASL", "SL_20101116_FREETYPE_ON_SL4_X.NASL", "SL_20101129_PHP_ON_SL4_X.NASL", "SL_20101130_KRB5_ON_SL4_X.NASL", "SL_20110203_PHP53_ON_SL5_X.NASL", "SL_20110203_PHP_ON_SL6_X.NASL", "SL_20110215_SUBVERSION_ON_SL6_X.NASL", "SL_20110301_MAILMAN_ON_SL4_X.NASL", "SL_20110301_MAILMAN_ON_SL6_X.NASL", "SL_20110302_LIBTIFF_ON_SL4_X.NASL", "SL_20110302_LIBTIFF_ON_SL6_X.NASL", "SL_20110628_RUBY_ON_SL4_X.NASL", "SL_20110628_RUBY_ON_SL5_X.NASL", "SL_20110628_RUBY_ON_SL6_X.NASL", "SL_20111206_LIBXML2_ON_SL6_X.NASL", "SL_20120111_LIBXML2_ON_SL5_X.NASL", "SL_20120627_PHP53_ON_SL5_X.NASL", "SL_20120627_PHP_ON_SL6_X.NASL", "SL_20130131_MINGW32_LIBXML2_ON_SL6_X.NASL", "SL_20130930_PHP53_ON_SL5_X.NASL", "SL_20131121_PHP_ON_SL6_X.NASL", "SL_20140318_PHP_ON_SL5_X.NASL", "SOLARIS10_126868-04.NASL", "SOLARIS10_146363-01.NASL", "SOLARIS10_X86_126869-05.NASL", "SOLARIS10_X86_146364-01.NASL", "SOLARIS11_KERBEROS_20130924_2.NASL", "SOLARIS11_LIBXML2_20120821.NASL", "SUSE9_12644.NASL", "SUSE9_12645.NASL", "SUSE9_12662.NASL", "SUSE9_12666.NASL", "SUSE9_12686.NASL", "SUSE_11_1_APACHE2-MOD_PHP5-101105.NASL", "SUSE_11_1_BZIP2-100921.NASL", "SUSE_11_1_CIFS-MOUNT-100914.NASL", "SUSE_11_1_CLAMAV-100930.NASL", "SUSE_11_1_CLAMAV-101206.NASL", "SUSE_11_1_KRB5-101201.NASL", "SUSE_11_1_LIBSVN_AUTH_GNOME_KEYRING-1-0-101028.NASL", "SUSE_11_1_LIBXML2-101103.NASL", "SUSE_11_2_APACHE2-MOD_PHP5-100813.NASL", "SUSE_11_2_APACHE2-MOD_PHP5-101110.NASL", "SUSE_11_2_APACHE2-MOD_PHP5-110309.NASL", "SUSE_11_2_BZIP2-100921.NASL", "SUSE_11_2_CIFS-MOUNT-100915.NASL", "SUSE_11_2_CLAMAV-100930.NASL", "SUSE_11_2_CLAMAV-101206.NASL", "SUSE_11_2_FREETYPE2-110303.NASL", "SUSE_11_2_KRB5-101201.NASL", "SUSE_11_2_LIBSVN_AUTH_GNOME_KEYRING-1-0-101029.NASL", "SUSE_11_2_LIBTIFF-DEVEL-110314.NASL", "SUSE_11_2_LIBXML2-101103.NASL", "SUSE_11_2_LIBXML2-110104.NASL", "SUSE_11_2_MAILMAN-110426.NASL", "SUSE_11_3_APACHE2-MOD_PHP5-100812.NASL", "SUSE_11_3_APACHE2-MOD_PHP5-101110.NASL", "SUSE_11_3_APACHE2-MOD_PHP5-110309.NASL", "SUSE_11_3_BZIP2-100921.NASL", "SUSE_11_3_CLAMAV-100930.NASL", "SUSE_11_3_CLAMAV-101206.NASL", "SUSE_11_3_FREETYPE2-110303.NASL", "SUSE_11_3_ICU-120117.NASL", "SUSE_11_3_KERNEL-110414.NASL", "SUSE_11_3_KRB5-101201.NASL", "SUSE_11_3_LDAPSMB-100915.NASL", "SUSE_11_3_LIBSVN_AUTH_GNOME_KEYRING-1-0-101029.NASL", "SUSE_11_3_LIBTIFF-DEVEL-110314.NASL", "SUSE_11_3_LIBXML2-101103.NASL", "SUSE_11_3_LIBXML2-110104.NASL", "SUSE_11_3_MAILMAN-110331.NASL", "SUSE_11_3_RUBY-110517.NASL", "SUSE_11_4_ICU-120117.NASL", "SUSE_11_4_KERNEL-110426.NASL", "SUSE_11_4_LIBTIFF-DEVEL-110314.NASL", "SUSE_11_4_RUBY-110517.NASL", "SUSE_11_APACHE2-110831.NASL", "SUSE_11_APACHE2-MOD_PHP5-101105.NASL", "SUSE_11_APACHE2-MOD_PHP5-110310.NASL", "SUSE_11_BZIP2-100916.NASL", "SUSE_11_CIFS-MOUNT-100914.NASL", "SUSE_11_CLAMAV-101102.NASL", "SUSE_11_CLAMAV-101206.NASL", "SUSE_11_FREETYPE2-110304.NASL", "SUSE_11_ICU-120116.NASL", "SUSE_11_ICU-121219.NASL", "SUSE_11_KERNEL-110414.NASL", "SUSE_11_KERNEL-110415.NASL", "SUSE_11_KRB5-101117.NASL", "SUSE_11_LIBTIFF-DEVEL-110314.NASL", "SUSE_11_LIBXML2-101103.NASL", "SUSE_11_LIBXML2-110105.NASL", "SUSE_11_MAILMAN-110426.NASL", "SUSE_11_RUBY-110517.NASL", "SUSE_APACHE2-MOD_PHP5-7221.NASL", "SUSE_APACHE2-MOD_PHP5-7375.NASL", "SUSE_APACHE2-MOD_PHP5-7393.NASL", "SUSE_BZIP2-7169.NASL", "SUSE_CIFS-MOUNT-7151.NASL", "SUSE_CLAMAV-7209.NASL", "SUSE_CLAMAV-7274.NASL", "SUSE_FREETYPE2-7366.NASL", "SUSE_FREETYPE2-7399.NASL", "SUSE_ICU-7928.NASL", "SUSE_KERNEL-7515.NASL", "SUSE_KERNEL-7516.NASL", "SUSE_KERNEL-7568.NASL", "SUSE_KRB5-7243.NASL", "SUSE_LIBTIFF-7376.NASL", "SUSE_LIBTIFF-7474.NASL", "SUSE_LIBXML2-7214.NASL", "SUSE_MAILMAN-7484.NASL", "SUSE_MAILMAN-7489.NASL", "SUSE_RUBY-7528.NASL", "SUSE_SU-2016-1638-1.NASL", "UBUNTU_USN-1013-1.NASL", "UBUNTU_USN-1016-1.NASL", "UBUNTU_USN-1021-1.NASL", "UBUNTU_USN-1030-1.NASL", "UBUNTU_USN-1031-1.NASL", "UBUNTU_USN-1042-1.NASL", "UBUNTU_USN-1042-2.NASL", "UBUNTU_USN-1053-1.NASL", "UBUNTU_USN-1069-1.NASL", "UBUNTU_USN-1085-1.NASL", "UBUNTU_USN-1085-2.NASL", "UBUNTU_USN-1126-1.NASL", "UBUNTU_USN-1126-2.NASL", "UBUNTU_USN-1377-1.NASL", "UBUNTU_USN-986-1.NASL", "UBUNTU_USN-986-2.NASL", "UBUNTU_USN-986-3.NASL", "UBUNTU_USN-987-1.NASL", "UBUNTU_USN-989-1.NASL", "VMWARE_ESXI_5_0_BUILD_608089_REMOTE.NASL", "VMWARE_ESXI_5_0_BUILD_764879_REMOTE.NASL", "VMWARE_VMSA-2010-0019.NASL", "VMWARE_VMSA-2010-0019_REMOTE.NASL", "VMWARE_VMSA-2011-0007.NASL", "VMWARE_VMSA-2011-0007_REMOTE.NASL", "VMWARE_VMSA-2011-0012.NASL", "VMWARE_VMSA-2011-0012_REMOTE.NASL", "VMWARE_VMSA-2012-0005.NASL", "VMWARE_VMSA-2012-0005_REMOTE.NASL", "VMWARE_VMSA-2012-0008.NASL", "VMWARE_VMSA-2012-0008_REMOTE.NASL", "VMWARE_VMSA-2012-0012.NASL", "VMWARE_VMSA-2012-0012_REMOTE.NASL", "WEB_APPLICATION_SCANNING_98832"]}, {"type": "openvas", "idList": ["OPENVAS:100725", "OPENVAS:103450", "OPENVAS:103455", "OPENVAS:103457", "OPENVAS:103517", "OPENVAS:1361412562310100643", "OPENVAS:1361412562310100725", "OPENVAS:1361412562310100803", "OPENVAS:1361412562310100830", "OPENVAS:1361412562310100901", "OPENVAS:1361412562310100932", "OPENVAS:1361412562310103450", "OPENVAS:1361412562310103455", "OPENVAS:1361412562310103457", "OPENVAS:1361412562310103517", "OPENVAS:1361412562310105498", "OPENVAS:1361412562310110066", "OPENVAS:1361412562310110181", "OPENVAS:1361412562310121004", "OPENVAS:1361412562310121313", "OPENVAS:1361412562310122013", "OPENVAS:1361412562310122035", "OPENVAS:1361412562310122141", "OPENVAS:1361412562310122142", "OPENVAS:1361412562310122229", "OPENVAS:1361412562310122231", "OPENVAS:1361412562310122236", "OPENVAS:1361412562310122243", "OPENVAS:1361412562310122250", "OPENVAS:1361412562310122253", "OPENVAS:1361412562310122257", "OPENVAS:1361412562310122269", "OPENVAS:1361412562310122274", "OPENVAS:1361412562310122294", "OPENVAS:1361412562310122295", "OPENVAS:1361412562310122297", "OPENVAS:1361412562310122318", "OPENVAS:1361412562310122319", "OPENVAS:1361412562310122320", "OPENVAS:1361412562310122325", "OPENVAS:1361412562310123444", "OPENVAS:1361412562310123529", "OPENVAS:1361412562310123562", "OPENVAS:1361412562310123735", "OPENVAS:1361412562310123874", "OPENVAS:1361412562310123883", "OPENVAS:136141256231067868", "OPENVAS:136141256231068104", "OPENVAS:136141256231068175", "OPENVAS:136141256231068177", "OPENVAS:136141256231068180", "OPENVAS:136141256231068459", "OPENVAS:136141256231068495", "OPENVAS:136141256231068499", "OPENVAS:136141256231068689", "OPENVAS:136141256231068691", "OPENVAS:136141256231068692", "OPENVAS:136141256231068693", "OPENVAS:136141256231068694", "OPENVAS:136141256231068695", "OPENVAS:136141256231068802", "OPENVAS:136141256231068828", "OPENVAS:136141256231068829", "OPENVAS:136141256231068830", "OPENVAS:136141256231068832", "OPENVAS:136141256231068833", "OPENVAS:136141256231068834", "OPENVAS:136141256231068949", "OPENVAS:136141256231068978", "OPENVAS:136141256231068991", "OPENVAS:136141256231069104", "OPENVAS:136141256231069331", "OPENVAS:136141256231069420", "OPENVAS:136141256231069579", "OPENVAS:136141256231070233", "OPENVAS:136141256231070235", "OPENVAS:136141256231070769", "OPENVAS:136141256231070783", "OPENVAS:136141256231070789", "OPENVAS:136141256231070810", "OPENVAS:136141256231070814", "OPENVAS:136141256231071548", "OPENVAS:136141256231071551", "OPENVAS:136141256231072419", "OPENVAS:1361412562310801519", "OPENVAS:1361412562310801540", "OPENVAS:1361412562310801541", "OPENVAS:1361412562310801547", "OPENVAS:1361412562310801583", "OPENVAS:1361412562310801585", "OPENVAS:1361412562310801638", "OPENVAS:1361412562310801678", "OPENVAS:1361412562310801679", "OPENVAS:1361412562310801680", "OPENVAS:1361412562310801907", "OPENVAS:1361412562310802144", "OPENVAS:1361412562310802146", "OPENVAS:1361412562310802235", "OPENVAS:1361412562310802259", "OPENVAS:1361412562310802336", "OPENVAS:1361412562310831131", "OPENVAS:1361412562310831132", "OPENVAS:1361412562310831157", "OPENVAS:1361412562310831159", "OPENVAS:1361412562310831187", "OPENVAS:1361412562310831199", "OPENVAS:1361412562310831227", "OPENVAS:1361412562310831240", "OPENVAS:1361412562310831253", "OPENVAS:1361412562310831259", "OPENVAS:1361412562310831268", "OPENVAS:1361412562310831270", "OPENVAS:1361412562310831271", "OPENVAS:1361412562310831280", "OPENVAS:1361412562310831283", "OPENVAS:1361412562310831285", "OPENVAS:1361412562310831297", "OPENVAS:1361412562310831349", "OPENVAS:1361412562310831352", "OPENVAS:1361412562310831353", "OPENVAS:1361412562310831361", "OPENVAS:1361412562310831408", "OPENVAS:1361412562310835247", "OPENVAS:1361412562310835248", "OPENVAS:1361412562310840496", "OPENVAS:1361412562310840497", "OPENVAS:1361412562310840498", "OPENVAS:1361412562310840500", "OPENVAS:1361412562310840501", "OPENVAS:1361412562310840532", "OPENVAS:1361412562310840535", "OPENVAS:1361412562310840542", "OPENVAS:1361412562310840546", "OPENVAS:1361412562310840547", "OPENVAS:1361412562310840564", "OPENVAS:1361412562310840566", "OPENVAS:1361412562310840580", "OPENVAS:1361412562310840593", "OPENVAS:1361412562310840610", "OPENVAS:1361412562310840613", "OPENVAS:1361412562310840636", "OPENVAS:1361412562310840646", "OPENVAS:1361412562310840923", "OPENVAS:1361412562310850165", "OPENVAS:1361412562310862314", "OPENVAS:1361412562310862413", "OPENVAS:1361412562310862419", "OPENVAS:1361412562310862434", "OPENVAS:1361412562310862476", "OPENVAS:1361412562310862480", "OPENVAS:1361412562310862560", "OPENVAS:1361412562310862563", "OPENVAS:1361412562310862565", "OPENVAS:1361412562310862573", "OPENVAS:1361412562310862576", "OPENVAS:1361412562310862621", "OPENVAS:1361412562310862656", "OPENVAS:1361412562310862666", "OPENVAS:1361412562310862673", "OPENVAS:1361412562310862708", "OPENVAS:1361412562310862714", "OPENVAS:1361412562310862718", "OPENVAS:1361412562310862736", "OPENVAS:1361412562310862740", "OPENVAS:1361412562310862743", "OPENVAS:1361412562310862764", "OPENVAS:1361412562310862766", "OPENVAS:1361412562310862767", "OPENVAS:1361412562310862769", "OPENVAS:1361412562310862777", "OPENVAS:1361412562310862778", "OPENVAS:1361412562310862851", "OPENVAS:1361412562310862852", "OPENVAS:1361412562310862889", "OPENVAS:1361412562310862892", "OPENVAS:1361412562310862906", "OPENVAS:1361412562310862908", "OPENVAS:1361412562310862911", "OPENVAS:1361412562310862912", "OPENVAS:1361412562310862916", "OPENVAS:1361412562310862935", "OPENVAS:1361412562310862937", "OPENVAS:1361412562310862976", "OPENVAS:1361412562310862984", "OPENVAS:1361412562310862987", "OPENVAS:1361412562310863017", "OPENVAS:1361412562310863047", "OPENVAS:1361412562310863054", "OPENVAS:1361412562310863427", "OPENVAS:1361412562310863470", "OPENVAS:1361412562310863608", "OPENVAS:1361412562310863620", "OPENVAS:1361412562310863649", "OPENVAS:1361412562310869423", "OPENVAS:1361412562310869430", "OPENVAS:1361412562310869623", "OPENVAS:1361412562310870314", "OPENVAS:1361412562310870323", "OPENVAS:1361412562310870324", "OPENVAS:1361412562310870325", "OPENVAS:1361412562310870361", "OPENVAS:1361412562310870362", "OPENVAS:1361412562310870363", "OPENVAS:1361412562310870388", "OPENVAS:1361412562310870398", "OPENVAS:1361412562310870400", "OPENVAS:1361412562310870416", "OPENVAS:1361412562310870449", "OPENVAS:1361412562310870450", "OPENVAS:1361412562310870527", "OPENVAS:1361412562310870600", "OPENVAS:1361412562310870645", "OPENVAS:1361412562310870654", "OPENVAS:1361412562310870672", "OPENVAS:1361412562310870741", "OPENVAS:1361412562310870781", "OPENVAS:1361412562310870782", "OPENVAS:1361412562310871047", "OPENVAS:1361412562310871084", "OPENVAS:1361412562310871140", "OPENVAS:1361412562310871379", "OPENVAS:1361412562310880426", "OPENVAS:1361412562310880427", "OPENVAS:1361412562310880428", "OPENVAS:1361412562310880429", "OPENVAS:1361412562310880454", "OPENVAS:1361412562310880456", "OPENVAS:1361412562310880457", "OPENVAS:1361412562310880475", "OPENVAS:1361412562310880477", "OPENVAS:1361412562310880484", "OPENVAS:1361412562310880505", "OPENVAS:1361412562310880507", "OPENVAS:1361412562310880510", "OPENVAS:1361412562310880547", "OPENVAS:1361412562310880549", "OPENVAS:1361412562310880568", "OPENVAS:1361412562310880572", "OPENVAS:1361412562310880619", "OPENVAS:1361412562310880620", "OPENVAS:1361412562310880626", "OPENVAS:1361412562310880633", "OPENVAS:1361412562310880953", "OPENVAS:1361412562310881144", "OPENVAS:1361412562310881174", "OPENVAS:1361412562310881182", "OPENVAS:1361412562310881272", "OPENVAS:1361412562310881276", "OPENVAS:1361412562310881337", "OPENVAS:1361412562310881365", "OPENVAS:1361412562310881375", "OPENVAS:1361412562310881439", "OPENVAS:1361412562310881592", "OPENVAS:1361412562310881904", "OPENVAS:1361412562310882203", "OPENVAS:1361412562310902317", "OPENVAS:1361412562310902466", "OPENVAS:1361412562310902470", "OPENVAS:1361412562310902718", "OPENVAS:67868", "OPENVAS:68104", "OPENVAS:68175", "OPENVAS:68177", "OPENVAS:68180", "OPENVAS:68459", "OPENVAS:68495", "OPENVAS:68499", "OPENVAS:68689", "OPENVAS:68691", "OPENVAS:68692", "OPENVAS:68693", "OPENVAS:68694", "OPENVAS:68695", "OPENVAS:68802", "OPENVAS:68828", "OPENVAS:68829", "OPENVAS:68830", "OPENVAS:68832", "OPENVAS:68833", "OPENVAS:68949", "OPENVAS:68978", "OPENVAS:68991", "OPENVAS:69104", "OPENVAS:69331", "OPENVAS:69420", "OPENVAS:69579", "OPENVAS:70233", "OPENVAS:70235", "OPENVAS:70769", "OPENVAS:70783", "OPENVAS:70789", "OPENVAS:70810", "OPENVAS:70814", "OPENVAS:71548", "OPENVAS:71551", "OPENVAS:72419", "OPENVAS:801519", "OPENVAS:801540", "OPENVAS:801541", "OPENVAS:801638", "OPENVAS:801678", "OPENVAS:801679", "OPENVAS:801680", "OPENVAS:801907", "OPENVAS:802144", "OPENVAS:802146", "OPENVAS:802235", "OPENVAS:802259", "OPENVAS:802336", "OPENVAS:831131", "OPENVAS:831132", "OPENVAS:831157", "OPENVAS:831159", "OPENVAS:831187", "OPENVAS:831199", "OPENVAS:831227", "OPENVAS:831240", "OPENVAS:831253", "OPENVAS:831259", "OPENVAS:831268", "OPENVAS:831270", "OPENVAS:831271", "OPENVAS:831280", "OPENVAS:831283", "OPENVAS:831285", "OPENVAS:831297", "OPENVAS:831349", "OPENVAS:831352", "OPENVAS:831353", "OPENVAS:831361", "OPENVAS:831408", "OPENVAS:835247", "OPENVAS:835248", "OPENVAS:840496", "OPENVAS:840497", "OPENVAS:840498", "OPENVAS:840500", "OPENVAS:840501", "OPENVAS:840532", "OPENVAS:840535", "OPENVAS:840542", "OPENVAS:840546", "OPENVAS:840547", "OPENVAS:840564", "OPENVAS:840566", "OPENVAS:840580", "OPENVAS:840593", "OPENVAS:840610", "OPENVAS:840613", "OPENVAS:840636", "OPENVAS:840646", "OPENVAS:840923", "OPENVAS:850165", "OPENVAS:862314", "OPENVAS:862413", "OPENVAS:862419", "OPENVAS:862434", "OPENVAS:862476", "OPENVAS:862480", "OPENVAS:862560", "OPENVAS:862563", "OPENVAS:862565", "OPENVAS:862573", "OPENVAS:862576", "OPENVAS:862621", "OPENVAS:862656", "OPENVAS:862666", "OPENVAS:862673", "OPENVAS:862708", "OPENVAS:862714", "OPENVAS:862718", "OPENVAS:862736", "OPENVAS:862740", "OPENVAS:862743", "OPENVAS:862764", "OPENVAS:862766", "OPENVAS:862767", "OPENVAS:862769", "OPENVAS:862777", "OPENVAS:862778", "OPENVAS:862851", "OPENVAS:862852", "OPENVAS:862889", "OPENVAS:862892", "OPENVAS:862906", "OPENVAS:862908", "OPENVAS:862911", "OPENVAS:862912", "OPENVAS:862916", "OPENVAS:862935", "OPENVAS:862937", "OPENVAS:862976", "OPENVAS:862984", "OPENVAS:862987", "OPENVAS:863017", "OPENVAS:863047", "OPENVAS:863054", "OPENVAS:863427", "OPENVAS:863470", "OPENVAS:863608", "OPENVAS:863620", "OPENVAS:863649", "OPENVAS:870314", "OPENVAS:870323", "OPENVAS:870324", "OPENVAS:870325", "OPENVAS:870361", "OPENVAS:870362", "OPENVAS:870363", "OPENVAS:870388", "OPENVAS:870398", "OPENVAS:870400", "OPENVAS:870416", "OPENVAS:870449", "OPENVAS:870450", "OPENVAS:870527", "OPENVAS:870600", "OPENVAS:870645", "OPENVAS:870654", "OPENVAS:870672", "OPENVAS:870741", "OPENVAS:870781", "OPENVAS:870782", "OPENVAS:871047", "OPENVAS:871084", "OPENVAS:871140", "OPENVAS:880426", "OPENVAS:880427", "OPENVAS:880428", "OPENVAS:880429", "OPENVAS:880454", "OPENVAS:880456", "OPENVAS:880457", "OPENVAS:880475", "OPENVAS:880477", "OPENVAS:880484", "OPENVAS:880505", "OPENVAS:880507", "OPENVAS:880510", "OPENVAS:880547", "OPENVAS:880549", "OPENVAS:880568", "OPENVAS:880572", "OPENVAS:880619", "OPENVAS:880620", "OPENVAS:880626", "OPENVAS:880633", "OPENVAS:880953", "OPENVAS:881144", "OPENVAS:881174", "OPENVAS:881182", "OPENVAS:881272", "OPENVAS:881276", "OPENVAS:881337", "OPENVAS:881365", "OPENVAS:881375", "OPENVAS:881439", "OPENVAS:881592", "OPENVAS:881904", "OPENVAS:902466", "OPENVAS:902470", "OPENVAS:902718"]}, {"type": "openwrt", "idList": ["OPENWRT-SA-000002"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2013-1899555", "ORACLE:CPUJUL2015", "ORACLE:CPUJULY2013-1899826"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0659", "ELSA-2010-0697", "ELSA-2010-0698", "ELSA-2010-0703", "ELSA-2010-0858", "ELSA-2010-0860", "ELSA-2010-0889", "ELSA-2010-0919", "ELSA-2010-0926", "ELSA-2011-0195", "ELSA-2011-0196", "ELSA-2011-0200", "ELSA-2011-0258", "ELSA-2011-0307", "ELSA-2011-0308", "ELSA-2011-0318", "ELSA-2011-0392", "ELSA-2011-0908", "ELSA-2011-0909", "ELSA-2011-0910", "ELSA-2011-1581", "ELSA-2011-1749", "ELSA-2012-0017", "ELSA-2012-0313", "ELSA-2012-1046", "ELSA-2012-1047", "ELSA-2013-0216", "ELSA-2013-0217", "ELSA-2013-1307", "ELSA-2013-1615", "ELSA-2014-0311"]}, {"type": "osv", "idList": ["OSV:DLA-235-1", "OSV:DLA-307-1", "OSV:DLA-444-1", "OSV:DLA-88-1", "OSV:DSA-2109-1", "OSV:DSA-2112-1", "OSV:DSA-2118-1", "OSV:DSA-2128-1", "OSV:DSA-2129-1", "OSV:DSA-2137-1", "OSV:DSA-2155-1", "OSV:DSA-2170-1", "OSV:DSA-2195-1", "OSV:DSA-2210-1", "OSV:DSA-2298-1"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:105364", "PACKETSTORM:95574", "PACKETSTORM:96615"]}, {"type": "redhat", "idList": ["RHSA-2010:0659", "RHSA-2010:0697", "RHSA-2010:0698", "RHSA-2010:0703", "RHSA-2010:0858", "RHSA-2010:0860", "RHSA-2010:0889", "RHSA-2010:0919", "RHSA-2010:0925", "RHSA-2010:0926", "RHSA-2011:0195", "RHSA-2011:0196", "RHSA-2011:0258", "RHSA-2011:0307", "RHSA-2011:0308", "RHSA-2011:0318", "RHSA-2011:0897", "RHSA-2011:0908", "RHSA-2011:0909", "RHSA-2011:0910", "RHSA-2011:1749", "RHSA-2012:0017", "RHSA-2012:0168", "RHSA-2012:1046", "RHSA-2012:1047", "RHSA-2013:0217", "RHSA-2013:1307", "RHSA-2013:1615", "RHSA-2014:0311"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-11044"]}, {"type": "samba", "idList": ["SAMBA:CVE-2010-3069"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:24064", "SECURITYVULNS:DOC:24548", "SECURITYVULNS:DOC:24750", "SECURITYVULNS:DOC:24771", "SECURITYVULNS:DOC:24778", "SECURITYVULNS:DOC:24800", "SECURITYVULNS:DOC:24825", "SECURITYVULNS:DOC:24906", "SECURITYVULNS:DOC:25044", "SECURITYVULNS:DOC:25117", "SECURITYVULNS:DOC:25124", "SECURITYVULNS:DOC:25176", "SECURITYVULNS:DOC:25230", "SECURITYVULNS:DOC:25276", "SECURITYVULNS:DOC:25288", "SECURITYVULNS:DOC:25291", "SECURITYVULNS:DOC:25343", "SECURITYVULNS:DOC:25408", "SECURITYVULNS:DOC:25489", "SECURITYVULNS:DOC:25605", "SECURITYVULNS:DOC:25847", "SECURITYVULNS:DOC:25855", "SECURITYVULNS:DOC:25922", "SECURITYVULNS:DOC:25964", "SECURITYVULNS:DOC:25965", "SECURITYVULNS:DOC:25966", "SECURITYVULNS:DOC:25968", "SECURITYVULNS:DOC:26222", "SECURITYVULNS:DOC:26262", "SECURITYVULNS:DOC:26274", "SECURITYVULNS:DOC:26399", "SECURITYVULNS:DOC:26596", "SECURITYVULNS:DOC:26662", "SECURITYVULNS:DOC:26663", "SECURITYVULNS:DOC:26720", "SECURITYVULNS:DOC:26781", "SECURITYVULNS:DOC:27147", "SECURITYVULNS:DOC:27151", "SECURITYVULNS:DOC:27152", "SECURITYVULNS:DOC:27154", "SECURITYVULNS:DOC:27155", "SECURITYVULNS:DOC:27826", "SECURITYVULNS:DOC:30403", "SECURITYVULNS:VULN:10925", "SECURITYVULNS:VULN:11001", "SECURITYVULNS:VULN:11144", "SECURITYVULNS:VULN:11156", "SECURITYVULNS:VULN:11165", "SECURITYVULNS:VULN:11176", "SECURITYVULNS:VULN:11199", "SECURITYVULNS:VULN:11225", "SECURITYVULNS:VULN:11256", "SECURITYVULNS:VULN:11276", "SECURITYVULNS:VULN:11288", "SECURITYVULNS:VULN:11290", "SECURITYVULNS:VULN:11291", "SECURITYVULNS:VULN:11326", "SECURITYVULNS:VULN:11478", "SECURITYVULNS:VULN:11518", "SECURITYVULNS:VULN:11626", "SECURITYVULNS:VULN:11634", "SECURITYVULNS:VULN:11686", "SECURITYVULNS:VULN:11754", "SECURITYVULNS:VULN:11796", "SECURITYVULNS:VULN:11818", "SECURITYVULNS:VULN:11834", "SECURITYVULNS:VULN:11971", "SECURITYVULNS:VULN:11972", "SECURITYVULNS:VULN:11973", "SECURITYVULNS:VULN:12279", "SECURITYVULNS:VULN:13017", "SECURITYVULNS:VULN:13214", "SECURITYVULNS:VULN:13641", "SECURITYVULNS:VULN:14601"]}, {"type": "seebug", "idList": ["SSV:19828", "SSV:20012", "SSV:20240", "SSV:20414", "SSV:20425", "SSV:20500", "SSV:20772", "SSV:20814", "SSV:20955", "SSV:60051", "SSV:70379", "SSV:72168"]}, {"type": "slackware", "idList": ["SSA-2010-240-02", "SSA-2010-257-01", "SSA-2010-263-01", "SSA-2010-357-01", "SSA-2011-098-01", "SSA-2015-162-02"]}, {"type": "suse", "idList": ["SUSE-SA:2011:019", "SUSE-SA:2011:020", "SUSE-SA:2011:021", "SUSE-SA:2011:026", "SUSE-SA:2011:027", "SUSE-SU-2011:0711-1", "SUSE-SU-2011:1000-1", "SUSE-SU-2011:1216-1", "SUSE-SU-2012:0010-1", "SUSE-SU-2012:0042-1", "SUSE-SU-2012:0348-1", "SUSE-SU-2012:0553-1", "SUSE-SU-2016:1638-1"]}, {"type": "thn", "idList": ["THN:88621B70C7F5EC61ED5F438C1F1EF3E0"]}, {"type": "ubuntu", "idList": ["USN-1013-1", "USN-1016-1", "USN-1021-1", "USN-1030-1", "USN-1031-1", "USN-1042-1", "USN-1042-2", "USN-1053-1", "USN-1069-1", "USN-1085-1", "USN-1085-2", "USN-1126-1", "USN-1126-2", "USN-1377-1", "USN-986-1", "USN-986-2", "USN-986-3", "USN-987-1", "USN-989-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2006-7243", "UB:CVE-2009-5016", "UB:CVE-2010-0405", "UB:CVE-2010-1323", "UB:CVE-2010-1324", "UB:CVE-2010-1452", "UB:CVE-2010-2068", "UB:CVE-2010-2791", "UB:CVE-2010-2950", "UB:CVE-2010-3069", "UB:CVE-2010-3089", "UB:CVE-2010-3315", "UB:CVE-2010-3434", "UB:CVE-2010-3436", "UB:CVE-2010-3709", "UB:CVE-2010-3710", "UB:CVE-2010-3717", "UB:CVE-2010-3814", "UB:CVE-2010-3855", "UB:CVE-2010-3870", "UB:CVE-2010-4008", "UB:CVE-2010-4020", "UB:CVE-2010-4021", "UB:CVE-2010-4150", "UB:CVE-2010-4260", "UB:CVE-2010-4261", "UB:CVE-2010-4409", "UB:CVE-2010-4479", "UB:CVE-2010-4494", "UB:CVE-2011-0188", "UB:CVE-2011-0191", "UB:CVE-2011-0192", "UB:CVE-2011-1467", "UB:CVE-2015-2348", "UB:CVE-2015-4025", "UB:CVE-2015-4026"]}, {"type": "veracode", "idList": ["VERACODE:24140", "VERACODE:24162", "VERACODE:24188", "VERACODE:24251", "VERACODE:24273", "VERACODE:24421", "VERACODE:24429", "VERACODE:24460", "VERACODE:24603"]}, {"type": "vmware", "idList": ["VMSA-2010-0019", "VMSA-2010-0019.3", "VMSA-2011-0007", "VMSA-2011-0012", "VMSA-2011-0012.3", "VMSA-2012-0005", "VMSA-2012-0005.4", "VMSA-2012-0008", "VMSA-2012-0008.1", "VMSA-2012-0012", "VMSA-2012-0012.2"]}, {"type": "zdi", "idList": ["ZDI-10-259", "ZDI-10-260", "ZDI-11-108", "ZDI-11-109"]}]}, "backreferences": {"references": [{"type": "centos", "idList": ["CESA-2010:0659", "CESA-2010:0697", "CESA-2010:0698", "CESA-2010:0703", "CESA-2010:0889", "CESA-2010:0919", "CESA-2010:0926", "CESA-2011:0196", "CESA-2011:0307", "CESA-2011:0318", "CESA-2011:0908", "CESA-2011:0909", "CESA-2012:0017", "CESA-2012:1046", "CESA-2012:1047", "CESA-2013:0217", "CESA-2014:0311"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2010-448"]}, {"type": "cve", "idList": ["CVE-2006-7243"]}, {"type": "debian", "idList": ["DEBIAN:DLA-88-1:4DC9E", "DEBIAN:DSA-2129-1:29FDB", "DEBIAN:DSA-2137-1:C10DC"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2010-3434", "DEBIANCVE:CVE-2010-4494"]}, {"type": "exploitdb", "idList": ["EDB-ID:17901"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:BB59B757E75F3F464806FB1C3734123D"]}, {"type": "f5", "idList": ["F5:K16993", "SOL13518", "SOL13519", "SOL15878", "SOL15899", "SOL15903", "SOL23332326"]}, {"type": "fedora", "idList": ["FEDORA:2E68F60906AD", "FEDORA:ACB9021214", "FEDORA:C69E9110A82", "FEDORA:C8DE210FFBA", "FEDORA:E665E111EAB", "FEDORA:F31571111D2"]}, {"type": "freebsd", "idList": ["0D57C1D9-03F4-11E0-BF50-001A926C7637", "0DDB57A9-DA20-4E99-B048-4366092F3D31", "11BBCCBC-03EE-11E0-BCDB-001FC61C2A55", "1A0704E7-0EDF-11E0-BECC-0022156E8794", "1D193BBA-03F6-11E0-BF50-001A926C7637", "28A7310F-9855-11DF-8D36-001AA0166822", "2A41233D-10E7-11E0-BECC-0022156E8794", "3761DF02-0F9C-11E0-BECC-0022156E8794", "4AB29E12-E787-11DF-ADFA-00E0815B8DA8", "4CCBD40D-03F7-11E0-BF50-001A926C7637", "73634294-0FA7-11E0-BECC-0022156E8794", "9F971CEA-03F5-11E0-BF50-001A926C7637", "C623F058-10E7-11E0-BECC-0022156E8794", "F2B43905-3545-11E0-8E81-0022190034C0"]}, {"type": "gentoo", "idList": ["GLSA-201209-02"]}, {"type": "httpd", "idList": ["HTTPD:D20CEF41843AF7840FC99B234087D20C"]}, {"type": "kaspersky", "idList": ["KLA10630"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/APPLE-ITUNES-CVE-2011-0181/", "MSF:ILITIES/APPLE-OSX-ATS-CVE-2011-0174/", "MSF:ILITIES/APPLE-OSX-ATS-CVE-2011-0175/", "MSF:ILITIES/APPLE-OSX-ATS-CVE-2011-0177/", "MSF:ILITIES/APPLE-OSX-CARBONCORE-CVE-2011-0178/", "MSF:ILITIES/APPLE-OSX-COREMEDIA-CVE-2011-0187/", "MSF:ILITIES/APPLE-OSX-CORETEXT-CVE-2011-0179/", "MSF:ILITIES/APPLE-OSX-HFS-CVE-2011-0180/", "MSF:ILITIES/APPLE-OSX-IMAGEIO-CVE-2011-0181/", "MSF:ILITIES/APPLE-OSX-IMAGERAW-CVE-2011-0193/", "MSF:ILITIES/APPLE-OSX-INSTALLER-CVE-2011-0190/", "MSF:ILITIES/APPLE-OSX-QUICKTIME-CVE-2011-0187/", "MSF:ILITIES/APPLE-OSX-TERMINAL-CVE-2011-0189/", "MSF:ILITIES/CENTOS_LINUX-CVE-2009-5016/", "MSF:ILITIES/FREEBSD-VID-2A41233D-10E7-11E0-BECC-0022156E8794/", "MSF:ILITIES/PHP-CVE-2009-5016/", "MSF:ILITIES/PHP-CVE-2015-4025/", "MSF:ILITIES/QUICKTIME-CVE-2011-0186/", "MSF:ILITIES/QUICKTIME-CVE-2011-0187/"]}, {"type": "nessus", "idList": ["5715.PRM", "800908.PRM", "CENTOS_RHSA-2010-0698.NASL", "CENTOS_RHSA-2011-0196.NASL", "CENTOS_RHSA-2011-0908.NASL", "CENTOS_RHSA-2011-0909.NASL", "CENTOS_RHSA-2012-0017.NASL", "FEDORA_2010-15125.NASL", "FREEBSD_PKG_C623F05810E711E0BECC0022156E8794.NASL", "GENTOO_GLSA-201412-27.NASL", "HPSMH_6_2_0_12.NASL", "MACOSX_SAFARI5_0_4.NASL", "MANDRIVA_MDVSA-2010-236.NASL", "MANDRIVA_MDVSA-2010-249.NASL", "MANDRIVA_MDVSA-2010-260.NASL", "ORACLELINUX_ELSA-2010-0860.NASL", "ORACLELINUX_ELSA-2010-0926.NASL", "ORACLELINUX_ELSA-2011-0196.NASL", "PHP_5_2_15.NASL", "REDHAT-RHSA-2011-1749.NASL", "SECURITYCENTER_PHP_5_4_41.NASL", "SLACKWARE_SSA_2010-357-01.NASL", "SL_20100914_SAMBA3X_ON_SL5_X.NASL", "SL_20100920_BZIP2_ON_SL3_X__SL4_X__SL5_X.NASL", "SL_20110628_RUBY_ON_SL4_X.NASL", "SL_20110628_RUBY_ON_SL6_X.NASL", "SUSE9_12645.NASL", "SUSE_11_2_APACHE2-MOD_PHP5-101110.NASL", "SUSE_11_2_BZIP2-100921.NASL", "SUSE_11_2_MAILMAN-110426.NASL", "SUSE_11_3_MAILMAN-110331.NASL", "SUSE_11_4_ICU-120117.NASL", "SUSE_11_APACHE2-MOD_PHP5-110310.NASL", "SUSE_11_BZIP2-100916.NASL", "SUSE_11_CIFS-MOUNT-100914.NASL", "SUSE_11_CLAMAV-101206.NASL", "SUSE_APACHE2-MOD_PHP5-7393.NASL", "SUSE_KERNEL-7516.NASL", "UBUNTU_USN-1013-1.NASL", "UBUNTU_USN-1016-1.NASL", "UBUNTU_USN-1031-1.NASL", "UBUNTU_USN-987-1.NASL", "VMWARE_VMSA-2011-0007.NASL", "VMWARE_VMSA-2011-0012_REMOTE.NASL", "VMWARE_VMSA-2012-0005_REMOTE.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310122257", "OPENVAS:1361412562310122269", "OPENVAS:136141256231068104", "OPENVAS:136141256231068693", "OPENVAS:136141256231068802", "OPENVAS:136141256231068832", "OPENVAS:136141256231070233", "OPENVAS:136141256231072419", "OPENVAS:1361412562310801638", "OPENVAS:1361412562310801680", "OPENVAS:1361412562310831253", "OPENVAS:1361412562310831297", "OPENVAS:1361412562310835247", "OPENVAS:1361412562310835248", "OPENVAS:1361412562310840542", "OPENVAS:1361412562310840646", "OPENVAS:1361412562310862476", "OPENVAS:1361412562310862576", "OPENVAS:1361412562310863620", "OPENVAS:1361412562310870361", "OPENVAS:1361412562310870362", "OPENVAS:1361412562310870449", "OPENVAS:1361412562310880510", "OPENVAS:1361412562310880547", "OPENVAS:1361412562310880549", "OPENVAS:1361412562310881365", "OPENVAS:1361412562310881375", "OPENVAS:1361412562310881592", "OPENVAS:1361412562310902317", "OPENVAS:1361412562310902718", "OPENVAS:70814", "OPENVAS:831131", "OPENVAS:831159", "OPENVAS:831353", "OPENVAS:840566", "OPENVAS:862565", "OPENVAS:862736", "OPENVAS:862767", "OPENVAS:862851", "OPENVAS:862935", "OPENVAS:862937", "OPENVAS:863054", "OPENVAS:863649", "OPENVAS:870527", "OPENVAS:870645", "OPENVAS:870741", "OPENVAS:870782", "OPENVAS:881182"]}, {"type": "openwrt", "idList": ["OPENWRT-SA-000002"]}, {"type": "oracle", "idList": ["ORACLE:CPUJUL2015-2367936", "ORACLE:CPUJULY2013-1899826"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0697", "ELSA-2010-0698", "ELSA-2010-0860", "ELSA-2010-0889", "ELSA-2010-0919", "ELSA-2011-0307", "ELSA-2011-0318", "ELSA-2011-0392", "ELSA-2011-0910", "ELSA-2011-1581"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:95574"]}, {"type": "redhat", "idList": ["RHSA-2010:0697", "RHSA-2010:0698", "RHSA-2010:0703", "RHSA-2011:0910"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:24825", "SECURITYVULNS:DOC:25044", "SECURITYVULNS:DOC:25605", "SECURITYVULNS:DOC:25855", "SECURITYVULNS:DOC:25964", "SECURITYVULNS:DOC:25968", "SECURITYVULNS:DOC:26596", "SECURITYVULNS:DOC:26662", "SECURITYVULNS:DOC:26720", "SECURITYVULNS:VULN:11156", "SECURITYVULNS:VULN:11288", "SECURITYVULNS:VULN:11818"]}, {"type": "seebug", "idList": ["SSV:20240"]}, {"type": "slackware", "idList": ["SSA-2010-357-01"]}, {"type": "suse", "idList": ["SUSE-SU-2011:1000-1"]}, {"type": "thn", "idList": ["THN:88621B70C7F5EC61ED5F438C1F1EF3E0"]}, {"type": "ubuntu", "idList": ["USN-1016-1", "USN-1042-2", "USN-1085-2"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2010-2950", "UB:CVE-2010-3709", "UB:CVE-2010-3814", "UB:CVE-2010-4020", "UB:CVE-2010-4409"]}, {"type": "vmware", "idList": ["VMSA-2010-0019.3", "VMSA-2012-0005"]}, {"type": "zdi", "idList": ["ZDI-11-108"]}]}, "exploitation": null, "affected_software": {"major_version": []}, "epss": [{"cve": "CVE-2011-0187", "epss": "0.004530000", "percentile": "0.712750000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4008", "epss": "0.001710000", "percentile": "0.525010000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0181", "epss": "0.006070000", "percentile": "0.753240000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0174", "epss": "0.013200000", "percentile": "0.838950000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0186", "epss": "0.012160000", "percentile": "0.831590000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0182", "epss": "0.000420000", "percentile": "0.004970000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0173", "epss": "0.002890000", "percentile": "0.640350000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0188", "epss": "0.028510000", "percentile": "0.891400000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0176", "epss": "0.030210000", "percentile": "0.893870000", "modified": "2023-03-20"}, {"cve": "CVE-2010-1324", "epss": "0.006940000", "percentile": "0.771240000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4020", "epss": "0.002470000", "percentile": "0.609160000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4261", "epss": "0.208720000", "percentile": "0.956140000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3802", "epss": "0.069690000", "percentile": "0.928560000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3089", "epss": "0.001620000", "percentile": "0.511310000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0175", "epss": "0.013200000", "percentile": "0.838950000", "modified": "2023-03-20"}, {"cve": "CVE-2006-7243", "epss": "0.008240000", "percentile": "0.793190000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3436", "epss": "0.005640000", "percentile": "0.743420000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0189", "epss": "0.000690000", "percentile": "0.282150000", "modified": "2023-03-20"}, {"cve": "CVE-2010-4021", "epss": "0.003090000", "percentile": "0.652440000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0180", "epss": "0.000430000", "percentile": "0.077830000", "modified": "2023-03-20"}, {"cve": "CVE-2010-3870", "epss": "0.004440000", "percentile": "0.709400000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0184", "epss": "0.023470000", "percentile": "0.880830000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0190", "epss": "0.001590000", "percentile": "0.506520000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0179", "epss": "0.007750000", "percentile": "0.785820000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0170", "epss": "0.023310000", "percentile": "0.880310000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4009", "epss": "0.019620000", "percentile": "0.869100000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3801", "epss": "0.053960000", "percentile": "0.919190000", "modified": "2023-03-19"}, {"cve": "CVE-2010-2068", "epss": "0.005820000", "percentile": "0.747640000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0191", "epss": "0.032400000", "percentile": "0.897090000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0178", "epss": "0.000420000", "percentile": "0.056330000", "modified": "2023-03-20"}, {"cve": "CVE-2010-0405", "epss": "0.019360000", "percentile": "0.868220000", "modified": "2023-03-19"}, {"cve": "CVE-2011-1417", "epss": "0.155490000", "percentile": "0.949940000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0194", "epss": "0.006070000", "percentile": "0.753240000", "modified": "2023-03-20"}, {"cve": "CVE-2010-3315", "epss": "0.002180000", "percentile": "0.580530000", "modified": "2023-03-19"}, {"cve": "CVE-2010-1452", "epss": "0.056210000", "percentile": "0.920680000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4479", "epss": "0.194980000", "percentile": "0.954820000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3709", "epss": "0.003400000", "percentile": "0.668530000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0172", "epss": "0.001570000", "percentile": "0.504170000", "modified": "2023-03-20"}, {"cve": "CVE-2011-0193", "epss": "0.010580000", "percentile": "0.818180000", "modified": "2023-03-20"}, {"cve": "CVE-2010-4494", "epss": "0.002850000", "percentile": "0.638110000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0177", "epss": "0.013200000", "percentile": "0.838950000", "modified": "2023-03-20"}, {"cve": "CVE-2010-3710", "epss": "0.078400000", "percentile": "0.931690000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3855", "epss": "0.171010000", "percentile": "0.952080000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4150", "epss": "0.019350000", "percentile": "0.868170000", "modified": "2023-03-19"}, {"cve": "CVE-2010-2950", "epss": "0.010410000", "percentile": "0.816680000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3814", "epss": "0.125400000", "percentile": "0.945150000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4409", "epss": "0.023980000", "percentile": "0.882060000", "modified": "2023-03-19"}, {"cve": "CVE-2010-4260", "epss": "0.184940000", "percentile": "0.953720000", "modified": "2023-03-19"}, {"cve": "CVE-2010-1323", "epss": "0.008690000", "percentile": "0.798870000", "modified": "2023-03-19"}, {"cve": "CVE-2010-3434", "epss": "0.032100000", "percentile": "0.896760000", "modified": "2023-03-20"}, {"cve": "CVE-2010-3069", "epss": "0.923770000", "percentile": "0.983920000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0192", "epss": "0.035730000", "percentile": "0.901750000", "modified": "2023-03-19"}, {"cve": "CVE-2011-0183", "epss": "0.002040000", "percentile": "0.566260000", "modified": "2023-03-20"}], "vulnersScore": 0.2}, "_state": {"dependencies": 1678962961, "score": 1684016453, "affected_software_major_version": 0, "epss": 1679323282}, "_internal": {"score_hash": "f24de24a1d5c046fd4f9d8fbb2c2ade6"}, "sourceData": "", "affectedSoftware": [], "appercut": {}, "exploitpack": {}, "hackapp": {}, "toolHref": "", "w3af": {}}
{"securityvulns": [{"lastseen": "2021-06-08T19:03:09", "description": "Multiple DoS conditions, format strings vulnerability in AppleScript, memory corruption on different file formats parsing, information leakage, privilege escalation.", "cvss3": {}, "published": "2011-03-23T00:00:00", "type": "securityvulns", "title": "Apple Mac OS X multiple security vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2011-0187", "CVE-2010-4008", "CVE-2011-0181", "CVE-2011-0174", "CVE-2011-0186", "CVE-2011-0182", "CVE-2011-0173", "CVE-2011-0188", "CVE-2011-0176", "CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4261", "CVE-2010-3802", "CVE-2010-3089", "CVE-2011-0175", "CVE-2006-7243", "CVE-2010-3436", "CVE-2011-0189", "CVE-2010-4021", "CVE-2011-0180", "CVE-2010-3870", "CVE-2011-0184", "CVE-2011-0190", "CVE-2011-0179", "CVE-2011-0170", "CVE-2010-4009", "CVE-2010-3801", "CVE-2010-2068", "CVE-2011-0191", "CVE-2011-0178", "CVE-2010-0405", "CVE-2011-1417", "CVE-2011-0194", "CVE-2010-3315", "CVE-2010-1452", "CVE-2010-4479", "CVE-2010-3709", "CVE-2011-0172", "CVE-2011-0193", "CVE-2011-0200", "CVE-2010-4494", "CVE-2011-0177", "CVE-2010-3710", "CVE-2010-3855", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-3814", "CVE-2010-4409", "CVE-2010-4260", "CVE-2010-1323", "CVE-2010-3434", "CVE-2010-3069", "CVE-2011-0192", "CVE-2011-0183"], "modified": "2011-03-23T00:00:00", "id": "SECURITYVULNS:VULN:11518", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11518", "sourceData": "", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T19:08:48", "description": "DoS, base_dir protection bypass, crossite scripting.", "cvss3": {}, "published": "2010-11-24T00:00:00", "type": "securityvulns", "title": "PHP multiple security vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2010-3710", "CVE-2010-4150"], "modified": "2010-11-24T00:00:00", "id": "SECURITYVULNS:VULN:11225", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11225", "sourceData": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:39", "description": "Checksum vulnerabilities in GSS-API, JDC, PAC and more.", "cvss3": {}, "published": "2010-12-01T00:00:00", "type": "securityvulns", "title": "MIT Kerberos 5 multiple checksum vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-1323"], "modified": "2010-12-01T00:00:00", "id": "SECURITYVULNS:VULN:11276", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11276", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:38", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nMITKRB5-SA-2010-007\r\n\r\nMIT krb5 Security Advisory 2010-007\r\nOriginal release: 2010-11-30\r\nLast update: 2010-11-30\r\n\r\nTopic: Multiple checksum handling vulnerabilities\r\n\r\nCVE-2010-1324\r\n* krb5 GSS-API applications may accept unkeyed checksums\r\n* krb5 application services may accept unkeyed PAC checksums\r\n* krb5 KDC may accept low-entropy KrbFastArmoredReq checksums\r\n\r\nCVSSv2 Vector: AV:N/AC:M/Au:N/C:N/I:C/A:N/E:POC/RL:OF/RC:C\r\n\r\nCVSSv2 Base Score: 7.1\r\n\r\nAccess Vector: Network\r\nAccess Complexity: Medium\r\nAuthentication: None\r\nConfidentiality Impact: None\r\nIntegrity Impact: Complete\r\nAvailability Impact: None\r\n\r\nCVSSv2 Temporal Score: 5.6\r\n\r\nExploitability: Proof-of-Concept\r\nRemediation Level: Official Fix\r\nReport Confidence: Confirmed\r\n\r\nCVE-2010-1323\r\n* krb5 clients may accept unkeyed SAM-2 challenge checksums\r\n* krb5 may accept KRB-SAFE checksums with low-entropy derived keys\r\n\r\nCVSSv2 Vector: AV:N/AC:H/Au:N/C:N/I:C/A:N/E:POC/RL:OF/RC:C\r\nCVSSv2 Base Score: 5.4\r\nCVSSv2 Temporal Score: 4.2\r\n\r\nCVE-2010-4020\r\n* krb5 may accept authdata checksums with low-entropy derived keys\r\n\r\nCVSSv2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C\r\nCVSSv2 Base Score: 3.5\r\nCVSSv2 Temporal Score: 2.7\r\n\r\nCVE-2010-4021\r\n* krb5 KDC may issue unrequested tickets due to KrbFastReq forgery\r\n\r\nCVSSv2 Vector: AV:N/AC:H/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C\r\nCVSSv2 Base Score: 2.1\r\nCVSSv2 Temporal Score: 1.6\r\n\r\nSee DETAILS for the expanded CVSSv2 metrics for CVE-2010-1323,\r\nCVE-2010-4020, and CVE-2010-4021.\r\n\r\nSUMMARY\r\n=======\r\n\r\nThese vulnerabilities are in the MIT implementation of Kerberos\r\n(krb5), but because these vulnerabilities arise from flaws in protocol\r\nhandling logic, other implementations may also be vulnerable.\r\n\r\nCVE-2010-1324\r\n\r\nMIT krb5 (releases krb-1.7 and newer) incorrectly accepts an unkeyed\r\nchecksum with DES session keys for version 2 (RFC 4121) of the GSS-API\r\nkrb5 mechanism.\r\n\r\nMIT krb5 (releases krb5-1.7 and newer) incorrectly accepts an unkeyed\r\nchecksum for PAC signatures. Running exclusively krb5-1.8 or newer\r\nKDCs blocks the attack.\r\n\r\nMIT krb5 KDC (releases krb5-1.7 and newer) incorrectly accepts RFC\r\n3961 key-derivation checksums using RC4 keys when verifying the\r\nreq-checksum in a KrbFastArmoredReq.\r\n\r\nCVE-2010-1323\r\n\r\nMIT krb5 clients (releases krb5-1.3 and newer) incorrectly accept an\r\nunkeyed checksums in the SAM-2 preauthentication challenge.\r\n\r\nMIT krb5 (releases krb5-1.3 and newer) incorrectly accepts RFC 3961\r\nkey-derivation checksums using RC4 keys when verifying KRB-SAFE\r\nmessages.\r\n\r\nCVE-2010-4020\r\n\r\nMIT krb5 (releases krb5-1.8 and newer) incorrectly accepts RFC 3961\r\nkey-derivation checksums using RC4 keys when verifying AD-SIGNEDPATH\r\nand AD-KDC-ISSUED authorization data.\r\n\r\nCVE-2010-4021\r\n\r\nMIT krb5 KDC (release krb5-1.7 only) may issue tickets not requested\r\nby a client, based on an attacker-chosen KrbFastArmoredReq.\r\n\r\nIMPACT\r\n======\r\n\r\nCVE-2010-1324\r\n\r\nAn unauthenticated remote attacker can forge GSS tokens that are\r\nintended to be integrity-protected but unencrypted, if the targeted\r\npre-existing application session uses a DES session key.\r\n\r\nAn authenticated remote attacker can forge PACs if using a KDC that\r\ndoes not filter client-provided PAC data. This can result in\r\nprivilege escalation against a service that relies on PAC contents to\r\nmake authorization decisions.\r\n\r\nAn unauthenticated remote attacker has a 1/256 chance of swapping a\r\nclient-issued KrbFastReq into a different KDC-REQ, if the armor key is\r\nRC4. The consequences are believed to be minor.\r\n\r\nCVE-2010-1323\r\n\r\nAn unauthenticated remote attacker could alter a SAM-2 challenge,\r\naffecting the prompt text seen by the user or the kind of response\r\nsent to the KDC. Under some circumstances, this can negate the\r\nincremental security benefit of using a single-use authentication\r\nmechanism token.\r\n\r\nAn unauthenticated remote attacker has a 1/256 chance of forging\r\nKRB-SAFE messages in an application protocol if the targeted\r\npre-existing session uses an RC4 session key. Few application\r\nprotocols use KRB-SAFE messages.\r\n\r\nCVE-2010-4020\r\n\r\nAn authenticated remote attacker that controls a legitimate service\r\nprincipal has a 1/256 chance of forging the AD-SIGNEDPATH signature if\r\nthe TGT key is RC4, allowing it to use self-generated "evidence"\r\ntickets for S4U2Proxy, instead of tickets obtained from the user or\r\nwith S4U2Self. Configurations using RC4 for the TGT key are believed\r\nto be rare.\r\n\r\nAn authenticated remote attacker has a 1/256 chance of forging\r\nAD-KDC-ISSUED signatures on authdata elements in tickets having an RC4\r\nservice key, resulting in privilege escalation against a service that\r\nrelies on these signatures. There are no known uses of the KDC-ISSUED\r\nauthdata container at this time.\r\n\r\nCVE-2010-4021\r\n\r\nAn authenticated remote attacker that controls a legitimate service\r\nprincipal could obtain a valid service ticket to itself containing\r\nvalid KDC-generated authorization data for a client whose TGS-REQ it\r\nhas intercepted. The attacker could then use this ticket for\r\nS4U2Proxy to impersonate the targeted client even if the client never\r\nauthenticated to the subverted service. The vulnerable configuration\r\nis believed to be rare.\r\n\r\nAFFECTED SOFTWARE\r\n=================\r\n\r\nCVE-2010-1324\r\n\r\nKerberos application client and server software (including third-party\r\napplications) using GSS-API libraries from MIT releases krb5-1.7 and\r\nnewer are vulnerable to the DES GSS-API issue if they use GSS-API for\r\nintegrity protection of unencrypted messages.\r\n\r\nKerberos application server software (including third-party\r\napplications) using libraries from MIT releases krb5-1.7 and newer are\r\nvulnerable to the PAC issue.\r\n\r\nDeployments running exclusively KDCs from releases krb5-1.8 and newer\r\nare not vulnerable to the PAC issue because those KDCs discard\r\nclient-provided PAC authdata.\r\n\r\nThe MIT krb5 KDC in releases krb5-1.7 and newer is vulnerable to the\r\nKrbFastReq swapping issue.\r\n\r\nCVE-2010-1323\r\n\r\nInitial credential acquisition clients (including kinit) in MIT\r\nreleases krb5-1.3 and newer are vulnerable to the SAM-2 issue.\r\nThird-party applications that obtain initial Kerberos credentials\r\nusing libraries from these releases are also vulnerable.\r\n\r\nKerberos application client and server software (including third-party\r\napplications) using libraries from MIT releases krb5 krb5-1.3 and\r\nnewer are vulnerable to the RC4 KRB-SAFE issue.\r\n\r\nCVE-2010-4020\r\n\r\nThe AD-SIGNEDPATH issue affects the KDC in releases krb5-1.8 and\r\nnewer.\r\n\r\nKerberos application server software (including third-party\r\napplications) using libraries from MIT releases krb5-1.8 and newer are\r\nvulnerable to the AD-KDC-ISSUED problem. Deployments running\r\nexclusively KDCs from releases krb5-1.8 and newer discard\r\nclient-provided AD-KDC-ISSUED authdata and are not vulnerable to this\r\nissue.\r\n\r\nCVE-2010-4021\r\n\r\nThe KDC from release krb5-1.7 only is vulnerable to the KrbFastReq\r\nforgery issue.\r\n\r\nFIXES\r\n=====\r\n\r\n* Upcoming releases in the krb5-1.8 and krb5-1.7 series will contain\r\n fixes for these issues.\r\n\r\n* The patches for this advisory do not cover CVE-2010-4021, which is a\r\n minor issue already corrected in krb5-1.7.1.\r\n\r\n A patch for the krb5-1.8 series is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch.txt\r\n\r\n A PGP-signed patch is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch.txt.asc\r\n\r\n A patch for the krb5-1.7 series is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch-r17.txt\r\n\r\n A PGP-signed patch is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch-r17.txt.asc\r\n\r\n A patch for the krb5-1.6 series is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch-r16.txt\r\n\r\n A PGP-signed patch is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch-r16.txt.asc\r\n\r\n A patch for the krb5-1.5 series is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt\r\n\r\n A PGP-signed patch is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt.asc\r\n\r\nREFERENCES\r\n==========\r\n\r\nThis announcement is posted at:\r\n\r\n http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt\r\n\r\nThis announcement and related security advisories may be found on the\r\nMIT Kerberos security advisory page at:\r\n\r\n http://web.mit.edu/kerberos/advisories/index.html\r\n\r\nThe main MIT Kerberos web page is at:\r\n\r\n http://web.mit.edu/kerberos/index.html\r\n\r\nCVSSv2:\r\n\r\n http://www.first.org/cvss/cvss-guide.html\r\n http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2\r\n\r\nCVE:\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021\r\n\r\nACKNOWLEDGMENTS\r\n===============\r\n\r\nThanks to Sam Hartman for helping with analysis.\r\n\r\nCONTACT\r\n=======\r\n\r\nThe MIT Kerberos Team security contact address is\r\n<krbcore-security@mit.edu>. When sending sensitive information,\r\nplease PGP-encrypt it using the following key:\r\n\r\npub 2048R/8B8DF501 2010-01-15 [expires: 2011-02-01]\r\nuid MIT Kerberos Team Security Contact <krbcore-security@mit.edu>\r\n\r\nDETAILS\r\n=======\r\n\r\nBackground for RC4-keyed RFC 3961 checksum issues:\r\n\r\nThe hmac-sha1-des3, hmac-sha1-96-aes128, and hmac-sha1-96-aes256\r\nchecksum types are specified to be used with 3DES, AES128, and AES256\r\nkeys respectively, but MIT krb5 allows these checksum types to be used\r\nwith any type of key. All three checksum types make use of a key\r\nderivation algorithm built around the block encryption operation of\r\nthe key's encryption type.\r\n\r\nThe arcfour-hmac and arcfour-hmac-exp encryption types are specified\r\nin RFC 4757, and make use of a stream cipher instead of a block\r\ncipher. The MIT krb5 implementation treats these encryption types as\r\nhaving a cipher block size of one byte for the purposes of key\r\nderivation. When the aforementioned checksum types perform key\r\nderivation, they repeatedly invoke stream cipher encryption on\r\none-byte blocks. The result is a derived key whose contents alternate\r\nbetween a known byte (which depends only on the key usage value) and a\r\nbyte whose values depend on the key. There are only 256 possible\r\nderived keys for each key usage value.\r\n\r\nCVE-2010-1324 (GSS-API issue):\r\n\r\nRFC 4121 specifies version 2 of the krb5 GSS-API mechanism. It is\r\ncommonly used only with "newer" encryption types, but may be used with\r\nany encryption type. RFC 4121 specifies that non-confidential Wrap\r\nmessages and Message Integrity Codes (MICs) are computed using the\r\nrequired checksum type for the key's encryption type. MIT krb5 uses\r\nthe internal krb5int_c_mandatory_cksumtype function to look up this\r\nchecksum type. This function returns incorrect values for DES\r\nencryption types, selecting unkeyed rather than keyed checksums.\r\n\r\nIf a GSS-API context is established using a DES key, the MIT krb5 code\r\nwill accept Wrap or MIC tokens in either the RFC 4121 or RFC 1964\r\nstyle. An attacker can construct a Wrap or MIC token in the RFC 4121\r\nstyle using unkeyed checksums.\r\n\r\nCVE-2010-1324 (PAC issue):\r\n\r\nPrivilege Attribute Certificates (PACs) are a type of authorization\r\ndata specified in:\r\n\r\nhttp://msdn.microsoft.com/en-us/library/cc237917(PROT.13).aspx\r\n\r\nPACs contain two signature fields which bind the PAC to the server and\r\nkrbtgt keys; this signature is intended to prove that the PAC was\r\ngenerated by the KDC and not by a client. PAC signatures are\r\nspecified to use the hmac-md5, hmac-sha1-96-aes128, or\r\nhmac-sha1-96-aes256 keyed checksum types. The MIT krb5 code for\r\nverifying PAC signatures does not verify that the checksum type\r\ncontained in the PAC is a keyed signature, so a client could use an\r\nunkeyed checksum to "prove" that its made-up PAC data was generated by\r\na KDC. This attack would not work in the presence of a sufficiently\r\nrecent (1.8 or later) MIT KDC because the KDC would filter out\r\nclient-provided PAC authdata.\r\n\r\nCVE-2010-1324 (KrbFastReq swapping issue):\r\n\r\nThe KDC may accept an RFC 3961 key-derivation checksum keyed with an\r\nRC4 key in the req-checksum field of KrbArmoredFastReq. An attacker\r\nhas a 1/256 chance of guessing the derived key that would be required\r\nto bind a captured encrypted KrbFastReq to a different KDC-REQ\r\nmessage. This is probably at worst an auditing issue; the KDC will\r\nlog a successful authentication, but with the wrong parameters, and\r\nthe client will not necessarily be able to use the resulting ticket.\r\n\r\nCVE-2010-1323 (SAM-2 issue):\r\n\r\nCVSSv2 Base Score: 5.4\r\n\r\nAccess Vector: Network\r\nAccess Complexity: High\r\nAuthentication: None\r\nConfidentiality Impact: None\r\nIntegrity Impact: Complete\r\nAvailability Impact: None\r\n\r\nCVSSv2 Temporal Score: 4.2\r\n\r\nExploitability: Proof-of-Concept\r\nRemediation Level: Official Fix\r\nReport Confidence: Confirmed\r\n\r\nSAM-2 is a preauthentication mechanism described in:\r\n\r\nhttp://tools.ietf.org/html/draft-ietf-krb-wg-kerberos-sam-03 (SAM2)\r\n\r\nIn this mechanism, a KDC sends a challenge to the client consisting of\r\na challenge body and a list of checksums. The client prompts the user\r\nfor Single-use Authentication Data (SAD), computes a reply key based\r\non the SAD and the parameters in the challenge body, and then tries to\r\nverify each of the checksums against the body using the reply key. If\r\nno checksum matches, the client assumes that the SAD value is\r\nincorrect or the integrity of the challenge has been tampered with by\r\na party with no knowledge of the reply key. The MIT krb5 code for\r\nverifying SAM-2 challenge signatures does not verify that the checksum\r\ntype is keyed, so an attacker alter a challenge and supply an unkeyed\r\nsignature, fooling the client into believing that the challenge body\r\nwas not tampered with. The general result would be that the client\r\nwould transmit an invalid reply to the KDC, causing preauthentication\r\nto fail.\r\n\r\nWith non-challenge/response SAM tokens having low entropy (e.g., a\r\nclock-based token with six decimal digits of readout), this may allow\r\nan attacker to learn the SAD value by a precomputation attack,\r\nnegating the incremental security benefit of using a SAM token. This\r\nwould allow the attacker to authenticate to the KDC as the user, or to\r\nimpersonate the KDC to the user, provided that the user's password has\r\nbeen previously captured.\r\n\r\nCVE-2010-1323 (KRB-SAFE RC4 issue):\r\n\r\nThe KRB-SAFE message is intended for the integrity protection of\r\ncleartext application data. An attacker can forge KRB-SAFE messages\r\nin an existing application protocol session with 1/256 probability of\r\nsuccess, if the session uses an RC4 session key.\r\n\r\nCVE-2010-4020 (authdata RC4 issue):\r\n\r\nCVSSv2 Base Score: 3.5\r\n\r\nAccess Vector: Network\r\nAccess Complexity: Medium\r\nAuthentication: Single\r\nConfidentiality Impact: None\r\nIntegrity Impact: Partial\r\nAvailability Impact: None\r\n\r\nCVSSv2 Temporal Score: 2.7\r\n\r\nExploitability: Proof-of-Concept\r\nRemediation Level: Official Fix\r\nReport Confidence: Confirmed\r\n\r\nS4U2proxy is a Microsoft protocol extension that allows a service to\r\nimpersonate a user to another service, in a constrained way:\r\n\r\nhttp://msdn.microsoft.com/en-us/library/cc246071(PROT.13).aspx\r\n\r\nMIT and Heimdal implementations of Kerberos use an extension to take\r\nthe place of the Windows PAC in S4U2proxy evidence tickets:\r\n\r\nhttp://k5wiki.kerberos.org/wiki/Projects/ConstrainedDelegation\r\n\r\nThe signature in the SIGNEDPATH authorization data uses the TGT key,\r\nwhich is only known to the KDC. If the TGT key is RC4, then a service\r\ncan forge this signature with a 1/256 chance of success by supplying\r\nan inappropriate checksum type.\r\n\r\nCVE-2010-4021 (KrbFastReq forgery issue):\r\n\r\nCVSSv2 Base Score: 2.1\r\n\r\nAccess Vector: Network\r\nAccess Complexity: High\r\nAuthentication: Single\r\nConfidentiality Impact: None\r\nIntegrity Impact: Partial\r\nAvailability Impact: None\r\n\r\nCVSSv2 Temporal Score: 1.6\r\n\r\nExploitability: Proof-of-Concept\r\nRemediation Level: Official Fix\r\nReport Confidence: Confirmed\r\n\r\nIn release krb5-1.7, but not newer releases, the KDC allows an\r\narbitrary TGT credential to serve as the armor for TGS requests,\r\nallowing the inner request to be arbitrarily altered by an attacker\r\nwho controls a service principal. (The attacker has full knowledge of\r\nthe armor key, having provided the armor ticket.) The resulting\r\nticket is useless to both client and attacker unless the named service\r\nprincipal in the forged request is that of the attacker.\r\n\r\nBy intercepting a legitimate TGS-REQ message, a malicious service that\r\nhas S4U2Proxy privileges can rewrite the inner request so that the\r\nservice named in the request is itself, and then capture the issued\r\nticket for use as an evidence ticket in a S4U2Proxy request to\r\nimpersonate the client to another service, even though the client\r\nnever asked for a ticket for the malicious service. Since krb5-1.7\r\ndoes not natively support S4U2proxy, the attack is only feasible in\r\ncertain cross-realm configurations, which are believed to be rare,\r\ninvolving Active Directory domains that grant S4U2proxy privileges to\r\nservices in a non-AD Kerberos foreign realm.\r\n\r\nREVISION HISTORY\r\n================\r\n\r\n2010-11-30 original release\r\n\r\nCopyright (C) 2010 Massachusetts Institute of Technology\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.8 (SunOS)\r\n\r\niEYEARECAAYFAkz1SjoACgkQSO8fWy4vZo5CGgCePDfxaWdGcX70V4U83JUbi9uF\r\nVXoAoO0eP1MPEOUZt096Xsgyv1fR1k1u\r\n=BFph\r\n-----END PGP SIGNATURE-----", "cvss3": {}, "published": "2010-12-01T00:00:00", "type": "securityvulns", "title": "MITKRB5-SA-2010-007 Multiple checksum handling vulnerabilities [CVE-2010-1324 CVE-2010-1323 CVE-2010-4020 CVE-2010-4021]", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-1323"], "modified": "2010-12-01T00:00:00", "id": "SECURITYVULNS:DOC:25230", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25230", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:38", "description": "===========================================================\r\nUbuntu Security Notice USN-1031-1 December 10, 2010\r\nclamav vulnerabilities\r\nCVE-2010-4260, CVE-2010-4261, CVE-2010-4479\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 10.04 LTS\r\nUbuntu 10.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 10.04 LTS:\r\n libclamav6 0.96.3+dfsg-2ubuntu1.0.10.04.2\r\n\r\nUbuntu 10.10:\r\n libclamav6 0.96.3+dfsg-2ubuntu1.2\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nDetails follow:\r\n\r\nArkadiusz Miskiewicz and others discovered that the PDF processing\r\ncode in libclamav improperly validated input. This could allow a\r\nremote attacker to craft a PDF document that could crash clamav or\r\npossibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\r\n\r\nIt was discovered that an off-by-one error in the icon_cb function\r\nin pe_icons.c in libclamav could allow an attacker to corrupt\r\nmemory, causing clamav to crash or possibly execute arbitrary code.\r\n(CVE-2010-4261)\r\n\r\nIn the default installation, attackers would be isolated by the\r\nclamav AppArmor profile.\r\n\r\n\r\nUpdated packages for Ubuntu 10.04 LTS:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2.diff.gz\r\n Size/MD5: 284066 72a7c4ff80f395c5dc8e4e7acd6fcd39\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2.dsc\r\n Size/MD5: 2323 d1d47147356bfaf610c993b8a9ed0530\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg.orig.tar.gz\r\n Size/MD5: 40572329 730c1af9badcee2bce4bbaf1cf8ea20a\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-base_0.96.3+dfsg-2ubuntu1.0.10.04.2_all.deb\r\n Size/MD5: 297088 745b7132479daa4dbdc5ca6cc023e0b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-docs_0.96.3+dfsg-2ubuntu1.0.10.04.2_all.deb\r\n Size/MD5: 1295426 b03dae836f5cdf461c3a5f6a98a7363f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-testfiles_0.96.3+dfsg-2ubuntu1.0.10.04.2_all.deb\r\n Size/MD5: 5257088 aa5604ebd0f1e4646ce5d9e056513d11\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 424096 28c2f45042aafbf487e59ce679327bb3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 22343058 abe9dff9f24f9f9b6b9f9faf5be2936b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 313300 e88ecbee6c0f900b5854b2c1ca9b0771\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 335490 6d0081c84e0f46ee73bbf452309c03a3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 217914 11b54c1f926069a93149ce28b7cf5325\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 3898290 0bd7e669232378b4b83a8bfdd0c8d716\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_amd64.deb\r\n Size/MD5: 345108 843a766d2909777cc88ccbf03468a6fa\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 410854 416f5d73612e5d37fbb904bb80dffb49\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 22043342 aa53f5f25b3a28b22315e17544bd7a6d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 308344 d090653db3483820420e465513b7d858\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 327348 4cdcc06e3cfb9c241c7d6f560963116b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 218084 752cc79037d5f08df096c528bc7eb8b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 3751526 c6dc2280d050c37f1f82ce62ba612cac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_i386.deb\r\n Size/MD5: 338432 7156843fc6e5b7087d1fba58177ee81f\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 406882 b19ca9fc2963a4fe76940587ca7f8442\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 1495938 235245876f8a1fd659ad3696e0b8cff0\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 309068 4901391a555ca3b99facd67598e3ef63\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 325884 8a8c68c7bef2a417c05140649aabb9e7\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 217988 af08d9ccb28d785bd3067cee79f2d342\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 692904 0a11d55c4b11b7c4b6fde5b7ae283f96\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_armel.deb\r\n Size/MD5: 338696 3956ef9d6b6a60777ac474f39594f5b7\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 424978 52b56412f9313f830a49e6730f7bb4f1\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 21946304 dadb3d6e3edd3d878c23043e0b3584d8\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 312588 525bf79e6f80fa681de6e53a177fe4c8\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 332978 b5e3e48ab070066931c15f0f9843b71c\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 217914 7dd955a186cb8879aa479dd624b9f83a\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 3694500 19f57c2f9c3330de8403f95ed26bd89a\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_powerpc.deb\r\n Size/MD5: 346032 4dcf3621752746f0683e88cfae681f98\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 417504 47562db771ffce66d1e33b023815529b\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 1521812 7e2834b60264a9944b54182dd66d2644\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 310268 09362fd78f8dd8aa40bf8d638f7e953c\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 330544 243c260c46b4786b22a831feca6c22a6\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 217912 140f98988be6715168cf7f5422ab6f76\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 772802 dd43c6b2029227a726eb3f5ab90e944a\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.0.10.04.2_sparc.deb\r\n Size/MD5: 343194 6e4b332cb4162cd29895a4b5171d2abd\r\n\r\nUpdated packages for Ubuntu 10.10:\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2.diff.gz\r\n Size/MD5: 291139 9ce8ad8427f113d6e329a3c3812d68c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2.dsc\r\n Size/MD5: 2291 337c8ca91f8956bb01144d4bf3f13609\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg.orig.tar.gz\r\n Size/MD5: 40572329 730c1af9badcee2bce4bbaf1cf8ea20a\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-base_0.96.3+dfsg-2ubuntu1.2_all.deb\r\n Size/MD5: 299354 0702fd8ea1c31955e8fc797ae87c46b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-docs_0.96.3+dfsg-2ubuntu1.2_all.deb\r\n Size/MD5: 1288682 882a0315fe510542baab00e77d557a78\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-testfiles_0.96.3+dfsg-2ubuntu1.2_all.deb\r\n Size/MD5: 5257128 6e78e746dcee221c2e95bc4dfa05f362\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 423112 f64bda3984cd1f8b760f5da57d3bca92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 22417984 963e7c2edb60496ca072725e539e5b41\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 311226 0a361a85a35b6650d00fbe84c5a7580a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 334098 32f9b98511150530ad007a7c93c40386\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 217926 e1c3ab677049300717250e3908666cd1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 3922972 35138e4e10a58348be364e5b19ea5df9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_amd64.deb\r\n Size/MD5: 342886 de12b75256683c846f2919c696c71887\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 410320 a7060679083c339a102a767ed2a3d9f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 21960252 d96e86f0a3d8cddd55cfc3bea3ef3daf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 310040 a482134aedc49b9a7eff0186fb6035cd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 327554 f969082370c05ca79fcaf44062adebee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 217872 8f719985193939a25b03473bfbbcb952\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 3725056 58b1925563125ea7eddb29731d27374a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_i386.deb\r\n Size/MD5: 340596 10c0a5c04be3d339c5301df687cb7487\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 416402 e22a834a33f2d363598865896256c192\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 1530710 01fd1a616c74c7612913b3cc8a875395\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 308092 4a743b08c9a1c8ad4ec79a6455334486\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 328372 0ca2551f95b67a8af4c285e36b1efc50\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 217954 db4b7c26334bc6f9a48af201f3c8ce53\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 762684 87f79650eea51f5bca7953b4108f44c7\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_armel.deb\r\n Size/MD5: 341370 f941f44011e8220f1a1369e575ca8511\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 423734 a3cba413ddba7c8c869ef1052695d72f\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 21943056 c945d37dfdc2f90cfdd3afa9e13770ff\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 312116 f75d13c70a666b6c50c94f11d8fc5fc7\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/clamav_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 332152 9875d25fd10e30aa1caa97274fc6490c\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 217878 dd01a33de40da567649a02f9bee20135\r\n \r\nhttp://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 3689510 ff8cd6d3eb28b66036db5ada5629cd7e\r\n \r\nhttp://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.96.3+dfsg-2ubuntu1.2_powerpc.deb\r\n Size/MD5: 345698 af4e9a8d36665dce94083e6c499ffdb3\r\n\r\n", "cvss3": {}, "published": "2010-12-12T00:00:00", "type": "securityvulns", "title": "[USN-1031-1] ClamAV vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2010-12-12T00:00:00", "id": "SECURITYVULNS:DOC:25276", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25276", "sourceData": "", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2021-06-08T18:51:38", "description": "Memory corruption on PDF and PE parsing.", "cvss3": {}, "published": "2010-12-12T00:00:00", "type": "securityvulns", "title": "ClamAV antivirus multiple security vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2010-12-12T00:00:00", "id": "SECURITYVULNS:VULN:11288", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11288", "sourceData": "", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:37", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2010:218\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : php\r\n Date : October 31, 2010\r\n Affected: 2009.0, 2009.1, 2010.0, 2010.1, Corporate 4.0,\r\n Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities were discovered and corrected in php:\r\n \r\n Stack consumption vulnerability in the filter_var function in PHP 5.2.x\r\n through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL\r\n mode is used, allows remote attackers to cause a denial of service\r\n (memory consumption and application crash) via a long e-mail address\r\n string (CVE-2010-3710).\r\n \r\n A NULL pointer dereference was discovered in\r\n ZipArchive::getArchiveComment (CVE-2010-3709).\r\n \r\n A possible flaw was discovered in open_basedir (CVE-2010-3436).\r\n \r\n Packages for 2009.0 are provided as of the Extended Maintenance\r\n Program. Please visit this link to learn more:\r\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\r\n \r\n The updated packages have been patched to correct these issues.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3436\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2009.0:\r\n fc502765867803c52331e330a8a25540 \r\n2009.0/i586/libphp5_common5-5.2.14-0.2mdv2009.0.i586.rpm\r\n 484d2996febdc3836031c497cc942aa6 \r\n2009.0/i586/php-bcmath-5.2.14-0.2mdv2009.0.i586.rpm\r\n d92285d261ad28e4917b4ae37f14af74 \r\n2009.0/i586/php-bz2-5.2.14-0.2mdv2009.0.i586.rpm\r\n 9f1e090f0db80d76c19c93be505c8934 \r\n2009.0/i586/php-calendar-5.2.14-0.2mdv2009.0.i586.rpm\r\n 89794fddcf52bd907497caa8b4a0dd6c \r\n2009.0/i586/php-cgi-5.2.14-0.2mdv2009.0.i586.rpm\r\n 5ef9385c9a8050a685a7d619a05a528c \r\n2009.0/i586/php-cli-5.2.14-0.2mdv2009.0.i586.rpm\r\n 6b4c49e362bc9f39dc1f984196295b65 \r\n2009.0/i586/php-ctype-5.2.14-0.2mdv2009.0.i586.rpm\r\n ed8288c4f3c1339ba2393243878eae57 \r\n2009.0/i586/php-curl-5.2.14-0.2mdv2009.0.i586.rpm\r\n 6c5429089ba1029317bf35f74fc7fd27 \r\n2009.0/i586/php-dba-5.2.14-0.2mdv2009.0.i586.rpm\r\n 02b0c07b8d0858d09cabed8734bab460 \r\n2009.0/i586/php-dbase-5.2.14-0.2mdv2009.0.i586.rpm\r\n 4fbc31935fdc6c2d1075973312ccc4b3 \r\n2009.0/i586/php-devel-5.2.14-0.2mdv2009.0.i586.rpm\r\n 6f2eeed1d5ed01486f9b1d4ac32e18b3 \r\n2009.0/i586/php-dom-5.2.14-0.2mdv2009.0.i586.rpm\r\n f2d2f7f6d634f9d3b5ce3a97e9ec1b9f \r\n2009.0/i586/php-exif-5.2.14-0.2mdv2009.0.i586.rpm\r\n 1a86c10c9ab965f8cabc8422d8792c3f \r\n2009.0/i586/php-fcgi-5.2.14-0.2mdv2009.0.i586.rpm\r\n ec61218fc78a72568647cedd16361f3e \r\n2009.0/i586/php-filter-5.2.14-0.2mdv2009.0.i586.rpm\r\n 1b9a342a71e2dedfc4618967a11aaaf1 \r\n2009.0/i586/php-ftp-5.2.14-0.2mdv2009.0.i586.rpm\r\n 9c2b7fc279befad873916df7bcbcd69a 2009.0/i586/php-gd-5.2.14-0.2mdv2009.0.i586.rpm\r\n 9d340079a036d79655c1b3b5416650f7 \r\n2009.0/i586/php-gettext-5.2.14-0.2mdv2009.0.i586.rpm\r\n 175e24cac0bc830d20417626964b4660 \r\n2009.0/i586/php-gmp-5.2.14-0.2mdv2009.0.i586.rpm\r\n 98958b95d9a842e257f4aff00c9bc98d \r\n2009.0/i586/php-hash-5.2.14-0.2mdv2009.0.i586.rpm\r\n ca1980a86fe61c6630d8ae51010237a7 \r\n2009.0/i586/php-iconv-5.2.14-0.2mdv2009.0.i586.rpm\r\n dc707f264bba30f4ce769e01146ed6c5 \r\n2009.0/i586/php-imap-5.2.14-0.2mdv2009.0.i586.rpm\r\n 8e0f028e2981c237428abce7955018d5 \r\n2009.0/i586/php-json-5.2.14-0.2mdv2009.0.i586.rpm\r\n dcb60abf201bfe091c7ad13494c72cfd \r\n2009.0/i586/php-ldap-5.2.14-0.2mdv2009.0.i586.rpm\r\n 764a4cc80ec0b9ffd3508cce27fe4554 \r\n2009.0/i586/php-mbstring-5.2.14-0.2mdv2009.0.i586.rpm\r\n acb825ca75464c65b09773b80531903e \r\n2009.0/i586/php-mcrypt-5.2.14-0.2mdv2009.0.i586.rpm\r\n 23ea3cbd80a837f6e18f7a95b7a7d624 \r\n2009.0/i586/php-mhash-5.2.14-0.2mdv2009.0.i586.rpm\r\n b543f6ffccc0b2e3bc552005f9a61571 \r\n2009.0/i586/php-mime_magic-5.2.14-0.2mdv2009.0.i586.rpm\r\n ac010a7cbda895304883a62f1f3b8ee6 \r\n2009.0/i586/php-ming-5.2.14-0.2mdv2009.0.i586.rpm\r\n 0809151cae6dbe357fba2a789ccecb46 \r\n2009.0/i586/php-mssql-5.2.14-0.2mdv2009.0.i586.rpm\r\n 28262b04d8cfa18d7b641021470224cc \r\n2009.0/i586/php-mysql-5.2.14-0.2mdv2009.0.i586.rpm\r\n 59a0b0478fdf159f76237d27f6763716 \r\n2009.0/i586/php-mysqli-5.2.14-0.2mdv2009.0.i586.rpm\r\n 9e12dfdda5ac553749cf0fc39cff2300 \r\n2009.0/i586/php-ncurses-5.2.14-0.2mdv2009.0.i586.rpm\r\n 72990b52f5aa83edfcfcf570c664045c \r\n2009.0/i586/php-odbc-5.2.14-0.2mdv2009.0.i586.rpm\r\n b770a1fd9a69095c93899deb6a0acf37 \r\n2009.0/i586/php-openssl-5.2.14-0.2mdv2009.0.i586.rpm\r\n f2ca1de62097905d20f5b96d760e2f5d \r\n2009.0/i586/php-pcntl-5.2.14-0.2mdv2009.0.i586.rpm\r\n c33e00021eeff68a2b668038f54e7fcc \r\n2009.0/i586/php-pdo-5.2.14-0.2mdv2009.0.i586.rpm\r\n 5582d9d1b06257818663e7ed16aef731 \r\n2009.0/i586/php-pdo_dblib-5.2.14-0.2mdv2009.0.i586.rpm\r\n 85f413c6a5de21112a0da189395302f0 \r\n2009.0/i586/php-pdo_mysql-5.2.14-0.2mdv2009.0.i586.rpm\r\n 84be39a6ce59c192fe7d80ac7b6eead4 \r\n2009.0/i586/php-pdo_odbc-5.2.14-0.2mdv2009.0.i586.rpm\r\n 0994fca09fde176038d0788e51055676 \r\n2009.0/i586/php-pdo_pgsql-5.2.14-0.2mdv2009.0.i586.rpm\r\n 6522ffb26ac9873fe0374041e829e562 \r\n2009.0/i586/php-pdo_sqlite-5.2.14-0.2mdv2009.0.i586.rpm\r\n dc1f84540841f198406e06eede70cf76 \r\n2009.0/i586/php-pgsql-5.2.14-0.2mdv2009.0.i586.rpm\r\n 11213c7b5f41671a6120c19db4d0ca30 \r\n2009.0/i586/php-posix-5.2.14-0.2mdv2009.0.i586.rpm\r\n c3503407e51ef6e705eb7aac9111693d \r\n2009.0/i586/php-pspell-5.2.14-0.2mdv2009.0.i586.rpm\r\n 0a82fb85977fac7d3bc48be247c13eb1 \r\n2009.0/i586/php-readline-5.2.14-0.2mdv2009.0.i586.rpm\r\n f1360ffcca7366be062fab870457a6cd \r\n2009.0/i586/php-recode-5.2.14-0.2mdv2009.0.i586.rpm\r\n 015773eb8770845138e9588b11927948 \r\n2009.0/i586/php-session-5.2.14-0.2mdv2009.0.i586.rpm\r\n 802c020f2bd78598e30ede06d4d13330 \r\n2009.0/i586/php-shmop-5.2.14-0.2mdv2009.0.i586.rpm\r\n ad42101ed15582e7be72bd4a928f070b \r\n2009.0/i586/php-snmp-5.2.14-0.2mdv2009.0.i586.rpm\r\n 1466e52f4185a40dfbc97b7c24cf28de \r\n2009.0/i586/php-soap-5.2.14-0.2mdv2009.0.i586.rpm\r\n 62b49b44ff2690c3dcadc000947dcc80 \r\n2009.0/i586/php-sockets-5.2.14-0.2mdv2009.0.i586.rpm\r\n b91bafa27a2c3aa5d5efe3b30929e538 \r\n2009.0/i586/php-sqlite-5.2.14-0.2mdv2009.0.i586.rpm\r\n 20fe5e6c6be593f167965a92f4362182 \r\n2009.0/i586/php-sybase-5.2.14-0.2mdv2009.0.i586.rpm\r\n bac57ff5c682d9b52f836924aa86d573 \r\n2009.0/i586/php-sysvmsg-5.2.14-0.2mdv2009.0.i586.rpm\r\n 911c811eb85697c41541061ebd4bdce7 \r\n2009.0/i586/php-sysvsem-5.2.14-0.2mdv2009.0.i586.rpm\r\n 00fb209268e4b2455b03853b5bbb85c7 \r\n2009.0/i586/php-sysvshm-5.2.14-0.2mdv2009.0.i586.rpm\r\n fa6c69784aa3b3690e7cd2cd773a6c69 \r\n2009.0/i586/php-tidy-5.2.14-0.2mdv2009.0.i586.rpm\r\n 0d3f321346d939d4ef9045da69c359c3 \r\n2009.0/i586/php-tokenizer-5.2.14-0.2mdv2009.0.i586.rpm\r\n 3691317a54b41b20d832b7e4f7521827 \r\n2009.0/i586/php-wddx-5.2.14-0.2mdv2009.0.i586.rpm\r\n 0888df260b707eb1934618b45e9ef3f9 \r\n2009.0/i586/php-xml-5.2.14-0.2mdv2009.0.i586.rpm\r\n f678171a452dcf1c3e4531d9efea68eb \r\n2009.0/i586/php-xmlreader-5.2.14-0.2mdv2009.0.i586.rpm\r\n 9a5a5d74aa83318c77a0b42392ab555e \r\n2009.0/i586/php-xmlrpc-5.2.14-0.2mdv2009.0.i586.rpm\r\n 05f85dac37337fed7298edb3c8db496a \r\n2009.0/i586/php-xmlwriter-5.2.14-0.2mdv2009.0.i586.rpm\r\n c5fae635c17960a486ca7ea69c41e3a0 \r\n2009.0/i586/php-xsl-5.2.14-0.2mdv2009.0.i586.rpm\r\n b7928851f53a86e216782fa4fa70f65c \r\n2009.0/i586/php-zip-5.2.14-0.2mdv2009.0.i586.rpm\r\n c6fa4e9c4b06eba23b368a52a3f93461 \r\n2009.0/i586/php-zlib-5.2.14-0.2mdv2009.0.i586.rpm \r\n b6f075621c76f6ef9eae1d118f1a8c29 2009.0/SRPMS/php-5.2.14-0.2mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n 8654829347d12d055a67e7accaee2075 \r\n2009.0/x86_64/lib64php5_common5-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 69b6c0783713744c56b3f3e5293c8d2c \r\n2009.0/x86_64/php-bcmath-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 867f23482296d9109a7a15ff990e37ae \r\n2009.0/x86_64/php-bz2-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 417ce631fa50c5e5dddcb1ea3644b536 \r\n2009.0/x86_64/php-calendar-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 8ecf7ba059aaaded502bcdc268069bf1 \r\n2009.0/x86_64/php-cgi-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 394e7d4c0c686ab747ebc87837b97fa7 \r\n2009.0/x86_64/php-cli-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n f59a48e99cc87ec675f60f79dd5711d1 \r\n2009.0/x86_64/php-ctype-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 9dd4f2c0684d321c4782a946b116d527 \r\n2009.0/x86_64/php-curl-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 9aad29dee6ea7b471d07ba6c4d912e17 \r\n2009.0/x86_64/php-dba-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n abc01b322bc801e634c1ba208e4f30ca \r\n2009.0/x86_64/php-dbase-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 34816f5e5dfa2678bfc8d3aeb48c003e \r\n2009.0/x86_64/php-devel-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 238e9e80426f4dcee3e11051bc62fd94 \r\n2009.0/x86_64/php-dom-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n c21a874317674b0dc5048d8382a7f9dc \r\n2009.0/x86_64/php-exif-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 36e944335a15dc8b924943c16f035128 \r\n2009.0/x86_64/php-fcgi-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 53a736ec8772660bc65fe76f9bedda0c \r\n2009.0/x86_64/php-filter-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n be25a67386ddbc18cc8fbc8dd4c86311 \r\n2009.0/x86_64/php-ftp-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n be6d82253fa905c22a466b7d9b8da387 \r\n2009.0/x86_64/php-gd-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 7615ed256ef9a24e0f5f90f628b22a79 \r\n2009.0/x86_64/php-gettext-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 6846ac04dd57c042753c3cf53014940e \r\n2009.0/x86_64/php-gmp-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 3db1b93b9accdd3c8cc59bbbb04a8093 \r\n2009.0/x86_64/php-hash-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 61143f3c5161881160b27a8d0d4b877a \r\n2009.0/x86_64/php-iconv-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 6ffbb7ff284523dbe0f0d31aea0edc77 \r\n2009.0/x86_64/php-imap-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n b7e4c7baef055f7afd7d1973cf7eff5a \r\n2009.0/x86_64/php-json-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 3f82ac35cb930c01365dbf31097f0011 \r\n2009.0/x86_64/php-ldap-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 5ed308febaf9bc57548d1ee0677694f3 \r\n2009.0/x86_64/php-mbstring-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 5b6c20e1c4123a39b0f5ce8cd97e6aab \r\n2009.0/x86_64/php-mcrypt-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 01a812645346f63b8657c15e2efa1026 \r\n2009.0/x86_64/php-mhash-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 088f6362cab65ac347c297b6b524f222 \r\n2009.0/x86_64/php-mime_magic-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n a5ab3bc8474fd9324491eeb1b8b8674f \r\n2009.0/x86_64/php-ming-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n b0e10c52296a981375bb963b7c8ab6b5 \r\n2009.0/x86_64/php-mssql-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n e8a384054e0f2a7e34ae66204a9558ff \r\n2009.0/x86_64/php-mysql-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 8d221440e6a014d73607633a748dca30 \r\n2009.0/x86_64/php-mysqli-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 231f7db336d7ec688ee6e8e5bd62ce3a \r\n2009.0/x86_64/php-ncurses-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 8a942e183e80afd7005085ed7e132f93 \r\n2009.0/x86_64/php-odbc-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 576605551e0b28b392b4a34ee94ab0ae \r\n2009.0/x86_64/php-openssl-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 9d3b9b9788afda0071eae7afaf4f7f21 \r\n2009.0/x86_64/php-pcntl-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n ed8d2cfceaba7a9fc7324a2319e82cd9 \r\n2009.0/x86_64/php-pdo-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n eca7d3866dd6425f100bf3b5e6d0c9c8 \r\n2009.0/x86_64/php-pdo_dblib-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 4871d95d0bd6ca449cc0d348c62c2814 \r\n2009.0/x86_64/php-pdo_mysql-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 5fe9f3a9f4f97c726a71259baa420c4b \r\n2009.0/x86_64/php-pdo_odbc-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 4e838ac592855bffa38d534a21868403 \r\n2009.0/x86_64/php-pdo_pgsql-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n dcea50586f752f7c1403d612efa945f0 \r\n2009.0/x86_64/php-pdo_sqlite-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 281e69926277cf6f7035b7f8ce57f036 \r\n2009.0/x86_64/php-pgsql-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 2dff4715ee26f795e25a4930626c8846 \r\n2009.0/x86_64/php-posix-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 08a2630e45335b3921272c255a50c32f \r\n2009.0/x86_64/php-pspell-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 53860147c5f132ec407b0e1d1f429180 \r\n2009.0/x86_64/php-readline-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n fefb10f5214f10fecea376860167fe2f \r\n2009.0/x86_64/php-recode-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n a70e836d43904543a7b6bd4b17001bd5 \r\n2009.0/x86_64/php-session-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 98788c625225a96c5acb17a3dc10b0c6 \r\n2009.0/x86_64/php-shmop-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 41202f5dc31bf7a85bfbeacca1881e58 \r\n2009.0/x86_64/php-snmp-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n ae1dab2a589b20db81e0011d31657be2 \r\n2009.0/x86_64/php-soap-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 1162d7de68989a7b2a4e22216535c13c \r\n2009.0/x86_64/php-sockets-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 03829be7322ee33de73fc14d6d26026b \r\n2009.0/x86_64/php-sqlite-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 27da4007a882d4125e6ca9d8d1b24cda \r\n2009.0/x86_64/php-sybase-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n df9c75c8f24c410669359e0d8b8e45a6 \r\n2009.0/x86_64/php-sysvmsg-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n f62693bc4089440d8b5245520b6bc735 \r\n2009.0/x86_64/php-sysvsem-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 1405738f1dc42b24a791104f205fb902 \r\n2009.0/x86_64/php-sysvshm-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 5254e62e5274bcbbf57d9755efae0dc3 \r\n2009.0/x86_64/php-tidy-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 0dce5985bf26b376c787364c9911295c \r\n2009.0/x86_64/php-tokenizer-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 6b26f6ccdee85b6bc5b47c8bccce63ce \r\n2009.0/x86_64/php-wddx-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 1a05972b34ef1365dc2cad0f3da42056 \r\n2009.0/x86_64/php-xml-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 4fcd162ccb7c97fcbd4da259cb59ad1b \r\n2009.0/x86_64/php-xmlreader-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 93a7ae04b9828b67f1f2ead72a436c10 \r\n2009.0/x86_64/php-xmlrpc-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 56d5c80acc2d822f19052e0080dcb5cf \r\n2009.0/x86_64/php-xmlwriter-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 75284c09346a76399bb1183198319227 \r\n2009.0/x86_64/php-xsl-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n 1964938515cc5c8c56a0876f4b9638f0 \r\n2009.0/x86_64/php-zip-5.2.14-0.2mdv2009.0.x86_64.rpm\r\n c78dcc02df632001106a23a2b09a0530 \r\n2009.0/x86_64/php-zlib-5.2.14-0.2mdv2009.0.x86_64.rpm \r\n b6f075621c76f6ef9eae1d118f1a8c29 2009.0/SRPMS/php-5.2.14-0.2mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.1:\r\n 40c80a005a9c887b46dc2170cf01911a \r\n2009.1/i586/libphp5_common5-5.2.14-0.2mdv2009.1.i586.rpm\r\n 655c94c225617d401be807512f62648d \r\n2009.1/i586/php-bcmath-5.2.14-0.2mdv2009.1.i586.rpm\r\n b525e3e7fb0776307ef98017b2b0f9e6 \r\n2009.1/i586/php-bz2-5.2.14-0.2mdv2009.1.i586.rpm\r\n ea9d79bf59652a7f36bc4a8530306667 \r\n2009.1/i586/php-calendar-5.2.14-0.2mdv2009.1.i586.rpm\r\n dcfb6d7a1c4d1d7889e3e22714f6641d \r\n2009.1/i586/php-cgi-5.2.14-0.2mdv2009.1.i586.rpm\r\n aefd3adbf9694c12d0e48411590756f5 \r\n2009.1/i586/php-cli-5.2.14-0.2mdv2009.1.i586.rpm\r\n 5681e806ccde04841b37b4f5f78de6b6 \r\n2009.1/i586/php-ctype-5.2.14-0.2mdv2009.1.i586.rpm\r\n 689c5389db39b4c226e39e65e9c06a46 \r\n2009.1/i586/php-curl-5.2.14-0.2mdv2009.1.i586.rpm\r\n 1e06d4802bfbca461bb74c2f7b3fdfb9 \r\n2009.1/i586/php-dba-5.2.14-0.2mdv2009.1.i586.rpm\r\n df546edd43dc87c950144c3a0652b0b5 \r\n2009.1/i586/php-dbase-5.2.14-0.2mdv2009.1.i586.rpm\r\n c056bbd3e4c565c70a1d3e27bd1f4573 \r\n2009.1/i586/php-devel-5.2.14-0.2mdv2009.1.i586.rpm\r\n 7b2026230168485f97f18fdd9d22b969 \r\n2009.1/i586/php-dom-5.2.14-0.2mdv2009.1.i586.rpm\r\n b3e8768d579f116a4ed793b2c5e5e5df \r\n2009.1/i586/php-exif-5.2.14-0.2mdv2009.1.i586.rpm\r\n 92af9f57293502a01381741e79c214a4 \r\n2009.1/i586/php-fcgi-5.2.14-0.2mdv2009.1.i586.rpm\r\n 53769eacc90a4e99933df1c9d1c13f6c \r\n2009.1/i586/php-filter-5.2.14-0.2mdv2009.1.i586.rpm\r\n fbb7daf7d347e78c66d674d51d9b6b65 \r\n2009.1/i586/php-ftp-5.2.14-0.2mdv2009.1.i586.rpm\r\n 6cb5f8df0af96cd2e54992a1d4227a9e 2009.1/i586/php-gd-5.2.14-0.2mdv2009.1.i586.rpm\r\n 1cb3c1f441771ad0546a66fd31bdcab3 \r\n2009.1/i586/php-gettext-5.2.14-0.2mdv2009.1.i586.rpm\r\n 6be2f50f5ad8a9431e6172f8ed1ff7c7 \r\n2009.1/i586/php-gmp-5.2.14-0.2mdv2009.1.i586.rpm\r\n ab46c0c1b248ca32903346b6aaba6cbc \r\n2009.1/i586/php-hash-5.2.14-0.2mdv2009.1.i586.rpm\r\n 79610e4080db62d6d26ebeefe51da19b \r\n2009.1/i586/php-iconv-5.2.14-0.2mdv2009.1.i586.rpm\r\n 6b53be639abf65eb304d717d91c716a2 \r\n2009.1/i586/php-imap-5.2.14-0.2mdv2009.1.i586.rpm\r\n 0cbf18ad47b7eca6a760e552dfd53c2a \r\n2009.1/i586/php-json-5.2.14-0.2mdv2009.1.i586.rpm\r\n d57dbed88cab2482d0e60c4eda79f176 \r\n2009.1/i586/php-ldap-5.2.14-0.2mdv2009.1.i586.rpm\r\n 632fc39112d7e023155fa11a77a564bf \r\n2009.1/i586/php-mbstring-5.2.14-0.2mdv2009.1.i586.rpm\r\n 7fa53336aaac71ed6aff4fcb10d02994 \r\n2009.1/i586/php-mcrypt-5.2.14-0.2mdv2009.1.i586.rpm\r\n c53e49df6f29e3461042830da42ecd5d \r\n2009.1/i586/php-mhash-5.2.14-0.2mdv2009.1.i586.rpm\r\n d386628e1061ae753096043eab541ef4 \r\n2009.1/i586/php-mime_magic-5.2.14-0.2mdv2009.1.i586.rpm\r\n ff4f8bf854a54d585c5e866c78353740 \r\n2009.1/i586/php-ming-5.2.14-0.2mdv2009.1.i586.rpm\r\n 5682bf7ab2b93f25e3c82ccbc7f348d2 \r\n2009.1/i586/php-mssql-5.2.14-0.2mdv2009.1.i586.rpm\r\n a73796e1c7254ce52059dc83ea53d2c1 \r\n2009.1/i586/php-mysql-5.2.14-0.2mdv2009.1.i586.rpm\r\n d026c149775e714cafbebdad05d73afb \r\n2009.1/i586/php-mysqli-5.2.14-0.2mdv2009.1.i586.rpm\r\n 030dd9a132a202fe1ffc8a0716b86ff9 \r\n2009.1/i586/php-ncurses-5.2.14-0.2mdv2009.1.i586.rpm\r\n 059158ccefe28badc86ec7f765afe058 \r\n2009.1/i586/php-odbc-5.2.14-0.2mdv2009.1.i586.rpm\r\n 672cea4af0c97f6f792c3e32d9fc0a4e \r\n2009.1/i586/php-openssl-5.2.14-0.2mdv2009.1.i586.rpm\r\n 06831420729fb9d49d97b5d2d23a6da0 \r\n2009.1/i586/php-pcntl-5.2.14-0.2mdv2009.1.i586.rpm\r\n eeb1f4fe4c9a31a570f5d65d74b51569 \r\n2009.1/i586/php-pdo-5.2.14-0.2mdv2009.1.i586.rpm\r\n fbcf127feb8102d401779b1beacaee24 \r\n2009.1/i586/php-pdo_dblib-5.2.14-0.2mdv2009.1.i586.rpm\r\n 44533e6a0083da4fbc0b49b7cccc5e94 \r\n2009.1/i586/php-pdo_mysql-5.2.14-0.2mdv2009.1.i586.rpm\r\n 71e4fb3237542d8580790ef0591e3f69 \r\n2009.1/i586/php-pdo_odbc-5.2.14-0.2mdv2009.1.i586.rpm\r\n e4a1cf5cc9b6a2152cb47c9910733887 \r\n2009.1/i586/php-pdo_pgsql-5.2.14-0.2mdv2009.1.i586.rpm\r\n 6c864996b3879affba3d9e3b1530e7a9 \r\n2009.1/i586/php-pdo_sqlite-5.2.14-0.2mdv2009.1.i586.rpm\r\n c1b616a4bf3cfbd64ec47fb965e6b1da \r\n2009.1/i586/php-pgsql-5.2.14-0.2mdv2009.1.i586.rpm\r\n cb9e9f6e6f98be02b7f80d40b57b46fb \r\n2009.1/i586/php-posix-5.2.14-0.2mdv2009.1.i586.rpm\r\n f83e5af2fa60ecf9b4b04fb5cc1c1932 \r\n2009.1/i586/php-pspell-5.2.14-0.2mdv2009.1.i586.rpm\r\n af63a15baa60ecb305bbd979498e0463 \r\n2009.1/i586/php-readline-5.2.14-0.2mdv2009.1.i586.rpm\r\n ddeb78813405a62db1cafa414fc410d0 \r\n2009.1/i586/php-recode-5.2.14-0.2mdv2009.1.i586.rpm\r\n fb9a1beb79f46610d81fd445cf370c95 \r\n2009.1/i586/php-session-5.2.14-0.2mdv2009.1.i586.rpm\r\n 49256ec1825f377b519b647f2a7c103f \r\n2009.1/i586/php-shmop-5.2.14-0.2mdv2009.1.i586.rpm\r\n c75dd2c51dae5763c94576e04c66d2c2 \r\n2009.1/i586/php-snmp-5.2.14-0.2mdv2009.1.i586.rpm\r\n 6ed4154d553595370f729886662c9b81 \r\n2009.1/i586/php-soap-5.2.14-0.2mdv2009.1.i586.rpm\r\n 14df37dd2533c6616e34b7ff3c112624 \r\n2009.1/i586/php-sockets-5.2.14-0.2mdv2009.1.i586.rpm\r\n 11d51b6b3f92a61e31b7fc9cc08c6e97 \r\n2009.1/i586/php-sqlite-5.2.14-0.2mdv2009.1.i586.rpm\r\n 8fb802cf6431ff684d344b4c524763ab \r\n2009.1/i586/php-sybase-5.2.14-0.2mdv2009.1.i586.rpm\r\n f4ee7885ab1c541c8e91fed2360e0017 \r\n2009.1/i586/php-sysvmsg-5.2.14-0.2mdv2009.1.i586.rpm\r\n 901b7ddf689db1783d39226d04fe51ee \r\n2009.1/i586/php-sysvsem-5.2.14-0.2mdv2009.1.i586.rpm\r\n 89b35016a8646244ab0696f25df140b4 \r\n2009.1/i586/php-sysvshm-5.2.14-0.2mdv2009.1.i586.rpm\r\n 50b353b2eedad4e7de9f5f04ad71adab \r\n2009.1/i586/php-tidy-5.2.14-0.2mdv2009.1.i586.rpm\r\n 1061f088d52f1c310b80f5dc8e5a712f \r\n2009.1/i586/php-tokenizer-5.2.14-0.2mdv2009.1.i586.rpm\r\n affa049612883f368682984c7acebbb3 \r\n2009.1/i586/php-wddx-5.2.14-0.2mdv2009.1.i586.rpm\r\n 38020ffe3ec77d9bdb7a1e4a4b603230 \r\n2009.1/i586/php-xml-5.2.14-0.2mdv2009.1.i586.rpm\r\n fecfd8841e772091d7c23135f7014e28 \r\n2009.1/i586/php-xmlreader-5.2.14-0.2mdv2009.1.i586.rpm\r\n 387351ba3c066e738be9545eb096ab27 \r\n2009.1/i586/php-xmlrpc-5.2.14-0.2mdv2009.1.i586.rpm\r\n dd1ef4a15b96cffecdbfa155beba3627 \r\n2009.1/i586/php-xmlwriter-5.2.14-0.2mdv2009.1.i586.rpm\r\n e9ad866fb44ba02f69cc19cab21ba4d2 \r\n2009.1/i586/php-xsl-5.2.14-0.2mdv2009.1.i586.rpm\r\n 9aad041ea90193e9e6163cdb3f179b16 \r\n2009.1/i586/php-zip-5.2.14-0.2mdv2009.1.i586.rpm\r\n 5be02ff40c26552c88c6c8abd6b49799 \r\n2009.1/i586/php-zlib-5.2.14-0.2mdv2009.1.i586.rpm \r\n bb482c6bd2d14f7d52c1aa5a934196a8 2009.1/SRPMS/php-5.2.14-0.2mdv2009.1.src.rpm\r\n\r\n Mandriva Linux 2009.1/X86_64:\r\n ebef2aa9c330e1272c9b49c254bfc7d7 \r\n2009.1/x86_64/lib64php5_common5-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 68ab897961e9af54e0ab0e13c8f62ff0 \r\n2009.1/x86_64/php-bcmath-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 036829e1438fdc2c9258c8e957f04ab6 \r\n2009.1/x86_64/php-bz2-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 8c9d0f258cd4c261f6ef40991a245f1c \r\n2009.1/x86_64/php-calendar-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7bbb3b82c551079ee71ef53f82974e24 \r\n2009.1/x86_64/php-cgi-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 5fa13b6bf22877a451f450729149bb6a \r\n2009.1/x86_64/php-cli-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 20b5632cbd0eef84e6732d18f464b90e \r\n2009.1/x86_64/php-ctype-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n ccd41f770d6f0aba7f635ef4b4ce0352 \r\n2009.1/x86_64/php-curl-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 40c510409912aedd1ec696bea26cbcdc \r\n2009.1/x86_64/php-dba-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n fd4c2919ccdf6fb332fdf3ac7b5657fe \r\n2009.1/x86_64/php-dbase-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n d2e9b7c597117ef1d9f5ea22b45e131f \r\n2009.1/x86_64/php-devel-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 4a6b1c4c4e2022854f63d7c23f88f827 \r\n2009.1/x86_64/php-dom-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 1c2366eba6b64931959875b7b363ca39 \r\n2009.1/x86_64/php-exif-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7433050da10ae034e33c674b5c181ff4 \r\n2009.1/x86_64/php-fcgi-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 0afe85aaec5e5ba121f3c9ebbfc08e48 \r\n2009.1/x86_64/php-filter-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n e336d6eae63cea976299ecf8ec499a00 \r\n2009.1/x86_64/php-ftp-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 0e4da4aac1cb5c7a2b18e93baa7df50a \r\n2009.1/x86_64/php-gd-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 0225e846be17152fdda203475a7ff7c3 \r\n2009.1/x86_64/php-gettext-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n d267d598cad3c663ee2dfa47394a1dac \r\n2009.1/x86_64/php-gmp-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 6d67e3b89156248fcc1ebf5df8593f48 \r\n2009.1/x86_64/php-hash-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 14a6bb2390e4c2f4f4999f46c8fd687f \r\n2009.1/x86_64/php-iconv-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 3888422371dee060d80e6f4b241416c4 \r\n2009.1/x86_64/php-imap-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 2b5a98d958b437cf7dc386b1e1826360 \r\n2009.1/x86_64/php-json-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n ffe95800ca5fc6ab3c427973160ce1b8 \r\n2009.1/x86_64/php-ldap-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7fd8e1d366a339c9f61a8ec2740a638b \r\n2009.1/x86_64/php-mbstring-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n a8b37aa7b37e34323f171392504ef059 \r\n2009.1/x86_64/php-mcrypt-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7355890f742cd4285b2700f4f47e660b \r\n2009.1/x86_64/php-mhash-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n ab37ece56bd0003000dd386144914e3d \r\n2009.1/x86_64/php-mime_magic-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 673b17f7d6b6ac5cf16d65456607a835 \r\n2009.1/x86_64/php-ming-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 5cd38a31672ece72ff9f91498b8e184d \r\n2009.1/x86_64/php-mssql-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 335cedadf385270675ece0e02dacca49 \r\n2009.1/x86_64/php-mysql-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 06e6ef70e4be249ddfc549a3f314b354 \r\n2009.1/x86_64/php-mysqli-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 700868a11164d4569932539076bc06f1 \r\n2009.1/x86_64/php-ncurses-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n bc122358b1ef2368aefea3d9b4765907 \r\n2009.1/x86_64/php-odbc-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n a65f676a45ad5a6b54c8dcf939d124f3 \r\n2009.1/x86_64/php-openssl-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n d8ec5f16432b6b17cd91a7e833a3a5fc \r\n2009.1/x86_64/php-pcntl-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n f0e0c0e8198a6243d5ccc63172a311f3 \r\n2009.1/x86_64/php-pdo-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 47efb119ac441e6b66ccf6b524a75d09 \r\n2009.1/x86_64/php-pdo_dblib-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 31eb2cdbe7a965ec5353100814a2c1eb \r\n2009.1/x86_64/php-pdo_mysql-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7e9641b2b87a1c131a66ddc9b9d63b47 \r\n2009.1/x86_64/php-pdo_odbc-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 04fd3d6631e6bafe59e51b34cbbc5a0d \r\n2009.1/x86_64/php-pdo_pgsql-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 99944f56e62cf74657a758a92bb862de \r\n2009.1/x86_64/php-pdo_sqlite-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 6e182dfdc406fb21add2d391fef77a59 \r\n2009.1/x86_64/php-pgsql-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 52dc9d3161b72b38a48b31c244387a68 \r\n2009.1/x86_64/php-posix-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 8c7b7d243b210a3a3cf21b6b4f28b6ef \r\n2009.1/x86_64/php-pspell-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 3f990c9a353461f74bb20322606d70dc \r\n2009.1/x86_64/php-readline-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 20fd9e1e0706299f7e39d3028fb1bfe7 \r\n2009.1/x86_64/php-recode-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 020d2a6764d0804af3f4a8cf3d3806b4 \r\n2009.1/x86_64/php-session-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 945158d59e119abd34196342d18cb5ef \r\n2009.1/x86_64/php-shmop-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 38a59ad0964d2285dd22ec8a8dfba3fa \r\n2009.1/x86_64/php-snmp-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 5652a499ba12cb6c9bbda8cf3e41deb7 \r\n2009.1/x86_64/php-soap-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 1fed506dddcbba887afe2095540407b9 \r\n2009.1/x86_64/php-sockets-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 9f03c1b91b6fd08ca7cea6b9381a940f \r\n2009.1/x86_64/php-sqlite-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 0292232962af3fffcc529f1a74be9a85 \r\n2009.1/x86_64/php-sybase-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7d98336c71a4938fd88f72e6f33a5c28 \r\n2009.1/x86_64/php-sysvmsg-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 43d4daabd6f65547d251213bc3f67292 \r\n2009.1/x86_64/php-sysvsem-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n adab3cd2fd16d0d4b1763431cbe64e54 \r\n2009.1/x86_64/php-sysvshm-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 648183705062b36db901184df308e7ca \r\n2009.1/x86_64/php-tidy-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 7e0f8c94ec712a62bcc66af259835ac0 \r\n2009.1/x86_64/php-tokenizer-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n aaf35c8d752a2687d2ec1c5b90ebfc2e \r\n2009.1/x86_64/php-wddx-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 22e4370ed9f2cb1c1ae946830fc2fdf6 \r\n2009.1/x86_64/php-xml-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n cbbe105e4b6057dededfe0c058a6bd89 \r\n2009.1/x86_64/php-xmlreader-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n dbc8d8033aa9c072aa8907a17cb83b5d \r\n2009.1/x86_64/php-xmlrpc-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n c6d44bffe5a6792a5c4ce30e0227e222 \r\n2009.1/x86_64/php-xmlwriter-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n c82a29791c12e2e5fc7c26f9b74cc4aa \r\n2009.1/x86_64/php-xsl-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n eed05c4f7bc2567015dee6495d54e1f1 \r\n2009.1/x86_64/php-zip-5.2.14-0.2mdv2009.1.x86_64.rpm\r\n 14a2cc3fefa8b567210d1f88a5fd0078 \r\n2009.1/x86_64/php-zlib-5.2.14-0.2mdv2009.1.x86_64.rpm \r\n bb482c6bd2d14f7d52c1aa5a934196a8 2009.1/SRPMS/php-5.2.14-0.2mdv2009.1.src.rpm\r\n\r\n Mandriva Linux 2010.0:\r\n 7008f7561a559d6549463b749195515b \r\n2010.0/i586/libphp5_common5-5.3.3-0.2mdv2010.0.i586.rpm\r\n 5f636a3cdf7c43f71cf20c0533eaca04 \r\n2010.0/i586/php-bcmath-5.3.3-0.2mdv2010.0.i586.rpm\r\n 51fb7db13a901acb2adee1b8716cf9d2 2010.0/i586/php-bz2-5.3.3-0.2mdv2010.0.i586.rpm\r\n 033b96a20a70ef4ed78e31cbe07c5049 \r\n2010.0/i586/php-calendar-5.3.3-0.2mdv2010.0.i586.rpm\r\n 70332830c24bfc4c684c46f740483c9f 2010.0/i586/php-cgi-5.3.3-0.2mdv2010.0.i586.rpm\r\n 251883aa969d33c0449838aa7c4aaaa5 2010.0/i586/php-cli-5.3.3-0.2mdv2010.0.i586.rpm\r\n bf5c010d54c5ae5821ae07a6b8d8f15b \r\n2010.0/i586/php-ctype-5.3.3-0.2mdv2010.0.i586.rpm\r\n ed6d5f568611fbb0455219a140d0c2b8 \r\n2010.0/i586/php-curl-5.3.3-0.2mdv2010.0.i586.rpm\r\n a9fb79f06b246c6e03fb6b2909690ce8 2010.0/i586/php-dba-5.3.3-0.2mdv2010.0.i586.rpm\r\n c4f8bdab970541c92ae2924ed4e32cbd \r\n2010.0/i586/php-devel-5.3.3-0.2mdv2010.0.i586.rpm\r\n 468dbc6ab3c0166276c36a97c5f9be3a 2010.0/i586/php-doc-5.3.3-0.2mdv2010.0.i586.rpm\r\n 41bcb35915b2ef724ea4f9a8fb4cccdd 2010.0/i586/php-dom-5.3.3-0.2mdv2010.0.i586.rpm\r\n d05bdaa9c79f2c201569c6df6c5b111b \r\n2010.0/i586/php-enchant-5.3.3-0.2mdv2010.0.i586.rpm\r\n e21efc27b34149eade9cac5d651fbdec \r\n2010.0/i586/php-exif-5.3.3-0.2mdv2010.0.i586.rpm\r\n fb0b5457315d3ced0ea05a14ceb06e90 \r\n2010.0/i586/php-fileinfo-5.3.3-0.2mdv2010.0.i586.rpm\r\n e3b7aa13cb82341db81f368602358272 \r\n2010.0/i586/php-filter-5.3.3-0.2mdv2010.0.i586.rpm\r\n 6150918a9d0c433aaf90d2c2e2605f06 2010.0/i586/php-fpm-5.3.3-0.2mdv2010.0.i586.rpm\r\n cbcde2f578a5c71b54aa88de5a3c3d52 2010.0/i586/php-ftp-5.3.3-0.2mdv2010.0.i586.rpm\r\n cae8f6d37d4e601a95270970b3cbf955 2010.0/i586/php-gd-5.3.3-0.2mdv2010.0.i586.rpm\r\n 87ea8eeaa28ac32326cad7b5356a44bd \r\n2010.0/i586/php-gettext-5.3.3-0.2mdv2010.0.i586.rpm\r\n b35a22b312e56978295281a5d059f0d7 2010.0/i586/php-gmp-5.3.3-0.2mdv2010.0.i586.rpm\r\n 4f522862a5c6ae67e2e02ded5f0b29d8 \r\n2010.0/i586/php-hash-5.3.3-0.2mdv2010.0.i586.rpm\r\n 0104423396431de9b25babce810d3873 \r\n2010.0/i586/php-iconv-5.3.3-0.2mdv2010.0.i586.rpm\r\n ab402a156819fd6ff40e5400e41082e6 \r\n2010.0/i586/php-imap-5.3.3-0.2mdv2010.0.i586.rpm\r\n 7aa80681ec50257249ad501368e4107a \r\n2010.0/i586/php-intl-5.3.3-0.2mdv2010.0.i586.rpm\r\n 5fd6225bc3ec8a2fcb78f54374dbd5c7 \r\n2010.0/i586/php-json-5.3.3-0.2mdv2010.0.i586.rpm\r\n 7c571f330b075b9f7ecf50e9a92505ee \r\n2010.0/i586/php-ldap-5.3.3-0.2mdv2010.0.i586.rpm\r\n aaffabcba5c6d2d71161be6625022300 \r\n2010.0/i586/php-mbstring-5.3.3-0.2mdv2010.0.i586.rpm\r\n 2360001f987098f15c0f2159100a83d7 \r\n2010.0/i586/php-mcrypt-5.3.3-0.2mdv2010.0.i586.rpm\r\n 901fc2812698b635dbdca6d29455f3fa \r\n2010.0/i586/php-mssql-5.3.3-0.2mdv2010.0.i586.rpm\r\n 035e212a962f7c68da0476255c7f699c \r\n2010.0/i586/php-mysql-5.3.3-0.2mdv2010.0.i586.rpm\r\n fa35496cb53adb83f62dbf8cf1fb61c0 \r\n2010.0/i586/php-mysqli-5.3.3-0.2mdv2010.0.i586.rpm\r\n 73f67b3c2a8c07125e878b15278ef048 \r\n2010.0/i586/php-odbc-5.3.3-0.2mdv2010.0.i586.rpm\r\n 91bcc578e75383f099343012210d93dc \r\n2010.0/i586/php-openssl-5.3.3-0.2mdv2010.0.i586.rpm\r\n 0caa23017fb14425aa2335af77110fe5 \r\n2010.0/i586/php-pcntl-5.3.3-0.2mdv2010.0.i586.rpm\r\n 7c2b158de2e52f4795f53cc794c2741e 2010.0/i586/php-pdo-5.3.3-0.2mdv2010.0.i586.rpm\r\n d4bcb032e659917412cd635f8bc2c88e \r\n2010.0/i586/php-pdo_dblib-5.3.3-0.2mdv2010.0.i586.rpm\r\n 2c981f93e1956acc986c38585e3e958b \r\n2010.0/i586/php-pdo_mysql-5.3.3-0.2mdv2010.0.i586.rpm\r\n d80d4f28aa35ab713724ebace9b8ecf4 \r\n2010.0/i586/php-pdo_odbc-5.3.3-0.2mdv2010.0.i586.rpm\r\n 940e44bb533ba72c10c2ab88902890a6 \r\n2010.0/i586/php-pdo_pgsql-5.3.3-0.2mdv2010.0.i586.rpm\r\n 2b020cb7b2ad1b98b94e203485ea3da6 \r\n2010.0/i586/php-pdo_sqlite-5.3.3-0.2mdv2010.0.i586.rpm\r\n e5fd6c3d25275b44714bde3663935410 \r\n2010.0/i586/php-pgsql-5.3.3-0.2mdv2010.0.i586.rpm\r\n 0ee626bcb30af3694999a945e25a31c1 \r\n2010.0/i586/php-posix-5.3.3-0.2mdv2010.0.i586.rpm\r\n c9481f4a6cf3fad5af10ef01730ebd9c \r\n2010.0/i586/php-pspell-5.3.3-0.2mdv2010.0.i586.rpm\r\n a56d285884af8288ece754994779fa60 \r\n2010.0/i586/php-readline-5.3.3-0.2mdv2010.0.i586.rpm\r\n 7bd819550e539e14a34b6d4cb3587989 \r\n2010.0/i586/php-recode-5.3.3-0.2mdv2010.0.i586.rpm\r\n 322f56a2fd1fcfd31e5230b2e6be5088 \r\n2010.0/i586/php-session-5.3.3-0.2mdv2010.0.i586.rpm\r\n a03cc35461076c555b121250b538ebdc \r\n2010.0/i586/php-shmop-5.3.3-0.2mdv2010.0.i586.rpm\r\n e5e67738a88f07acf04324286d46addd \r\n2010.0/i586/php-snmp-5.3.3-0.2mdv2010.0.i586.rpm\r\n 619d281559a9f7d29e9c9f082359e458 \r\n2010.0/i586/php-soap-5.3.3-0.2mdv2010.0.i586.rpm\r\n 52743e7a46deaf979a6605fb06821e83 \r\n2010.0/i586/php-sockets-5.3.3-0.2mdv2010.0.i586.rpm\r\n 848dc3ab1beca1617b417c30f3e42d9e \r\n2010.0/i586/php-sqlite3-5.3.3-0.2mdv2010.0.i586.rpm\r\n 183235ce11c3735df9fa8271f8e52e28 \r\n2010.0/i586/php-sybase_ct-5.3.3-0.2mdv2010.0.i586.rpm\r\n 16b12edd32de613b5a253839529f0a17 \r\n2010.0/i586/php-sysvmsg-5.3.3-0.2mdv2010.0.i586.rpm\r\n 33e0711e85f5b6e9081cbd1f9ef593a7 \r\n2010.0/i586/php-sysvsem-5.3.3-0.2mdv2010.0.i586.rpm\r\n 220f3957b090e4c262b06833320bc4ef \r\n2010.0/i586/php-sysvshm-5.3.3-0.2mdv2010.0.i586.rpm\r\n 80ba46a8b5456c6e7b17f2a615d9268c \r\n2010.0/i586/php-tidy-5.3.3-0.2mdv2010.0.i586.rpm\r\n 6211af3e83df2fcf0b57ddba58ca77c0 \r\n2010.0/i586/php-tokenizer-5.3.3-0.2mdv2010.0.i586.rpm\r\n e34d96228758aaee4ef283a7fbea8b67 \r\n2010.0/i586/php-wddx-5.3.3-0.2mdv2010.0.i586.rpm\r\n c0a5a672971961be0f440fb6b6b8c539 2010.0/i586/php-xml-5.3.3-0.2mdv2010.0.i586.rpm\r\n 1fbae195a487498227c8d56b372a90c2 \r\n2010.0/i586/php-xmlreader-5.3.3-0.2mdv2010.0.i586.rpm\r\n 2d77a4872311a9bb30bb26210a0563ec \r\n2010.0/i586/php-xmlrpc-5.3.3-0.2mdv2010.0.i586.rpm\r\n 9727fa43934aca74e643d12db15ef51b \r\n2010.0/i586/php-xmlwriter-5.3.3-0.2mdv2010.0.i586.rpm\r\n 25fa6c151929bb9bad1229eb1ca7a49a 2010.0/i586/php-xsl-5.3.3-0.2mdv2010.0.i586.rpm\r\n bb39a018c4e2643d29210548b0af9ac5 2010.0/i586/php-zip-5.3.3-0.2mdv2010.0.i586.rpm\r\n c5da63cebc2f42dc9d47af8ec2acf014 \r\n2010.0/i586/php-zlib-5.3.3-0.2mdv2010.0.i586.rpm \r\n 9960b5f2785dbfe6c4ba0856fb6c887f 2010.0/SRPMS/php-5.3.3-0.2mdv2010.0.src.rpm\r\n\r\n Mandriva Linux 2010.0/X86_64:\r\n dd551619adf416835829b9d8246d4caa \r\n2010.0/x86_64/lib64php5_common5-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 4e5174d4251d8c3afdaae3405745842b \r\n2010.0/x86_64/php-bcmath-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 8bcd47ba33a926718b5da55e54bd97c4 \r\n2010.0/x86_64/php-bz2-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 8f4647862ae113e7ca9c67e2d8ae1cf5 \r\n2010.0/x86_64/php-calendar-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 88df7560b93426ca270d55763c032b07 \r\n2010.0/x86_64/php-cgi-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n a2c066bf03b2e1a3676ea2202fb73e22 \r\n2010.0/x86_64/php-cli-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 2cc2397e4cb50f04f210cf011d0b13c2 \r\n2010.0/x86_64/php-ctype-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 5c52c74406121f94c313118753b80a02 \r\n2010.0/x86_64/php-curl-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 045266e9fb042485c192fc3e2d105baa \r\n2010.0/x86_64/php-dba-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 580dfcd93361d46ab59946fb037ce71e \r\n2010.0/x86_64/php-devel-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n ed7a6faaa80279e980faa7b93970ce59 \r\n2010.0/x86_64/php-doc-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n adfcbe1c59c9b4e1bd4916d21e68ed6c \r\n2010.0/x86_64/php-dom-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 1032d3ecd66c7810a96c272b041174d8 \r\n2010.0/x86_64/php-enchant-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 5dc71cace024d4fd6b136314f71da200 \r\n2010.0/x86_64/php-exif-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n cc975bc1abe99b224d2deb980a3cc7e7 \r\n2010.0/x86_64/php-fileinfo-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 181b51575dd51d359bcfdbc8ccf043e5 \r\n2010.0/x86_64/php-filter-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n cc8e3b93c622d9fca42794193fc0ba56 \r\n2010.0/x86_64/php-fpm-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n ab9fdbebd21be4329c897616e537768a \r\n2010.0/x86_64/php-ftp-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 9211f1d2cb90b21b29f0ea94b54096e4 \r\n2010.0/x86_64/php-gd-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 05b9f43082a96d4ce1077b5c0f30c45a \r\n2010.0/x86_64/php-gettext-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 13c8311a7e77836d94006ea63a740740 \r\n2010.0/x86_64/php-gmp-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 1c9e996151d13dbd511731c2669dc798 \r\n2010.0/x86_64/php-hash-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n deb3088e921aa35c83ac1f4fc53359ea \r\n2010.0/x86_64/php-iconv-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 962c4c1d9234929e4681afb3d5b1ab95 \r\n2010.0/x86_64/php-imap-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 0955f02d6c596329658695562740c99b \r\n2010.0/x86_64/php-intl-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n c9124709562d967467933a4b68b9edce \r\n2010.0/x86_64/php-json-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n e0db53fe224c72461ceafea9a7b39601 \r\n2010.0/x86_64/php-ldap-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 06beb9f512feed9ffc0d995766f9f927 \r\n2010.0/x86_64/php-mbstring-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n f91efaa5a2f1522848c2219e981e70ef \r\n2010.0/x86_64/php-mcrypt-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n affd61325dd5be659cbebce2045a733f \r\n2010.0/x86_64/php-mssql-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 70290ce2ac7c25684cc25f358157dc0d \r\n2010.0/x86_64/php-mysql-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n fd33226baf178ccd75cc2b32a79689ab \r\n2010.0/x86_64/php-mysqli-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n e00bce0e939e8ee99043023792d0e452 \r\n2010.0/x86_64/php-odbc-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 3ff822354916af56c075abd335460b01 \r\n2010.0/x86_64/php-openssl-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 39510dd51732589bfd9cbf3c80065dce \r\n2010.0/x86_64/php-pcntl-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n de48cec3181b9d70301b7e1a1f1a8308 \r\n2010.0/x86_64/php-pdo-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n ef3890b7b80eff17b66171c9964b3d19 \r\n2010.0/x86_64/php-pdo_dblib-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n c8ac5311a20788a5e6d0c5ee38a2040e \r\n2010.0/x86_64/php-pdo_mysql-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n aca3a49315a43ab647778adf66909e1c \r\n2010.0/x86_64/php-pdo_odbc-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 071c9619e6aafea3ee3f6935b66cdeed \r\n2010.0/x86_64/php-pdo_pgsql-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 66309eb2013bf321f8e82e2fc9051241 \r\n2010.0/x86_64/php-pdo_sqlite-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 4d20488f0c504a3830914d14f0e06849 \r\n2010.0/x86_64/php-pgsql-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n fbce660c5061f3779446093d7f225e16 \r\n2010.0/x86_64/php-posix-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 201c16ab5f06c6b6da819fcbe1b3f00a \r\n2010.0/x86_64/php-pspell-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 5c3e20a86a94bfac6a4b84603222b873 \r\n2010.0/x86_64/php-readline-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 6358ed2fa76be118d62f06c83f1bab13 \r\n2010.0/x86_64/php-recode-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n fa9e608fadbb9e87f0a9cb50236cbb49 \r\n2010.0/x86_64/php-session-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n ae21007e3444d5c96792b053aa5f8cfd \r\n2010.0/x86_64/php-shmop-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n c95ee9dfbec44e27501ef7e93357e2f9 \r\n2010.0/x86_64/php-snmp-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n ec73a1d78e2d6449597d39546e0e4527 \r\n2010.0/x86_64/php-soap-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n fae49efa815bbc096529281a6d50c7a5 \r\n2010.0/x86_64/php-sockets-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 510499707eee194aa5f94efb79e46c23 \r\n2010.0/x86_64/php-sqlite3-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n db06a8f32a06ec5217dcabcafd95f083 \r\n2010.0/x86_64/php-sybase_ct-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 9e36a84ee9e0a889ad9aadb6ea7c8464 \r\n2010.0/x86_64/php-sysvmsg-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n fc929da3c4beb710207d03dd060f6802 \r\n2010.0/x86_64/php-sysvsem-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n a5fc007b7fcbd998b2bb7009ab083e09 \r\n2010.0/x86_64/php-sysvshm-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n c2c7d0bd7059a0398e1fa0f79e647bd9 \r\n2010.0/x86_64/php-tidy-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 792f4e62f73e5a884dad54d8c0f7f7c7 \r\n2010.0/x86_64/php-tokenizer-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n e4f261cf3625206248dc227da149c511 \r\n2010.0/x86_64/php-wddx-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 872be8e5d46deed8c6d234262d38df87 \r\n2010.0/x86_64/php-xml-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n d5b7cafcd14cad7b4b38d063a2cf07da \r\n2010.0/x86_64/php-xmlreader-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 2cc0fc18d11319351f218df7b9251636 \r\n2010.0/x86_64/php-xmlrpc-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 12b7f249be2d0bf17cd8dacde1af8dbf \r\n2010.0/x86_64/php-xmlwriter-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 456553da89da00a604920bf8d2f06aa6 \r\n2010.0/x86_64/php-xsl-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 5fa973b7b867eea1d0f0ca1c75591b0f \r\n2010.0/x86_64/php-zip-5.3.3-0.2mdv2010.0.x86_64.rpm\r\n 861d46d4156c203f74cf6447dbcd9503 \r\n2010.0/x86_64/php-zlib-5.3.3-0.2mdv2010.0.x86_64.rpm \r\n 9960b5f2785dbfe6c4ba0856fb6c887f 2010.0/SRPMS/php-5.3.3-0.2mdv2010.0.src.rpm\r\n\r\n Mandriva Linux 2010.1:\r\n 58e5cda6109fe966f5eae70bfd579075 \r\n2010.1/i586/libphp5_common5-5.3.3-0.2mdv2010.1.i586.rpm\r\n ab899f773b1089a517f62c120ad79f6e \r\n2010.1/i586/php-bcmath-5.3.3-0.2mdv2010.1.i586.rpm\r\n f0c38a79821f05311d4a8652d9e4a3ea 2010.1/i586/php-bz2-5.3.3-0.2mdv2010.1.i586.rpm\r\n 3ccab201f3b981855b3959a0057da08a \r\n2010.1/i586/php-calendar-5.3.3-0.2mdv2010.1.i586.rpm\r\n 1af796209fc1a024700b286164fd3793 2010.1/i586/php-cgi-5.3.3-0.2mdv2010.1.i586.rpm\r\n 518874cf9e7707e109d3a7662e0b474f 2010.1/i586/php-cli-5.3.3-0.2mdv2010.1.i586.rpm\r\n 75b9fd155b6ce25e8ccdd803d4f6dcb9 \r\n2010.1/i586/php-ctype-5.3.3-0.2mdv2010.1.i586.rpm\r\n b99939fec9ebdddd91aaab136b6d0439 \r\n2010.1/i586/php-curl-5.3.3-0.2mdv2010.1.i586.rpm\r\n 229c577b532a638ff4f4bd60915b0f41 2010.1/i586/php-dba-5.3.3-0.2mdv2010.1.i586.rpm\r\n fe9697d9dd705416b97a187ed7fd384f \r\n2010.1/i586/php-devel-5.3.3-0.2mdv2010.1.i586.rpm\r\n f30a76f14b5a29dfb98d913b882d9cb5 2010.1/i586/php-doc-5.3.3-0.2mdv2010.1.i586.rpm\r\n 24622cd7ca3f724b8ef5e7dffe013c10 2010.1/i586/php-dom-5.3.3-0.2mdv2010.1.i586.rpm\r\n 849ac2336b70981f54baea05499f3f21 \r\n2010.1/i586/php-enchant-5.3.3-0.2mdv2010.1.i586.rpm\r\n 5f55a594bd3270a999a6a4ff7e7692a7 \r\n2010.1/i586/php-exif-5.3.3-0.2mdv2010.1.i586.rpm\r\n 0f5f43b5b706748ceb1d2d7a92bb82ed \r\n2010.1/i586/php-fileinfo-5.3.3-0.2mdv2010.1.i586.rpm\r\n 97a7873b173bf791ff079cb2f1a48fac \r\n2010.1/i586/php-filter-5.3.3-0.2mdv2010.1.i586.rpm\r\n f3a24e04964ff27ad14b80c62e8ddc96 2010.1/i586/php-fpm-5.3.3-0.2mdv2010.1.i586.rpm\r\n d92fe7a96675a4b171a9740df020c7ea 2010.1/i586/php-ftp-5.3.3-0.2mdv2010.1.i586.rpm\r\n e2ab90334bc1c9b5b617e30cc31df4dc 2010.1/i586/php-gd-5.3.3-0.2mdv2010.1.i586.rpm\r\n 565ac9f8b48ca998cdc8aaea7d8b0642 \r\n2010.1/i586/php-gettext-5.3.3-0.2mdv2010.1.i586.rpm\r\n cb24e42279ebfff2dc7a21099adc81fc 2010.1/i586/php-gmp-5.3.3-0.2mdv2010.1.i586.rpm\r\n 67ef775a5bc0043adcf41e5dfb5d769b \r\n2010.1/i586/php-hash-5.3.3-0.2mdv2010.1.i586.rpm\r\n dbe25051e5941e5dcdcf710942d21312 \r\n2010.1/i586/php-iconv-5.3.3-0.2mdv2010.1.i586.rpm\r\n e97bb54ba1b51b26a35d9cd64ecc3211 \r\n2010.1/i586/php-imap-5.3.3-0.2mdv2010.1.i586.rpm\r\n 329e78a93e41f61f53df7422da02c568 \r\n2010.1/i586/php-intl-5.3.3-0.2mdv2010.1.i586.rpm\r\n 734a46d655b1bdbe3d0e7146dbe3c032 \r\n2010.1/i586/php-json-5.3.3-0.2mdv2010.1.i586.rpm\r\n 4cb491ce7579c0b9d32a0acbaa91854b \r\n2010.1/i586/php-ldap-5.3.3-0.2mdv2010.1.i586.rpm\r\n 21938cd692408f9ae5b51daa3a8f5272 \r\n2010.1/i586/php-mbstring-5.3.3-0.2mdv2010.1.i586.rpm\r\n 490d4c3ff81a3e8b5a3c810af09c17f9 \r\n2010.1/i586/php-mcrypt-5.3.3-0.2mdv2010.1.i586.rpm\r\n ca28c9190e343f90ed1d7de3e3e28264 \r\n2010.1/i586/php-mssql-5.3.3-0.2mdv2010.1.i586.rpm\r\n a537c7e8810f02301bea6e836136ef8a \r\n2010.1/i586/php-mysql-5.3.3-0.2mdv2010.1.i586.rpm\r\n 4aa2883d94402bc61677059429fcc4e9 \r\n2010.1/i586/php-mysqli-5.3.3-0.2mdv2010.1.i586.rpm\r\n 4b523ac05aca02988d17d0fd6b655e13 \r\n2010.1/i586/php-odbc-5.3.3-0.2mdv2010.1.i586.rpm\r\n ebf9cbfa9652715d014de077a40a5256 \r\n2010.1/i586/php-openssl-5.3.3-0.2mdv2010.1.i586.rpm\r\n e1891660ca54235cd408631be29b2791 \r\n2010.1/i586/php-pcntl-5.3.3-0.2mdv2010.1.i586.rpm\r\n 23ef78cfe0374a2abe75d718771cf05a 2010.1/i586/php-pdo-5.3.3-0.2mdv2010.1.i586.rpm\r\n 41914207e5cd31325517a1f16206a3ea \r\n2010.1/i586/php-pdo_dblib-5.3.3-0.2mdv2010.1.i586.rpm\r\n e4cf3221199bdd44c9d255d4a5de73e5 \r\n2010.1/i586/php-pdo_mysql-5.3.3-0.2mdv2010.1.i586.rpm\r\n 3800e04ac8e05435f1d972a63e9a5511 \r\n2010.1/i586/php-pdo_odbc-5.3.3-0.2mdv2010.1.i586.rpm\r\n b664a61f1eb66bfda805cad5f6b1a5eb \r\n2010.1/i586/php-pdo_pgsql-5.3.3-0.2mdv2010.1.i586.rpm\r\n a4ffa09ef2c935d3885b8ee3d3f5e3c0 \r\n2010.1/i586/php-pdo_sqlite-5.3.3-0.2mdv2010.1.i586.rpm\r\n 668739bbfed6a7562e88308031fcaf8d \r\n2010.1/i586/php-pgsql-5.3.3-0.2mdv2010.1.i586.rpm\r\n 19270e8254f5a4a0e2cd23b8e97e274e \r\n2010.1/i586/php-posix-5.3.3-0.2mdv2010.1.i586.rpm\r\n 09746a074a2db526a7cca82988d432d9 \r\n2010.1/i586/php-pspell-5.3.3-0.2mdv2010.1.i586.rpm\r\n 9fbef51fced54035df63e827b01ae791 \r\n2010.1/i586/php-readline-5.3.3-0.2mdv2010.1.i586.rpm\r\n 540a9ab8b3e023901b07c6cbdda3d639 \r\n2010.1/i586/php-recode-5.3.3-0.2mdv2010.1.i586.rpm\r\n 2b8fb24cd0b991e7af5287417f418830 \r\n2010.1/i586/php-session-5.3.3-0.2mdv2010.1.i586.rpm\r\n 2e61c4d90ba08279d1f9acebdb86360a \r\n2010.1/i586/php-shmop-5.3.3-0.2mdv2010.1.i586.rpm\r\n 4d2e2b29f2576ae0d453e111a7865674 \r\n2010.1/i586/php-snmp-5.3.3-0.2mdv2010.1.i586.rpm\r\n 878a84196410d60dbc56857761ce3543 \r\n2010.1/i586/php-soap-5.3.3-0.2mdv2010.1.i586.rpm\r\n 64f82523865439ad7a72ff6d0e3f3912 \r\n2010.1/i586/php-sockets-5.3.3-0.2mdv2010.1.i586.rpm\r\n 068059ff775f5fb90a5344362b79b062 \r\n2010.1/i586/php-sqlite3-5.3.3-0.2mdv2010.1.i586.rpm\r\n 5634041519f9859eaa1e82278f52d0f7 \r\n2010.1/i586/php-sybase_ct-5.3.3-0.2mdv2010.1.i586.rpm\r\n 95f6ecd80fa062bfffa245b2b8dafd21 \r\n2010.1/i586/php-sysvmsg-5.3.3-0.2mdv2010.1.i586.rpm\r\n 587a77ea23596fa94dc12da77b4c6c3e \r\n2010.1/i586/php-sysvsem-5.3.3-0.2mdv2010.1.i586.rpm\r\n fb8ccb10bc06a3bccf23a46a11e51120 \r\n2010.1/i586/php-sysvshm-5.3.3-0.2mdv2010.1.i586.rpm\r\n e96f1e7ec19f4902e9a709475d4388fb \r\n2010.1/i586/php-tidy-5.3.3-0.2mdv2010.1.i586.rpm\r\n c1406e6ac28ffc044ee11c08b8f4539c \r\n2010.1/i586/php-tokenizer-5.3.3-0.2mdv2010.1.i586.rpm\r\n 3efeafa3352a7ace6ab14171f00ea63b \r\n2010.1/i586/php-wddx-5.3.3-0.2mdv2010.1.i586.rpm\r\n 98bcca8699e8acef2b9ec818812f032e 2010.1/i586/php-xml-5.3.3-0.2mdv2010.1.i586.rpm\r\n c98756ea3149c7cfefb08ce9a2ce2ba2 \r\n2010.1/i586/php-xmlreader-5.3.3-0.2mdv2010.1.i586.rpm\r\n c1dbbc92db372fc25c573095db7e7d19 \r\n2010.1/i586/php-xmlrpc-5.3.3-0.2mdv2010.1.i586.rpm\r\n bfc34e485aa06c3687b9f336992b64fc \r\n2010.1/i586/php-xmlwriter-5.3.3-0.2mdv2010.1.i586.rpm\r\n 3aa6bace49d8d1a2f62abf520efcb757 2010.1/i586/php-xsl-5.3.3-0.2mdv2010.1.i586.rpm\r\n 00a8a6790cfee6eb866569ca2cce558b 2010.1/i586/php-zip-5.3.3-0.2mdv2010.1.i586.rpm\r\n 51e8cd498c714b332a240513ad97b627 \r\n2010.1/i586/php-zlib-5.3.3-0.2mdv2010.1.i586.rpm \r\n f319ac382c2cdc3dc1107cd971cb3224 2010.1/SRPMS/php-5.3.3-0.2mdv2010.1.src.rpm\r\n\r\n Mandriva Linux 2010.1/X86_64:\r\n a21c567f3b5482b7773b1fdaf77f2620 \r\n2010.1/x86_64/lib64php5_common5-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 46b2016de75214cd94c9f464f0b2cbdd \r\n2010.1/x86_64/php-bcmath-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 3f2e6d8ae4491261aa854757c5f42287 \r\n2010.1/x86_64/php-bz2-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 3a80c11aef86604e41f316d3623ef22d \r\n2010.1/x86_64/php-calendar-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 89deede72d13008db758dedf3a7df202 \r\n2010.1/x86_64/php-cgi-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n df610b07dba9a06859fe331e113a5b8f \r\n2010.1/x86_64/php-cli-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 34c196572b1cf9974babf1291ff9da04 \r\n2010.1/x86_64/php-ctype-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n a4f722bbe98d94e9f909de5760efbfda \r\n2010.1/x86_64/php-curl-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 52f709776c6074b7492cd911e8e6f3eb \r\n2010.1/x86_64/php-dba-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 18e13a0070d7c70541041dc73e1c32af \r\n2010.1/x86_64/php-devel-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n f46d05a2dd1119fe16d7cb29c1985d15 \r\n2010.1/x86_64/php-doc-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 019a37df55552d479535a897a541d92a \r\n2010.1/x86_64/php-dom-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 4cc66e298203758931e6fa4b1e5e7fe0 \r\n2010.1/x86_64/php-enchant-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n ffd6fc789657c5d380616082a4faeb6c \r\n2010.1/x86_64/php-exif-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n a4a3d93e596f738f3a45725220e57e35 \r\n2010.1/x86_64/php-fileinfo-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 706cffc945c1f7409f35f9523bd0eda4 \r\n2010.1/x86_64/php-filter-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 7b5a51f007850d9185bfd358baaf5987 \r\n2010.1/x86_64/php-fpm-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 322953f89f64978ba6b3311c3c84a4c0 \r\n2010.1/x86_64/php-ftp-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 2dade220aa6171406a9256af0be5e3e5 \r\n2010.1/x86_64/php-gd-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 532ab071f6ac08bca30088d0bd0877f0 \r\n2010.1/x86_64/php-gettext-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 8b53cefbcd4d3c5c76c61074a610cf96 \r\n2010.1/x86_64/php-gmp-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 875d35c9aeebbe11f36fe4d7b94996b8 \r\n2010.1/x86_64/php-hash-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n dccf2dfe6c88cc9e8d9b407d3cd6067a \r\n2010.1/x86_64/php-iconv-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 3b68fce41332aed165c924ba1a67570f \r\n2010.1/x86_64/php-imap-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 044051b03ad268bf4a6888f6ad699a03 \r\n2010.1/x86_64/php-intl-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 2ee7fab81c57f2d1a299cf0cc2c042b5 \r\n2010.1/x86_64/php-json-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n f69d2c0e61090cb275fcc28e5869d5ab \r\n2010.1/x86_64/php-ldap-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 1b59c3e520f102a7ea93f03ea4564aa3 \r\n2010.1/x86_64/php-mbstring-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 5e510fdc9d0e2c550fdf62ae76ed1f0e \r\n2010.1/x86_64/php-mcrypt-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n b28f6ff4d046817838d0e4d47528614d \r\n2010.1/x86_64/php-mssql-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 5ef9d6c2d4f41ed0dd3b217e1f5ade4d \r\n2010.1/x86_64/php-mysql-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n bc2485c0b5452d2bb02bbac4b85eb0bf \r\n2010.1/x86_64/php-mysqli-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 707945ae7235a9bf673c52b48ea6d3c5 \r\n2010.1/x86_64/php-odbc-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 419d95579873ac60413d4d4463381845 \r\n2010.1/x86_64/php-openssl-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n a399f979c8e8af2f2d432f52988b1c63 \r\n2010.1/x86_64/php-pcntl-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 75052d70f35122de3384b8ed581ac31a \r\n2010.1/x86_64/php-pdo-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 344b02836288c8c7f7c3232dfc0813a8 \r\n2010.1/x86_64/php-pdo_dblib-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 07796657f04f4260977396cdb8f0958b \r\n2010.1/x86_64/php-pdo_mysql-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 2791ede5b47e4745a7d22ee30d65e5c2 \r\n2010.1/x86_64/php-pdo_odbc-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n d24e5409e2f0f31a73f33c709a0bdceb \r\n2010.1/x86_64/php-pdo_pgsql-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n bffe1c04cc28bcec233700e1fde9a382 \r\n2010.1/x86_64/php-pdo_sqlite-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n db11b901fc620604460b235f51a2094d \r\n2010.1/x86_64/php-pgsql-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 5d6241bba31f4f678d3e064ca962ba8a \r\n2010.1/x86_64/php-posix-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 8c78db8aa20d5d9c112c04be0f345155 \r\n2010.1/x86_64/php-pspell-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 04794a7ee13e1a105aa0e5cc3fae390d \r\n2010.1/x86_64/php-readline-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n dfebc5827321d26d07f25f05c11f9063 \r\n2010.1/x86_64/php-recode-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 70aef2468a91f6b3ea29d046cc78ce8a \r\n2010.1/x86_64/php-session-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 223dc7ca5be85f1f315b6eeb47d657b4 \r\n2010.1/x86_64/php-shmop-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n a6a9c31fd0e006cd601f495c0ae12183 \r\n2010.1/x86_64/php-snmp-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n fa281621f13b8861f448d3b3683ef0db \r\n2010.1/x86_64/php-soap-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n cb91e87f0a20e50ff0016a822cec2e05 \r\n2010.1/x86_64/php-sockets-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n e2636f36c070a5bdb940faac54927e06 \r\n2010.1/x86_64/php-sqlite3-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 7f7b589cc91550f0140b3ad608bf39d6 \r\n2010.1/x86_64/php-sybase_ct-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n c3aa457c55389e9bda2d3c4612a89b4a \r\n2010.1/x86_64/php-sysvmsg-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 0c7cd7f13d4e5c40f9691c5805e466be \r\n2010.1/x86_64/php-sysvsem-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 66ffb7e519cd227655b9b1c943262d45 \r\n2010.1/x86_64/php-sysvshm-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 8cd93930799c74123a21b7f43637058b \r\n2010.1/x86_64/php-tidy-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n e37b4be0af4ee851afab68b9087c51e4 \r\n2010.1/x86_64/php-tokenizer-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n ee30014192f5aa7da01072f4197a491f \r\n2010.1/x86_64/php-wddx-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 1d71b8f9259003a377d34cc3c62acabb \r\n2010.1/x86_64/php-xml-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 68cb7c6ed15afd79cfa38684c94a9c67 \r\n2010.1/x86_64/php-xmlreader-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 93f3490576db105b65668ddf6521cf71 \r\n2010.1/x86_64/php-xmlrpc-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 04119f5e1a5df10f543b31ebd9044208 \r\n2010.1/x86_64/php-xmlwriter-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 77d01ab9eb52020144584a42bc12dc39 \r\n2010.1/x86_64/php-xsl-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 70d9cd326db0ca7ca5bd4baf5bc9b010 \r\n2010.1/x86_64/php-zip-5.3.3-0.2mdv2010.1.x86_64.rpm\r\n 2c13f5bd1ab1e44487a22676200f5bea \r\n2010.1/x86_64/php-zlib-5.3.3-0.2mdv2010.1.x86_64.rpm \r\n f319ac382c2cdc3dc1107cd971cb3224 2010.1/SRPMS/php-5.3.3-0.2mdv2010.1.src.rpm\r\n\r\n Corporate 4.0:\r\n d0eb833710e7573c591f94eda3cfceb4 \r\ncorporate/4.0/i586/libphp5_common5-5.2.14-0.2.20060mlcs4.i586.rpm\r\n c4412ba5113754bccbe1af92a624a033 \r\ncorporate/4.0/i586/php-bcmath-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 4e081752e86e781b0eb909b6a9c4320f \r\ncorporate/4.0/i586/php-bz2-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 04c80f30c47fe99c79ac093cade6128a \r\ncorporate/4.0/i586/php-calendar-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 86158623a3f48ea167b2638cbdb29d49 \r\ncorporate/4.0/i586/php-cgi-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 2a96c092d83c5e73df38918fc1d90443 \r\ncorporate/4.0/i586/php-cli-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 98f3578ef010448db8b53067edce081f \r\ncorporate/4.0/i586/php-ctype-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 5f7fa1d0740ddad6345d984bd4f93d76 \r\ncorporate/4.0/i586/php-curl-5.2.14-0.2.20060mlcs4.i586.rpm\r\n d901eca1b4465bf8ba3a84e9374e5716 \r\ncorporate/4.0/i586/php-dba-5.2.14-0.2.20060mlcs4.i586.rpm\r\n c0163271e3c5aa3b270d7b2a4e1b0273 \r\ncorporate/4.0/i586/php-dbase-5.2.14-0.2.20060mlcs4.i586.rpm\r\n a739d71477411dd7a2e58826419219b5 \r\ncorporate/4.0/i586/php-devel-5.2.14-0.2.20060mlcs4.i586.rpm\r\n cc569463a68457eb2638980b696efde2 \r\ncorporate/4.0/i586/php-dom-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 78dc91999539a7bcc8de9e9581201e4a \r\ncorporate/4.0/i586/php-exif-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 04cec355eaec972af3f03536375c7ecb \r\ncorporate/4.0/i586/php-fcgi-5.2.14-0.2.20060mlcs4.i586.rpm\r\n b10614d3cb11ece3cbc3fd69eb7d1d4b \r\ncorporate/4.0/i586/php-filter-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 1a7208a2b0a0c9a7336ac76fe5e5e869 \r\ncorporate/4.0/i586/php-ftp-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 86f155aeecf0d71daf1110a3fe1ae8fd \r\ncorporate/4.0/i586/php-gd-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 2a98a1dddaf69ffdc06658ada2888c99 \r\ncorporate/4.0/i586/php-gettext-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 0dd29d45cb0a954543d9158c1742e267 \r\ncorporate/4.0/i586/php-gmp-5.2.14-0.2.20060mlcs4.i586.rpm\r\n c3c46f5a87dd7105406c90d10d7e5f0e \r\ncorporate/4.0/i586/php-hash-5.2.14-0.2.20060mlcs4.i586.rpm\r\n c27a2291beca7ce65990d13d87f14f95 \r\ncorporate/4.0/i586/php-iconv-5.2.14-0.2.20060mlcs4.i586.rpm\r\n e7f89adc164d6ee3608b1aa8241824d5 \r\ncorporate/4.0/i586/php-imap-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 6ea4af240480a1aa83837e0bf90b3898 \r\ncorporate/4.0/i586/php-json-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 6d097461636d99e5a3d34854681f974a \r\ncorporate/4.0/i586/php-ldap-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 89407a9223c3c82d71dc5ae0ce64c81b \r\ncorporate/4.0/i586/php-mbstring-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 80cebb29d23102dbae256fb0a84e3eee \r\ncorporate/4.0/i586/php-mcrypt-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 8a143c18a5c4fd337ee9d3c963af9b86 \r\ncorporate/4.0/i586/php-mhash-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 68c1538fe4baca2bd84f9c42de4aa386 \r\ncorporate/4.0/i586/php-mime_magic-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 9490e96f7099859f0404b7cee65fdf35 \r\ncorporate/4.0/i586/php-ming-5.2.14-0.2.20060mlcs4.i586.rpm\r\n d5c7a9d5838c8303ce44b434aadafce5 \r\ncorporate/4.0/i586/php-mssql-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 4de6cfe618277c3bcaf07da0d9762049 \r\ncorporate/4.0/i586/php-mysql-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 475298c5d77c2f67e1b6f329136c06ce \r\ncorporate/4.0/i586/php-mysqli-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 7450b8722bf44b01501b5a672fd9f8ae \r\ncorporate/4.0/i586/php-ncurses-5.2.14-0.2.20060mlcs4.i586.rpm\r\n d875b5e251cae3f807cf9cbbaab4319b \r\ncorporate/4.0/i586/php-odbc-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 01c722e3719035d88761faf7ff2dd976 \r\ncorporate/4.0/i586/php-openssl-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 4efd9bdb77926369f29a4c9127c6dd8b \r\ncorporate/4.0/i586/php-pcntl-5.2.14-0.2.20060mlcs4.i586.rpm\r\n f05a3c99e2a8ad191fb6f055c1d3cf7a \r\ncorporate/4.0/i586/php-pdo-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 8d62e709352b0c66820cccd26aead24f \r\ncorporate/4.0/i586/php-pdo_dblib-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 795590d689b844bc4e1cb5b292a7fec5 \r\ncorporate/4.0/i586/php-pdo_mysql-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 0707041085548ef2ac32fb57b8ffed0a \r\ncorporate/4.0/i586/php-pdo_odbc-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 1670da8cab14916240c070b01ca81791 \r\ncorporate/4.0/i586/php-pdo_pgsql-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 1ff96bbf7777470c9c31a65bcad29edb \r\ncorporate/4.0/i586/php-pdo_sqlite-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 1378313b271b22c694123cc783c4d991 \r\ncorporate/4.0/i586/php-pgsql-5.2.14-0.2.20060mlcs4.i586.rpm\r\n ab178ae28d9419c6e8119a9c448754ec \r\ncorporate/4.0/i586/php-posix-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 86babcc82af4cae2d08439c5e40d106d \r\ncorporate/4.0/i586/php-pspell-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 6a682789703bc3044c75fd451846db1d \r\ncorporate/4.0/i586/php-readline-5.2.14-0.2.20060mlcs4.i586.rpm\r\n ac68c097c6bc145884de084bf3e13272 \r\ncorporate/4.0/i586/php-recode-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 359114b95520b39869c3f4ea57e90b49 \r\ncorporate/4.0/i586/php-session-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 510556fc6c8a01cdb0e43466906545a8 \r\ncorporate/4.0/i586/php-shmop-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 0ac3d0458c01383b5a37667f1482b701 \r\ncorporate/4.0/i586/php-snmp-5.2.14-0.2.20060mlcs4.i586.rpm\r\n b968e5516050c16cdac29f29614e903f \r\ncorporate/4.0/i586/php-soap-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 63b69af358fe2d338e90167087e9f09e \r\ncorporate/4.0/i586/php-sockets-5.2.14-0.2.20060mlcs4.i586.rpm\r\n b7f17be62dad2eb539e43a52ee876756 \r\ncorporate/4.0/i586/php-sqlite-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 62c4813ac760fff5ea8bcccca7b8a0f4 \r\ncorporate/4.0/i586/php-sybase-5.2.14-0.2.20060mlcs4.i586.rpm\r\n a604caaef1ce0e11431ae0bb9cf4cedf \r\ncorporate/4.0/i586/php-sysvmsg-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 3007fb4b2b0f7e3cfd77c010f759b94d \r\ncorporate/4.0/i586/php-sysvsem-5.2.14-0.2.20060mlcs4.i586.rpm\r\n c55ba6d225b01a353e0987c93bd8d4a6 \r\ncorporate/4.0/i586/php-sysvshm-5.2.14-0.2.20060mlcs4.i586.rpm\r\n ffc4899d9635d0e993591d2ea2a260e5 \r\ncorporate/4.0/i586/php-tidy-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 4888c5de644028e481a9989049fb43f8 \r\ncorporate/4.0/i586/php-tokenizer-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 9c803cbeeca1d597ee97ddcc2c2166dd \r\ncorporate/4.0/i586/php-wddx-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 71b567913037f166007bcc81d077927b \r\ncorporate/4.0/i586/php-xml-5.2.14-0.2.20060mlcs4.i586.rpm\r\n ce466d31635b1d870c935b0e190ccc5c \r\ncorporate/4.0/i586/php-xmlreader-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 559389ca8061ecdebe40253cfb7be6b9 \r\ncorporate/4.0/i586/php-xmlrpc-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 185bc095baaccda5bb3dc007eff17e49 \r\ncorporate/4.0/i586/php-xmlwriter-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 35f281f9e29759053f8c1b1264f95240 \r\ncorporate/4.0/i586/php-xsl-5.2.14-0.2.20060mlcs4.i586.rpm\r\n 1da47bda5f1d9672dc8ade38287d6dcd \r\ncorporate/4.0/i586/php-zip-5.2.14-0.2.20060mlcs4.i586.rpm\r\n ac85097d5ba39bd8d670f831e4dfd924 \r\ncorporate/4.0/i586/php-zlib-5.2.14-0.2.20060mlcs4.i586.rpm \r\n 914bff318ce018edcb93f8c5d50680ac \r\ncorporate/4.0/SRPMS/php-5.2.14-0.2.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n 1cbb10acc770a6c050a39248de822acf \r\ncorporate/4.0/x86_64/lib64php5_common5-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 10983e645c67745571608b6417091c54 \r\ncorporate/4.0/x86_64/php-bcmath-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n e6a8972e55f6ccce152be68c9e45114a \r\ncorporate/4.0/x86_64/php-bz2-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 7ffcefa792d9bf6163fa7012f7b0f9ea \r\ncorporate/4.0/x86_64/php-calendar-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 64c4785378b63e49eb8dd237a6b88478 \r\ncorporate/4.0/x86_64/php-cgi-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n bf10819f66f76d86088bbbbe3d2428e5 \r\ncorporate/4.0/x86_64/php-cli-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 5e2e88536d33289f9f06aefddca93e0d \r\ncorporate/4.0/x86_64/php-ctype-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 9f469ac97f5d61e02bf5b129546f97a9 \r\ncorporate/4.0/x86_64/php-curl-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 8dd728a108b586665ae11e05cf310fdf \r\ncorporate/4.0/x86_64/php-dba-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 84ecbdced0f56eb970a8c913fb89dc54 \r\ncorporate/4.0/x86_64/php-dbase-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 1514ad79d904387b795a319d8b46494b \r\ncorporate/4.0/x86_64/php-devel-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n cc433ecbd502894467bdb41f70f9e1a3 \r\ncorporate/4.0/x86_64/php-dom-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 4404cb51f07809bc7dac2804e917d6e8 \r\ncorporate/4.0/x86_64/php-exif-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 92a1b2f0b3702d406d0a610518e46550 \r\ncorporate/4.0/x86_64/php-fcgi-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 3d1ab2ab1f1267d7ebfe913ba5aaa02f \r\ncorporate/4.0/x86_64/php-filter-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 4f573fbaafceea2603234ae6bf1b10f5 \r\ncorporate/4.0/x86_64/php-ftp-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 856645db75b227c70530ffd50ef7a12d \r\ncorporate/4.0/x86_64/php-gd-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 738df5ca0af2c95337e94bd44c5071eb \r\ncorporate/4.0/x86_64/php-gettext-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 69e060124b78c1d8959c9e20c04983ae \r\ncorporate/4.0/x86_64/php-gmp-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 236712d508a15d172b210857506558c7 \r\ncorporate/4.0/x86_64/php-hash-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n d657a152ec77a73ed949923687ad4477 \r\ncorporate/4.0/x86_64/php-iconv-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n db05e808e6e0c20c097bd051dd2661c2 \r\ncorporate/4.0/x86_64/php-imap-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 74cc73be6eac3fc72da040b6209906a0 \r\ncorporate/4.0/x86_64/php-json-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n e8a5085ff6f3cc3f9659e91c9b961047 \r\ncorporate/4.0/x86_64/php-ldap-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n c76f7dff38dadd55ac870aba421e0cad \r\ncorporate/4.0/x86_64/php-mbstring-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 7fc45dd78789b7bfd3330d34a6621947 \r\ncorporate/4.0/x86_64/php-mcrypt-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 54f6ba9d85c74d7d6d2065d6cf0b1e0d \r\ncorporate/4.0/x86_64/php-mhash-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 54a6d914ece53eaceaddb34f81dd0579 \r\ncorporate/4.0/x86_64/php-mime_magic-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n da824d21886fbbae2a081e0ce2778ddf \r\ncorporate/4.0/x86_64/php-ming-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 3b261bf93b40bb0cb5548c40faab0361 \r\ncorporate/4.0/x86_64/php-mssql-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 9fba3b10248f54e52ac3bf9428bb3872 \r\ncorporate/4.0/x86_64/php-mysql-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 3699a56ead105b144dc5d8dafd5babf5 \r\ncorporate/4.0/x86_64/php-mysqli-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 09660fcdbfb38e6218479ab4653405ed \r\ncorporate/4.0/x86_64/php-ncurses-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n dc71f2c331aa0c143d2edb2eed95ac61 \r\ncorporate/4.0/x86_64/php-odbc-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 680a21b19b63ebebc2cc14ecdd301483 \r\ncorporate/4.0/x86_64/php-openssl-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 6c64ea5ff82d854b4d9c7b3f5840c6da \r\ncorporate/4.0/x86_64/php-pcntl-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 0e3a73ea933b525cf629a1c783a0f1cc \r\ncorporate/4.0/x86_64/php-pdo-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n f2df04dfd19f7def570af6941a8639fd \r\ncorporate/4.0/x86_64/php-pdo_dblib-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n c4c0f880dd8eef77fc71be9b6561742b \r\ncorporate/4.0/x86_64/php-pdo_mysql-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n e95ca9015ed2e70c01f6c06e5c1e398a \r\ncorporate/4.0/x86_64/php-pdo_odbc-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 93cf072a98fbfc3c60a1e6c474107a6d \r\ncorporate/4.0/x86_64/php-pdo_pgsql-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 1a88a1dd169986c0ecf7e17716bfbe6b \r\ncorporate/4.0/x86_64/php-pdo_sqlite-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 7f29cd93b77000779ac5ef357d185aa0 \r\ncorporate/4.0/x86_64/php-pgsql-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 9c6d3403ed51d9fc93b65a16b376395e \r\ncorporate/4.0/x86_64/php-posix-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 83f8029365a2d356628e923733773450 \r\ncorporate/4.0/x86_64/php-pspell-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 258a72bd5b5d91e671f6c9b380a8eb03 \r\ncorporate/4.0/x86_64/php-readline-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 8fc72a4ef303b35d30d3ad15f72da782 \r\ncorporate/4.0/x86_64/php-recode-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n b31f43f46d3c2c782897df98f7840265 \r\ncorporate/4.0/x86_64/php-session-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 7369a06fa5a435cecc21bd89f5a61b8a \r\ncorporate/4.0/x86_64/php-shmop-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 31f29520fbdd83df5a5139f1e68f9689 \r\ncorporate/4.0/x86_64/php-snmp-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 4a6682cd28f9d7337d5e0098dc9e3079 \r\ncorporate/4.0/x86_64/php-soap-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 21b0b56cc67b12a7619c9e5e47760946 \r\ncorporate/4.0/x86_64/php-sockets-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n bd1890a356dc347cc3452f4653d01147 \r\ncorporate/4.0/x86_64/php-sqlite-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n a4572ed2aa53f571438072ddba018f8f \r\ncorporate/4.0/x86_64/php-sybase-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n ca8c7599bfa5f092b6361ac2bc7d8b3d \r\ncorporate/4.0/x86_64/php-sysvmsg-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 3186aeabb318979ea87c0c34a67132dd \r\ncorporate/4.0/x86_64/php-sysvsem-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n b102a940f2beec7d1969df5e52455cc0 \r\ncorporate/4.0/x86_64/php-sysvshm-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n b4c58e3cf4eb9f4081b410b09f60746d \r\ncorporate/4.0/x86_64/php-tidy-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 7a77cdbc9d7e33ad57e99db31193e24d \r\ncorporate/4.0/x86_64/php-tokenizer-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n ae214a6f0c31f1ab6998d25d4d3ceac8 \r\ncorporate/4.0/x86_64/php-wddx-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n f04eadbf53c2163f9db30770b100ed63 \r\ncorporate/4.0/x86_64/php-xml-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 1be3d978d05b104c460a5c9674968e12 \r\ncorporate/4.0/x86_64/php-xmlreader-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 21f147b5a73f49dc54132f43c7eb198e \r\ncorporate/4.0/x86_64/php-xmlrpc-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 39433c323db000d672b624ba4509c1bb \r\ncorporate/4.0/x86_64/php-xmlwriter-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n ee2e7fa7e6f72159e8f3e7ecbeed3a3b \r\ncorporate/4.0/x86_64/php-xsl-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n 9e0f6b934f3edd4b6083699334ea5028 \r\ncorporate/4.0/x86_64/php-zip-5.2.14-0.2.20060mlcs4.x86_64.rpm\r\n ab6059b7efb27668a1a6258c01fad69f \r\ncorporate/4.0/x86_64/php-zlib-5.2.14-0.2.20060mlcs4.x86_64.rpm \r\n 914bff318ce018edcb93f8c5d50680ac \r\ncorporate/4.0/SRPMS/php-5.2.14-0.2.20060mlcs4.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n a31bfdd5f5f1b38807cfa2397dc0f480 \r\nmes5/i586/libphp5_common5-5.2.14-0.2mdvmes5.1.i586.rpm\r\n d8e8d19a2b2b702502d4b69005c562b9 \r\nmes5/i586/php-bcmath-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 013e86b732810d8d4048df9d301e2155 mes5/i586/php-bz2-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 013705e69731f3196716e00b6e013203 \r\nmes5/i586/php-calendar-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f5d90e2b743c73ff7ccb2f8a5da72860 mes5/i586/php-cgi-5.2.14-0.2mdvmes5.1.i586.rpm\r\n d76665de0e0152fd1ebef73040818589 mes5/i586/php-cli-5.2.14-0.2mdvmes5.1.i586.rpm\r\n dffb261effc99de40a8bbb694ddf9aec \r\nmes5/i586/php-ctype-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 973f86a743857113d1504224ea6b485c mes5/i586/php-curl-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f063ec9d720fb47601d9e39deac98c76 mes5/i586/php-dba-5.2.14-0.2mdvmes5.1.i586.rpm\r\n fd663b709fe5cb924fd8b4d97649bf5c \r\nmes5/i586/php-dbase-5.2.14-0.2mdvmes5.1.i586.rpm\r\n bb8509c1051399939298943d7e1e83c6 \r\nmes5/i586/php-devel-5.2.14-0.2mdvmes5.1.i586.rpm\r\n d193d6eb12c2a26e10d23d66842373bb mes5/i586/php-dom-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 7f946b7f5ea6f8ebddaa38a5577d7547 mes5/i586/php-exif-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 63407340db276904e731a692937ffa91 mes5/i586/php-fcgi-5.2.14-0.2mdvmes5.1.i586.rpm\r\n ee4496778b5befa1182822db8bbee323 \r\nmes5/i586/php-filter-5.2.14-0.2mdvmes5.1.i586.rpm\r\n ab1a4967120aa2894a5a67b154b7406f mes5/i586/php-ftp-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f78c4d3e5264c67483fd70f5b6d7bac2 mes5/i586/php-gd-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 13356e006ac76f06d789b56873482065 \r\nmes5/i586/php-gettext-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 486511f72c45b30b34bce7189789337b mes5/i586/php-gmp-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f893b5af5050da5afb824255b6f4a93e mes5/i586/php-hash-5.2.14-0.2mdvmes5.1.i586.rpm\r\n ee1fa3b82002c83dfebdb9d301883502 \r\nmes5/i586/php-iconv-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 49c99fd4071686127b9c5f4af69ee2ee mes5/i586/php-imap-5.2.14-0.2mdvmes5.1.i586.rpm\r\n ed165b0bd86bf3e5d4165ba64a86fda1 mes5/i586/php-json-5.2.14-0.2mdvmes5.1.i586.rpm\r\n fc1259082a4075c89f5eb3533c21349e mes5/i586/php-ldap-5.2.14-0.2mdvmes5.1.i586.rpm\r\n a5bd64de9d4e7a6fbd3d6cf0444f7f8a \r\nmes5/i586/php-mbstring-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 805c20fe6ad1117b4dcaad2097049a64 \r\nmes5/i586/php-mcrypt-5.2.14-0.2mdvmes5.1.i586.rpm\r\n c072c23d82b3124f11ac2d9eec3f9742 \r\nmes5/i586/php-mhash-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 722741a8abfdbff8fa7f58f7b11ec610 \r\nmes5/i586/php-mime_magic-5.2.14-0.2mdvmes5.1.i586.rpm\r\n ae2194536cc62bbe3acd36ea60d7a3f2 mes5/i586/php-ming-5.2.14-0.2mdvmes5.1.i586.rpm\r\n ab3a6ea7eb69cad16e8275135a0da54f \r\nmes5/i586/php-mssql-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f1db5f8ae5ed226c47d0cf5bcdcbc237 \r\nmes5/i586/php-mysql-5.2.14-0.2mdvmes5.1.i586.rpm\r\n a793cbc241ca328ff08bb7f04e4ab7e5 \r\nmes5/i586/php-mysqli-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 59a2fd822516c971aca0c0149cb1742e \r\nmes5/i586/php-ncurses-5.2.14-0.2mdvmes5.1.i586.rpm\r\n dd49efc4cd68d95fa956d04c13d48fce mes5/i586/php-odbc-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 0d4065da8e75737378d7955d498ab5bc \r\nmes5/i586/php-openssl-5.2.14-0.2mdvmes5.1.i586.rpm\r\n d614e755c03886330be1f9fb90ea4d8b \r\nmes5/i586/php-pcntl-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 2bfd2d8eae38bdc8add7652f025391f0 mes5/i586/php-pdo-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 780545b38b303804ebfbc94cb03b073a \r\nmes5/i586/php-pdo_dblib-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 3906dbc0703ad6cd17d99384f4dc0cc6 \r\nmes5/i586/php-pdo_mysql-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 9b15c7967ac370fdeff9a7af98cb700f \r\nmes5/i586/php-pdo_odbc-5.2.14-0.2mdvmes5.1.i586.rpm\r\n b3733c1e588cad424ad5cff8bc1cb6df \r\nmes5/i586/php-pdo_pgsql-5.2.14-0.2mdvmes5.1.i586.rpm\r\n dde620ae2bc1b7b470e6a2f5c6dd6d73 \r\nmes5/i586/php-pdo_sqlite-5.2.14-0.2mdvmes5.1.i586.rpm\r\n e76ae8a795bebc7f7d8b62ce68b5acfe \r\nmes5/i586/php-pgsql-5.2.14-0.2mdvmes5.1.i586.rpm\r\n e4912f1a7f5018957918463eb2284005 \r\nmes5/i586/php-posix-5.2.14-0.2mdvmes5.1.i586.rpm\r\n fd36b147fe2f8b75b941b2c3f7a23f18 \r\nmes5/i586/php-pspell-5.2.14-0.2mdvmes5.1.i586.rpm\r\n b36b27d202bfa1c950484dbf495d878c \r\nmes5/i586/php-readline-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 4185cae3e82e014b73c46c75ba96345c \r\nmes5/i586/php-recode-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 793d01c76d8814e5c9117e5b386d6a33 \r\nmes5/i586/php-session-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f284b831d498506fea836f35bcd10fd1 \r\nmes5/i586/php-shmop-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 2e93c4292ebab56727dc11a3c3df773e mes5/i586/php-snmp-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 7b07446d783795bb7a8a8f9d2731d39c mes5/i586/php-soap-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 42eb7698dbe7f26ebeb38bf9739c8ebd \r\nmes5/i586/php-sockets-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 7f47f0fbff235e0eabb83e578aedeb86 \r\nmes5/i586/php-sqlite-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 5338d1a64662c8cd20b7570fd4836ea2 \r\nmes5/i586/php-sybase-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 92fc6f212cd551e4b3309f62c30b9920 \r\nmes5/i586/php-sysvmsg-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 7112c893e11070a8425ecc77f0ccc2d3 \r\nmes5/i586/php-sysvsem-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 8fb0eaddc5567e93f3bf05905bc5b4da \r\nmes5/i586/php-sysvshm-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 5a1cb4a0a0d2e6f2906c5280a5fb6591 mes5/i586/php-tidy-5.2.14-0.2mdvmes5.1.i586.rpm\r\n b98b631ad29ba1424133d1c41cb2854c \r\nmes5/i586/php-tokenizer-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 4d69a00b6cbcc0e56422287963d1f21c mes5/i586/php-wddx-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f60215bb3338faeceb28ffa987581444 mes5/i586/php-xml-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 2ea4f1ab68538ac32fe057acd205743b \r\nmes5/i586/php-xmlreader-5.2.14-0.2mdvmes5.1.i586.rpm\r\n c28f791f7f4978a9225b6d298dffe2a4 \r\nmes5/i586/php-xmlrpc-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 956ab8e33d23849548c2fc51d99832fa \r\nmes5/i586/php-xmlwriter-5.2.14-0.2mdvmes5.1.i586.rpm\r\n f0996b371ff535de403732a2ad6b348e mes5/i586/php-xsl-5.2.14-0.2mdvmes5.1.i586.rpm\r\n 84834b521f6d84572c734f946b7a4b8b mes5/i586/php-zip-5.2.14-0.2mdvmes5.1.i586.rpm\r\n dde7750acf1aff6914f2b3f63c71587f \r\nmes5/i586/php-zlib-5.2.14-0.2mdvmes5.1.i586.rpm \r\n bf97270058c2eb5d42fc902b71282e7f mes5/SRPMS/php-5.2.14-0.2mdvmes5.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n aeb12da9acc96124a2421e9cff829011 \r\nmes5/x86_64/lib64php5_common5-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 23ea3b6db0d16f33b75714aef41b3c26 \r\nmes5/x86_64/php-bcmath-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 649a6ce410dc8ac8284a7447c5c3f502 \r\nmes5/x86_64/php-bz2-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n dbb948baff795823bda1b5bf0f96be99 \r\nmes5/x86_64/php-calendar-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 61016285ddb21e65dc2b39faf1b13055 \r\nmes5/x86_64/php-cgi-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 61909269b09a31b31c0a8f50ab39a0b5 \r\nmes5/x86_64/php-cli-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 45c50c2ee5a19305b4624a7c53f8bd9e \r\nmes5/x86_64/php-ctype-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 3a5f8a13cd0494bb9400ace38ed67e5c \r\nmes5/x86_64/php-curl-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n c7b272a0abee00a498d15ee49e6c5e76 \r\nmes5/x86_64/php-dba-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 9ca966c0051fb218cf75c02679b27cb0 \r\nmes5/x86_64/php-dbase-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 56034fb9db9774438ada765800cbcaa1 \r\nmes5/x86_64/php-devel-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n aabe9e0e06e344e16f2a31ce919107cf \r\nmes5/x86_64/php-dom-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 32429efbfe94778cd262864acc967436 \r\nmes5/x86_64/php-exif-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n db2f0997fa01734b173f0427cfa7b33f \r\nmes5/x86_64/php-fcgi-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 12142f85a5afad9276e4c2dd21cfc86f \r\nmes5/x86_64/php-filter-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 5b57be5fc912f4f8f6e0e615cf29e7ee \r\nmes5/x86_64/php-ftp-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n c931e4faebb05782bd18904fecef6ae1 \r\nmes5/x86_64/php-gd-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n aba87839cc5d3a9f4962c92f1470dd98 \r\nmes5/x86_64/php-gettext-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 6a7c25c7cfa40bc5bf99dbf722d2ec7e \r\nmes5/x86_64/php-gmp-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 5c534f62e88ab5e443163690f29659c5 \r\nmes5/x86_64/php-hash-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 7f293953296a1d1621b3cd34153c3dd6 \r\nmes5/x86_64/php-iconv-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n e54a243389f9c8dcc9f3d8a794708684 \r\nmes5/x86_64/php-imap-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n b4154ae094951b290e53b8439a7a05fd \r\nmes5/x86_64/php-json-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n e2f9f3767358d423dcf9658faa0d8000 \r\nmes5/x86_64/php-ldap-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 478fdeaca2ec1010bda82729a76998f9 \r\nmes5/x86_64/php-mbstring-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 69249186ecd9f4d67a39b36fed17c251 \r\nmes5/x86_64/php-mcrypt-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 005b3627e97c0f24b586fa998c0fc94a \r\nmes5/x86_64/php-mhash-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 06bebe9a3a955f5a6db827d5dce5de78 \r\nmes5/x86_64/php-mime_magic-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n e7a1d1d8fa314b3d905480637a2d8002 \r\nmes5/x86_64/php-ming-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n b18fa8fdde3de94f4821b3872015b4d1 \r\nmes5/x86_64/php-mssql-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 47ff9d7f4896c0a7be1ccf2a66422c60 \r\nmes5/x86_64/php-mysql-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n faffe90c02312bd20ce5fa26bea81f5b \r\nmes5/x86_64/php-mysqli-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 84c1a6627cb930742c7225db2c8640cf \r\nmes5/x86_64/php-ncurses-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 37d765a099e27125cf539ac2f63bbd11 \r\nmes5/x86_64/php-odbc-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n c34a2bdc73fd2c5791c8f9f739345cad \r\nmes5/x86_64/php-openssl-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 487189a06f1ca640c1902a73a019583b \r\nmes5/x86_64/php-pcntl-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 70e96c5e947079dd913445232c8c1c3b \r\nmes5/x86_64/php-pdo-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 531c9daaaa4b84c1aff428db92aef744 \r\nmes5/x86_64/php-pdo_dblib-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n b40ad6c8e94e22218d68055716d72c44 \r\nmes5/x86_64/php-pdo_mysql-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 41f91a9410ee115d37d4683e750ec584 \r\nmes5/x86_64/php-pdo_odbc-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 6f01399b61ea2424137e6f20d99ad7b0 \r\nmes5/x86_64/php-pdo_pgsql-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 04578ca20b334dc07d74c3fbb9676605 \r\nmes5/x86_64/php-pdo_sqlite-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 854831579d0b12c58a59a05a50b4bc31 \r\nmes5/x86_64/php-pgsql-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 765ea3c01ca0f8406279a18ecc13e3ee \r\nmes5/x86_64/php-posix-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n dcc9d60b276834829eb3c7e6e1e091d7 \r\nmes5/x86_64/php-pspell-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 5dd262a69981e708d18ece534a20159f \r\nmes5/x86_64/php-readline-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n f4d2c30cd9543ac6d230afeaac1795ee \r\nmes5/x86_64/php-recode-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 7fb1d5887168e32d2f87278888f34889 \r\nmes5/x86_64/php-session-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n b3518f4715c50865bfcd83b1fc27e548 \r\nmes5/x86_64/php-shmop-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 50c83eaaa174ac80414a89fc0109cf51 \r\nmes5/x86_64/php-snmp-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 39b4513fdc74aa85325f7e8b90c49374 \r\nmes5/x86_64/php-soap-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 637c49ed3efd7b6055bcb853459b255e \r\nmes5/x86_64/php-sockets-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 35abf3e4c3ae748ae16048c17354d993 \r\nmes5/x86_64/php-sqlite-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 172d212f887d8bdb8bf791643ff9165f \r\nmes5/x86_64/php-sybase-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n bf93c572446e0e5e57a9d451fad6c41a \r\nmes5/x86_64/php-sysvmsg-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 838554ec9e799b5cf3e2b09a6db40d3d \r\nmes5/x86_64/php-sysvsem-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 4fd41b9a2c3abf8a0432a17c50d22c60 \r\nmes5/x86_64/php-sysvshm-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 1092d2a5a564926ede4746f249c81371 \r\nmes5/x86_64/php-tidy-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 90562518e5ebe1d17fe1207d0f61986f \r\nmes5/x86_64/php-tokenizer-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 923ab61589792339eedf2bdfdf2b2a2f \r\nmes5/x86_64/php-wddx-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 09280b27d58486e7e2d910f9e5f7cccc \r\nmes5/x86_64/php-xml-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 9d9a77a52a3b72c6c09a82242367744f \r\nmes5/x86_64/php-xmlreader-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 5ae0be645e822c591aa57ce6195c62b8 \r\nmes5/x86_64/php-xmlrpc-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n cf26283ecc408332e2d42cf6c17d12cc \r\nmes5/x86_64/php-xmlwriter-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n 72dec38b2aa7b3a042faffdcf1570aba \r\nmes5/x86_64/php-xsl-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n c3971dd4e0aa48105d7a7e57f8e04e62 \r\nmes5/x86_64/php-zip-5.2.14-0.2mdvmes5.1.x86_64.rpm\r\n e79cda0bb1f42b047619ef50c1ebaa80 \r\nmes5/x86_64/php-zlib-5.2.14-0.2mdvmes5.1.x86_64.rpm \r\n bf97270058c2eb5d42fc902b71282e7f mes5/SRPMS/php-5.2.14-0.2mdvmes5.1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFMzThemqjQ0CJFipgRAnshAJ9p6d0a8S3K/+VlGro6/liUcPZykQCfXIYl\r\nAmSt+HXPTJX0yOTxyIe+tCk=\r\n=tO3K\r\n-----END PGP SIGNATURE-----", "cvss3": {}, "published": "2010-11-02T00:00:00", "type": "securityvulns", "title": "[ MDVSA-2010:218 ] php", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3436", "CVE-2010-3709", "CVE-2010-3710"], "modified": "2010-11-02T00:00:00", "id": "SECURITYVULNS:DOC:25044", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25044", "sourceData": "", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:38", "description": "===========================================================\r\nUbuntu Security Notice USN-1042-1 January 11, 2011\r\nphp5 vulnerabilities\r\nCVE-2009-5016, CVE-2010-3436, CVE-2010-3709, CVE-2010-3710,\r\nCVE-2010-3870, CVE-2010-4156, CVE-2010-4409, CVE-2010-4645\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 6.06 LTS\r\nUbuntu 8.04 LTS\r\nUbuntu 9.10\r\nUbuntu 10.04 LTS\r\nUbuntu 10.10\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 6.06 LTS:\r\n libapache2-mod-php5 5.1.2-1ubuntu3.20\r\n php5-cgi 5.1.2-1ubuntu3.20\r\n php5-cli 5.1.2-1ubuntu3.20\r\n\r\nUbuntu 8.04 LTS:\r\n libapache2-mod-php5 5.2.4-2ubuntu5.13\r\n php5-cgi 5.2.4-2ubuntu5.13\r\n php5-cli 5.2.4-2ubuntu5.13\r\n\r\nUbuntu 9.10:\r\n libapache2-mod-php5 5.2.10.dfsg.1-2ubuntu6.6\r\n php5-cgi 5.2.10.dfsg.1-2ubuntu6.6\r\n php5-cli 5.2.10.dfsg.1-2ubuntu6.6\r\n\r\nUbuntu 10.04 LTS:\r\n libapache2-mod-php5 5.3.2-1ubuntu4.6\r\n php5-cgi 5.3.2-1ubuntu4.6\r\n php5-cli 5.3.2-1ubuntu4.6\r\n\r\nUbuntu 10.10:\r\n libapache2-mod-php5 5.3.3-1ubuntu9.2\r\n php5-cgi 5.3.3-1ubuntu9.2\r\n php5-cli 5.3.3-1ubuntu9.2\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nDetails follow:\r\n\r\nIt was discovered that an integer overflow in the XML UTF-8 decoding\r\ncode could allow an attacker to bypass cross-site scripting (XSS)\r\nprotections. This issue only affected Ubuntu 6.06 LTS, Ubuntu 8.04 LTS,\r\nand Ubuntu 9.10. (CVE-2009-5016)\r\n\r\nIt was discovered that the XML UTF-8 decoding code did not properly\r\nhandle non-shortest form UTF-8 encoding and ill-formed subsequences\r\nin UTF-8 data, which could allow an attacker to bypass cross-site\r\nscripting (XSS) protections. (CVE-2010-3870)\r\n\r\nIt was discovered that attackers might be able to bypass open_basedir()\r\nrestrictions by passing a specially crafted filename. (CVE-2010-3436)\r\n\r\nMaksymilian Arciemowicz discovered that a NULL pointer derefence in the\r\nZIP archive handling code could allow an attacker to cause a denial\r\nof service through a specially crafted ZIP archive. This issue only\r\naffected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu\r\n10.10. (CVE-2010-3709)\r\n\r\nIt was discovered that a stack consumption vulnerability in the\r\nfilter_var() PHP function when in FILTER_VALIDATE_EMAIL mode, could\r\nallow a remote attacker to cause a denial of service. This issue\r\nonly affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and\r\nUbuntu 10.10. (CVE-2010-3710)\r\n\r\nIt was discovered that the mb_strcut function in the Libmbfl\r\nlibrary within PHP could allow an attacker to read arbitrary memory\r\nwithin the application process. This issue only affected Ubuntu\r\n10.10. (CVE-2010-4156)\r\n\r\nMaksymilian Arciemowicz discovered that an integer overflow in the\r\nNumberFormatter::getSymbol function could allow an attacker to cause\r\na denial of service. This issue only affected Ubuntu 10.04 LTS and\r\nUbuntu 10.10. (CVE-2010-4409)\r\n\r\nRick Regan discovered that when handing PHP textual representations\r\nof the largest subnormal double-precision floating-point number,\r\nthe zend_strtod function could go into an infinite loop on 32bit\r\nx86 processors, allowing an attacker to cause a denial of service.\r\n(CVE-2010-4645)\r\n\r\n\r\nUpdated packages for Ubuntu 6.06 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.20.diff.gz\r\n Size/MD5: 156750 6df1d4b9735ef95cff0607b842416b52\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.20.dsc\r\n Size/MD5: 2417 d21e7bcbc26a369b84afdfa9649953a2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2.orig.tar.gz\r\n Size/MD5: 8064193 b5b6564e8c6a0d5bc1d2b4787480d792\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.1.2-1ubuntu3.20_all.deb\r\n Size/MD5: 306838 8a061474b0d03b280bd4ad66e0951e4b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.1.2-1ubuntu3.20_all.deb\r\n Size/MD5: 1036 67a5ec2ab802e6a9c1fd35b66c762ac6\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 2438326 6205e0a4f786423e602c09eb23be56f1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 4764272 367b69faa1d9d2b6cadc9511b953626b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 2395226 e11c91162fc2036bee7339836eb9a553\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 140418 433d226f3cccc27740d706099922a80e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 24600 bc8694d0a2678ef21d6ee6abea6680b5\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 316032 2d9e23883469510f6caac1795c9c66f3\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 36828 4472d4ece18fc3eabcdf1b40d3c9d215\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 22122 71d6b55889541f048fbdc5fa62e657e0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 8768 a5e9619a423332627296a017df2c978e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 25214 d14ebe6db092a95d8627aaeea0eeb857\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysqli_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 43896 84033eb9680d41b141fe0210c39e7d2a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 30112 ea65f8215a9e38a8bfe865fdb46a6a62\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 44370 5d56c29b3b694d372c5059b348bc9eb9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 8330 0bc0f2961048bbe8a6f2922da4198370\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 15294 83f1e743ad9caf9dbfe34224f1468701\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 29164 5186beb6e81d1620772f3bf5aa49d13b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 22690 e3beb25b0775bbbe9161bf7c4421d673\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 42362 b5c7666f26cc79cbd937b57d6dbbea9d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.1.2-1ubuntu3.20_amd64.deb\r\n Size/MD5: 16374 9ff514d7bcd76baa2d3a503efdf05081\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 2267012 2ccb06cd58a2d06bb9d255782e03483d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 4481678 d0f646be5441b533437e507176e1966c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 2251090 0570932503f87be605c05f790b31ec2b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 137014 4a54054a6b0620c3b693027861ff34f2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 22836 fe34a1d69d6efdf07f3b358a27b41189\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 315402 06f284d124ac44700915f4119a29a2a2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 32858 7e0703ec220a5586c2a829163d97d1b8\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 19784 23a54b3eef95a2cee27626abc32ba4be\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 8364 34fdb1f5579d5c70d0659f0b195988cb\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 21984 4db62bb53d1921923073d9529182c6dd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysqli_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 37344 5b5ee561731b9dd445e22ffb75137542\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 27030 036fe474948a99473ba9349009fed160\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 39760 207456519b08617331f807e91575e747\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 8042 8d16fe1e6df1fdd4b17b2d6d76eaf029\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 14156 2e8d99978fd0d854e87e6ac6b825465d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 25618 8ab7fd1cd3bae30c369ffc334f81ed26\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 20540 95e156995b3365adab701282aede4be9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 37852 c0b06ab1e0bcacd602c8d29c79a3b904\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.1.2-1ubuntu3.20_i386.deb\r\n Size/MD5: 15120 4b6e4f1e017e6e1bb9916ebc3be4dc8f\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 2401198 2d06c5ffa08caeb2d8c9718f50544976\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 4701998 dfc3daa250dea139dbb4dac4d80ee4e9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 2360384 9a4ac201dc8aa798b2166f3d65e4177a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 137966 eaded17d1477bc75406e07a62f40a4fd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 26614 9b38dd68ee68b8dfed86536fde3b151d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 312672 825c798d8d4108e089966eb1e2a6a16f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 36606 081215692548857abde055dad94c55e4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 22552 80140509accf361dc9238d484a46386e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 10130 2dba82dcecbb081c67c503c6421dd4ab\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 24822 69f3e6511a1f16439d9d0686aa2fe89f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysqli_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 41786 1d40730ad2ed4da551cee84e01dc964a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 30092 5951418c3f9eb982e6c918890de03f06\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 43424 34a02daf5576fa22c15698a4d62d20f4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 9804 088a2fd5a7b604c4357afdfe7641a2b0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 15950 233247ebcfd513c2945a38967865ba5b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 29416 8bbcddb58173430ae73020454bf15836\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 23586 c15fc17c672d170a21e387a346f1d449\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 40954 26401a69a69927373e5f9daeea85b682\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.1.2-1ubuntu3.20_powerpc.deb\r\n Size/MD5: 17246 d4001af094f32f3c32001f62700bf770\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 2327780 90c88edd450d7925984ee50e652c96ec\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 4539816 47539ebeb163e569f98271070eaf80a0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 2280616 d43427d389008f8b0b976c2e3df4a6f6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 137976 78abc54cf0d4c7b7927e0ac808fcc247\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 24552 315c1ed349cdda96360409d109ffd0cf\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 312626 3c12d7adaa527cdd8e3e7106ffb018da\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 33362 f1fd0f99d964284ee14edb6c949ad5f4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 20080 f55a764602e59a7fc1eafdb1d7ad015f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 8370 81e6b9a3b7fea0c36ba8f78c588e64ff\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 22360 23050f4d29e964079eb0fc9fc08f0710\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysqli_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 38658 4b742d4b77da6e7aa6cc964d2fc9f802\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 26834 e959a6b1c9477e88c23f2c5b53825f15\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 40610 634e73b50f57281bb2fe8e780d0c9035\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 8102 8c0ce1bcecc40cb984b194332061d620\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 14054 c7f290c7e9f9de708058dfb0103a0e0d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 25970 9eaab0db3b90087976116fde5e7ee6be\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 20794 46add82a433b9b8f09e35d69bedabf77\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 38124 e37c5de7eda52f8ab997423ce98b8852\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.1.2-1ubuntu3.20_sparc.deb\r\n Size/MD5: 15086 3c16f4c7daba21a9b401ff42b21e37b7\r\n\r\nUpdated packages for Ubuntu 8.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.4-2ubuntu5.13.diff.gz\r\n Size/MD5: 171074 a44e8c0fa732ae9fe40ef2f1e6307941\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.4-2ubuntu5.13.dsc\r\n Size/MD5: 2612 9efc7b0526b8067a1364304629818cbd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.4.orig.tar.gz\r\n Size/MD5: 9705468 0826e231c3148b29fd039d7a8c893ad3\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.2.4-2ubuntu5.13_all.deb\r\n Size/MD5: 355276 6160ef91a87f96ab428bc7fdc2d1eb92\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.4-2ubuntu5.13_all.deb\r\n Size/MD5: 1076 8006ffb358c740e25f71eceb680c5fe8\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 2616100 7beec735eb5ac08c5dbe818ca9c8fba1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 5094540 66dac028b7aa32f8e68a9c34a47e97f2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 2572396 006e777ed02775f25afc06c71018c6d2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 321866 1326ad95614faefe093000d9557e22fc\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 25036 46c208f78ec2cbc0fb912ab8c7aa848b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 364482 611ff75b91254ef374c3555fdc2f8ce6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 37340 5a952976d5c22929ba0ac612954cae7e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 17622 258d6460217d62fce16f086050d8329e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 20266 2452a414801248d829bea1f3bc13b537\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 5544 cebc96b844fe51589b615269fa221c65\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 74404 be190b3bf4e5dc3a924b1e16f955246e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 37708 26572dd45f6095629944d23820aa1e4f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 56164 c0dcba6243459b08efbafe092f307657\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 9544 e33f7cf6e3e73e0991106899a7ff1e5f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 5034 ad2d560443a15df3bbe3e9d3f3f45cf6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 12416 604db098f7cfac7df6ff1fc638870f4c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 39644 aad3d6f567fb8936b8064df1b74dd01c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 28668 df959ee0757efa78bb291753e26a1b25\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 17890 e00eca078a62b63123e439be84e31825\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 38614 fec69650848d20fccc3345fe3d50a35c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.2.4-2ubuntu5.13_amd64.deb\r\n Size/MD5: 13544 9b1d125654d7552bf3de1c4c67f0092f\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 2474744 cd6fcf94a90f7256be37c64896c69f9b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 4917798 f3e2dfc0a615c2db115ba41a386a3385\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 2481476 e5cbf699729ce00b5fa40a27bc9af4cb\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 317982 af1f67fb46fe323f6aaa2354f4488403\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 23638 03fe02f2cda8ba24c3886fd1c002df3e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 364508 1fbce7a79857dadbf4f4106f8a72d6e8\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 32896 6946ec293d522855a6388de9720c9f84\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 14756 c627a7399bf79b236f6385408ca517ed\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 18104 044ab2018b85a394993a3dd551ee76d6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 5206 ec5e9d32c3fa85bd8e6cf5d71614c9ee\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 65230 9138f8688689590cd2b15dbd87815735\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 34262 7e4364d542a044a35426824c93ee089b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 51294 f60bcad4c5c9ccce7f313c0f2c77638a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 8612 92ce8ad07cfee588cadf80086b99ea8e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 4780 e30ff35edb09dc326713b52f72b0780e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 11720 523ec2a184d4b4fe2b02d7af721da871\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 34358 0bdd1e833d93796bc0d457cac37c5b7a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 26244 d9449bfbbcfa675b1544c4e356895922\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 16264 0a81440dc52136c2e39f91aa140c6ea6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 35660 fc8f9510a79eea6029bed3dfd0e05514\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.2.4-2ubuntu5.13_i386.deb\r\n Size/MD5: 12580 0f8427e6247809d909018f602c515d25\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 2453872 1ae8c91383ee6ce1e0a12b61347f1cd3\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 4879916 ae2a5bcde341eb4fe862b094687ab98c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 2462284 b21bc257ae8150be9812d0d1c78012e2\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 317714 8015f6a0afd98e6b90c9645135ca73e7\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 23288 ab2b5787ec116b7628efc9e04c7826e9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 364484 69dbb37941bc5d7044a57bd15669caa8\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 33076 94c05af0d9feb3ab44c86a9555fd7330\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 15026 5213479934cecf31e7bb6c382ec739ca\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 18106 2a7e858b86e3ffab3cf2ec1db723f696\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 5106 d967ee89b93ca865fa81e59af11aa1d8\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 64308 5ee184afe3b114b2372bb26862b4320f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 33938 b981f0cc796e73f746f8bc811b31ffbd\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 50868 81868c02e0b0de38357c3efa49b6f314\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 8646 3679a882f8ba6999896745dc3e238dd6\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 4726 165788a7d2fe0050e4acabe01a5b678b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 11580 9cd9cd4cfb88641ae59e21a439e02ed0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 33748 92c398f5f7e20fc755fb7186d29c8029\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 26132 172927305ef4d6e98d08bf663ed135e4\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 16058 83c38911dc8947118941bf2feddd037d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 35468 2bb59d1df4295d6dc7c9354860a50fef\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.4-2ubuntu5.13_lpia.deb\r\n Size/MD5: 12440 65771d601dc4f508681f8d2f89bf544c\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 2627098 2ea0c7201de4faa9cd6e533b94ed1ef8\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 5117984 fd1d61e174192f89888cc6ae1248ec91\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 2581196 7b41e05ef8600719eb4aa56e0343c897\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 324770 469867b7acbe05282ede997b37d0c129\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 28232 0265ff21a3ebc9db35eeb802d9794a41\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 364536 de7261f01bfc1474e03a0090ad4b9f80\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 38778 ff6b2fbc45f74aa03fdef8fe2cd656a9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 17628 efc321cdde34856bebf7209d8ccb8f26\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 21732 50a20e6bb888fbdb0271460e06ab35c2\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 7666 fda0551a869970e819f45928d886e411\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 78012 4a4c683d806c57e35c95fd71262e9558\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 41296 a8f0a4a5f13960b45cac90d2cf547111\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 59732 db5dcb81d0eb6d0ecf16ec011579649a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 11156 12f72fcd36613f4df042d75f4e578cdf\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 7182 8062ae277b5dfaa0e311d7592a3f79cd\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 14240 2707fa0cc46d8d597e4a99f4506c9d33\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 42400 b848cb3f8841b3eb4bb9f53ac212d64b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 31368 fdeaf2703cb004749b885cc7e2b3f49e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 20070 4f0728b7421ce2139422b3df642707df\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 40500 86fcd4ae3eab0a4eca21a070dd5624be\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.4-2ubuntu5.13_powerpc.deb\r\n Size/MD5: 15700 5290122aa597571547b0b375a2a439c5\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 2495580 0b428f07d47d07890df1e13941f5bda5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 4886918 5de4f5d898efdfb86207b8993d5ca289\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 2464692 9731b34362f6954875112d3152a07917\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 317978 417444c6772985ae77423fcf039bf2cd\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 24278 d2cf0b6dc45a55e1932f6f6b402922f0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 364506 f7d99c4e7386a533a1b6a5661fce2b53\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 33592 32c1709573c19a08e6016521757a4867\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 14148 7224bf620ad663d0cfee733119c73706\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 17700 0b5b9edd0e251422129b9d6752bb829a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 5062 f769b758006b3cb80f73ed305dd25233\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 63412 875895c9881f5dec590b84984bbf855f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 32424 e55f27d7e5cd8728448d8229ac77ec53\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 49702 afb8c3d1b49e3b175455542908e1ae2e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 8482 4d76c31583e95d259ad6e23e8082c275\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 4746 b335c34c9edeb6a031c9309f82b375ef\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 11552 1ed20d609b199474d4eb4b843d45498b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 32808 a1a3ce68a90fb694c7bae9c190ea2a3d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 24966 a3dcb64e83e46342dad573eb8d2ee6bb\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 16344 2b01b04265c64ca9b7cfa82ff04f7eb9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 34840 fc9d2e899480688ff1bcf04d7d7c9419\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.4-2ubuntu5.13_sparc.deb\r\n Size/MD5: 12012 858e5a81894880219cb9f6303563b043\r\n\r\nUpdated packages for Ubuntu 9.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.10.dfsg.1-2ubuntu6.6.diff.gz\r\n Size/MD5: 977757 a7e34cb5e5bc4d4ee749f057ba475aca\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.10.dfsg.1-2ubuntu6.6.dsc\r\n Size/MD5: 3170 034498da31761183638dbef943a49bf6\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.10.dfsg.1.orig.tar.gz\r\n Size/MD5: 11418363 4708aa3cbd1c50411634482e26525344\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.2.10.dfsg.1-2ubuntu6.6_all.deb\r\n Size/MD5: 329230 c8c7bb4ede697317236eb47ac4e60aa7\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.2.10.dfsg.1-2ubuntu6.6_all.deb\r\n Size/MD5: 1120 c530a928a17f918cc74854b4f22e6e14\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 2643724 e851d35af52d9452c2df527219965853\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 5150004 05747c3905d4e14d5be64716c06cb539\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 2597488 a565e8688dd57343cce6d26af96ad415\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 428258 9580e8fc70aa8f40353b0d745754f3f1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 25498 2571658a1409d47b1dd636dc5fef90b9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dbg_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 8311558 6e34cb16c5514aad7d2146ded841d1dd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 366974 6fe061c0dde3b01792c44229f7fb546e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 37546 43cd10e9f19c88e194f62a5c9b01be74\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 16382 9a52d461f0eb9b5e0717b64cd2483c03\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 20650 0eb8f9021a5ad687be29d12a61715528\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 5690 35779e15e53c50bfdd75d4cf6647b8e2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 75058 13315c1c64c955135d00a64f2e5c1788\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 39230 99ef988b0b06c2b032ffc52f3f27d5a9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 58558 20f0b2c059bc6b426da2be45b1fcb3da\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 10088 00051cd04c6f37202386f17859db980e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 5192 d163c60f50efda1b54f94b112ccc0558\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 13150 4eb9c35b9ba814f311cbe90977e268cb\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 39934 44f24ce56db89bde71da12fef9b69c6c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 29214 2c6e35b3c53013657a5cdcdaf79d1bfa\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 18218 f02d8119fb6ae819598e7a61123414c1\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 39358 02f6aff34eb4278fcfb6a3e9cb093a28\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 14062 ea4e2f1dabdafee475f0a073000815bd\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/libapache2-mod-php5filter_5.2.10.dfsg.1-2ubuntu6.6_amd64.deb\r\n Size/MD5: 2642728 bb19e2bd6bbe9af49ef5094594547ac9\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 2504522 f5041c9810724f3135a94901c811f835\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 4980470 9301a22f583801870abade7f01362184\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 2511890 f244e4e37185fd3895a54dbc4d2c30c9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 425202 3784f1886ab61a52613f71d3617bd641\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 24022 4b9c173290df3a720f8c27e87c206c85\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dbg_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 8509326 0627f56020a14208ae7786c495433108\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 366990 3f48c131e3cea35319d2474b9bd06637\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 33136 478e6cee816f3c88e98ad620ba59a661\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 14218 7b69dfcb5601779d77976b8a94ebadca\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 18772 103aa5bbbd1ea27e4882dc3b542ecd32\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mhash_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 5372 78410de977f81df1c9cc04e55fb1f3c0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 66158 571934aa97f62ade292674d09ae13641\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 35810 2ca397b47914c7aabd1077faed6633f8\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 53864 f3334269e3e68e417104a90d329de0e4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 9190 8a61093fdacbf51237a4ccfd7b2251bd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 4960 ee006a16dd4922cd95df5cb64cdf0f5e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 12076 c4f82372c2f1c4cde79577bda01e2f40\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 35126 defb792372d07be5b537ce6095dbdaef\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 26666 495668794d9741f4f17dda8de54b1e0f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 16596 bf46e42e3cf895192f4c4047229851d8\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 36524 0cca90d1eff0d5c52a13235a94675cd2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 12934 54de705a4bb1467659391a4ef756cc9a\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/libapache2-mod-php5filter_5.2.10.dfsg.1-2ubuntu6.6_i386.deb\r\n Size/MD5: 2503054 e2ec6e88b31194bc8deed93d1fc6f66e\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 2458642 4ad093ca046cfebd04ee71aee5629a6f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 4875994 2e02456840d3cce5a5bca5f1ad4312c3\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 2455278 9f18ad6bb540ac4a3bbb92b5a470e15a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 426178 76d66c71f2fee6da4af7dabe7accc125\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 23990 14e41b12fc707c38e7cb92b8257f913d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 8945786 fd8d3ea4113db7cfeade83df3f406856\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 370178 81ba454cec8065e13a77a75d13993a73\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 32510 948d7904055044e02b93c7847aa09aaf\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 13590 94cf30a2fa062d97af9bbc0f63208ef1\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 18390 83236ce7af1fbcfc43bf9be3bbb84221\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 5134 158e42a6c53bb59fc6dfa6bc67cf2b22\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 63046 d632bdfad77b68e3f18f4be29dac8acb\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 35236 56ec1c4525487ab36b04968761a8252a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 51444 74f5d851ca43162a525fc3da3b9c61f4\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 8730 33fa0ad4fdecfb24762ece22503e4635\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 4786 e1415303b34ef9bd7a26059f73a24524\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 11866 10430888728ad3e0639608e2be9cb336\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 33956 5c1a98b4f0ea784fe011671ba34f09d6\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 25784 4062fa7d0c14944a4c6ca0569d3c063d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 16160 4949628a35d40ca0281c1fe9771d7597\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 33730 4ded7223e0c6f9c9f8a3fb6996f953f0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 12480 023bc689e443dbfe8c71dcd03f1cdbd0\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.2.10.dfsg.1-2ubuntu6.6_armel.deb\r\n Size/MD5: 2457220 25d94d47f95325656edb5ea79d88bd89\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 2492844 145b6f4ae03c30283985e3b6bbe68c9b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 4956852 cae53b7e6f2608ed578c4e9001c6d2fe\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 2498630 5e6d346fbddbe5f4498626e42c7c0a84\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 424916 c245248b6d043e0720c6ff30f9f48bd5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 23642 528ffdce10725de1060ca312db300e44\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 8609146 e06648a4584aa69f842f9312e736f44f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 366970 c2cf8f9590ae0a209bab40b24c49b5a9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 32662 301cbdd769e9fa297e8b54faa4758cf7\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 14156 ef129242a061b0801bc06ddcc007a4e3\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 18598 a4375fb8c8afa7c5bcbe80cea4f1d036\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 5258 9612979c96ea1e9fed2029e58e47914e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 64886 36772193878ed771de4f2c9ab62b394c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 35470 dda75dfe7f747743b5ca3dc955375ac0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 53534 2b2840f1e7c4a79e18bd15ef4a7b8db9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 9096 21c8ef299ee1778836f2b6a8908cf066\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 4902 6b68e289a8f10c8b84b1cb91bda3f687\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 11946 3049ac447786cc4f275905a7d95a14ab\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 34618 c7b99cd4a6a87f5551cb44527573cfe3\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 26606 174ba894c26e5c188bc36ee17a590a75\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 16704 74e1633a03ad4a260296fd256dfe8172\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 36258 5a9c14884982edcbf146a56c08341bad\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 12916 7f46d47561ff30e2304be384deee0a39\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.2.10.dfsg.1-2ubuntu6.6_lpia.deb\r\n Size/MD5: 2491786 3ce78eea7b236712e30a6490fa791ebb\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 2636516 f809f9733c6cae803a6be94e9343323f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 5119646 42b7689715097ecd38188f87dd813be1\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 2585306 8d33554ba9deeaa390cf4e6936b0a6d0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 430776 b9cf209be5009beb0c015c6621033b0c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 26354 295306c0c0474b71bdcc9d89364ebdf5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 8977402 a0ca24ddfdd79603393c45dfc2b03430\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 367008 2e5ca489e3e70d66683f0923e12df0bd\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 36678 852f00d8d5a19a7839fa3359c7a3d560\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 14726 00d1ac077fc6bb24a2b9de1682efeabc\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 20010 e3deaf4f69d6012b7f912080e9c0f3db\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 5632 6c949ef684e91cbe66a249c85ac5489f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 70040 c58f47c72a16fef0d647f6864b0a5c2f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 36870 cfb20ad89f6dfaac26645fe261065ac7\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 56878 3332b3c3644598c6c30e4a19693efc10\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 9340 d730f4f951d0f595de73f8f886edb5ab\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 5210 7bc38fd7c5726f97f457f9a065bc4fd1\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 12398 9fdbb86d77efe2ad64794f4f7e3e711d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 37664 cb2d88a8e61374bc9ee18e0c03e17470\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 27490 12117df59410408cac3c110b71b34b76\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 17970 ea62310cb1a7c549ecdb03e7ab181585\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 38496 9142c4d9239e08d12a29b820bcb2ddfe\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 13864 75fdf718df77c23f322d32bd286f895e\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.2.10.dfsg.1-2ubuntu6.6_powerpc.deb\r\n Size/MD5: 2635518 7030bfbeed54c0aa5d9502cfeea9b6e0\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 2494342 98da755c137fd928ac5bfccc881fbd53\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 4886006 a164cadfecd7925de19df4a67e2e933d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 2461698 c91460419cf0825c5a65840e712fbc24\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 427198 b5fdc1065bf16fb9c65516be0c32b8bd\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 24564 5b0dcbd770bc5160a69cc702a143e723\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 8366774 9323a54b04716c0a7cdb9a695d460b5a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 366966 ff174c27b64578ea5615653293da87f8\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 33100 e022d1b425b49cbbfe30290a90d0a24b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 13326 bd5b51aea46c0eeb7937deb5db40499e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 17918 b93167cb7cc2e4675d21a90b8afa3f03\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mhash_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 5182 f5ee707e184c00b23655815256d4069e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 62934 5ed425cb600f15ac7f1e69a124f38885\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 33388 a440de4cbd1f6a3bce411519b751405a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 50244 92ef8ba36e61e59953479cfcd91b590a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 8622 ba8d34a7cdb3a8823be27e51205a4462\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 4838 d3df13b871e6c5cc990c30109763a122\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 11974 27be55358735c941ee2fc9e530227df7\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 32612 b9881eb126999890d51f31e8e5858457\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 24980 55e2a2fcb9f3c185380c6864cea3ecc9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 16582 8d891b209e65305866a1911ac54f3019\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 34986 45bacfaaf8875e6af1690d27004888ae\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 12380 48b34a7a356eb9cf4b641bf23e0159d8\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.2.10.dfsg.1-2ubuntu6.6_sparc.deb\r\n Size/MD5: 2492788 f1cf6f2f4af3a87c9fcf7db39895c102\r\n\r\nUpdated packages for Ubuntu 10.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.2-1ubuntu4.6.diff.gz\r\n Size/MD5: 193556 0980b5fba5c89ce04a027fc41ef08071\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.2-1ubuntu4.6.dsc\r\n Size/MD5: 3171 4f79fffb63072daafda61e5a3c8666cc\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.2.orig.tar.gz\r\n Size/MD5: 13734462 4480d7c6d6b4a86de7b8ec8f0c2d1871\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.3.2-1ubuntu4.6_all.deb\r\n Size/MD5: 354408 e3be4caa035ed64558dc5f81b9cf8802\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.2-1ubuntu4.6_all.deb\r\n Size/MD5: 1114 643199d6abb0abb4a7bd236143e780e3\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 2988030 edd9a638195270b9ce6e753e972ae027\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 5803912 d499e1dcbf7a1486be4039ae12d699c7\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 2906236 9c654a26963c233bb65887f87f480382\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 549472 2c78e946248c5261d9e245705395dcac\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 27054 7c129e7d4d0b5c91baa79b43f7058745\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dbg_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 10386004 b63d957dba91abcc7ae99a69b789182f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 408414 69c2ff2cb5eced51fe08ca1b8511874b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 39002 ff971096112998faf411af1b0f4f98bd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 16478 4df1113b39b44ec95b6be5b26239d549\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 19890 41883562b8dea2b43e83c5336120da09\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 73124 7ba7c7b84668818918cd24993059025d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 35848 d4b0cdc0881f921c78f7639b75746f61\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 56922 f7b428e43d8834a9df619092f91433bf\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 8168 234d7c73789d1f9006b19204f299a74e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 4380 0f5815361f4a409ca519be15967c0c03\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 11364 5f5699afc11bc01ce793f358bf85cfe4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 55750 2c1e08a57d572478c707f002c3500ffa\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 26400 ffca523f6b94415704eb0f39a7158469\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 18272 9b9e0dfc3235e631789e449ca78a173c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 34806 efa24f6eabbfbcddd7eb5155d945cd9c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 13360 861c1f2408faeb690df81105e112c02d\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/libapache2-mod-php5filter_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 2987282 38641f078afb8137225e163d51ce7284\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-enchant_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 8950 09d370a6c544e70f94e0ad80c70a623c\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-intl_5.3.2-1ubuntu4.6_amd64.deb\r\n Size/MD5: 59404 f4940af37e9c06a00f64ace73c409809\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 2833396 0feb5625c5061550cc8ec087cc38c061\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 5623544 e29929fa1525df844875785aaca1400c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 2815356 a8a9413488c7be3840cb02df862a4c57\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 542896 08243ede73f09da89dfc1f0f983e30d7\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 25608 36a579c9b88435ed0ecf1e133134fcf7\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dbg_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 10560588 a72f3bc4b60d30449893c0cc88665c3c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 404922 6cad660c827bfe56261d9305c9644e0b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 34748 0ace6326b104c929a03583f13bff8f8e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 14238 f5431f44b55a54070216655045a0311b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 17558 8419a34d7cfa96501a74ede571f45ae0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 64220 a8ad7576ad049d7e9ece698e8e4bfe32\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 32094 c37faa808fdc85bd3fd48a60902ed096\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 52000 d2015d3db51e4eb3d39a53d896b9546b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 7274 61a001b20ce393e1ac77679d9b444370\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 4154 7eacf907df0d9f2685d33b1534174d5b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 10280 65d70043bf3f665661790a8b1d696e5b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 46664 6042c3b080c7569ec50bd30b392ccc2f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sybase_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 23642 b218bd07dce3df858ab2219b1c3b24a2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 16378 e60510a3e061fcb62161c13f232411f0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 31940 2e4ecd3debaf681fe7185b5ab6717241\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 12340 3d031dd46d48485061b76ec8bdff1e03\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/libapache2-mod-php5filter_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 2832424 cb0cb847468a984cfdfc158a968acc86\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-enchant_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 7768 ffae04ac038a1ee5687c841448a733f8\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-intl_5.3.2-1ubuntu4.6_i386.deb\r\n Size/MD5: 53800 f26ec8df82897459f51318e51ecd288e\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 2716990 dd6fc055cd6c4661f8c1f555ff199876\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 5406408 f5a9a2700959739ec66ae54a5c6a7192\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 2707416 804e5718e9b35a16e19f8eb000013d35\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 549374 16205c6fb91a2695ffb31ce5b48756a0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 24478 b701fe4fefa853c9a4c68c3a57e4361a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 11211118 a0c00ae54e00624d482a1997f28b9a89\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 408300 1b99bdf666f6b97d0e17758fc80a32be\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 33034 2c9133f9759b964458ed1d8bb976b7d7\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 13572 03921c24cface080678714a3870e8063\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 16804 7dc386412f50e402d0d00b381bb4f9a0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 59506 8bf3f4543b5b001538d06b141d4ae09d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 29840 0467a6f1ce2a6bf45484526e348e3f94\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 47808 ffdd30e3537d023d79e1d3f8ccb83e5b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 7052 51d6895e749da26f6f86e891ebab5adb\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 4038 f2f4930765c985c1d4ff310c5ec96931\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 10048 0eb93303de0fba01973dbac11d14ff20\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 43194 bcffaf2d54a0f0892651d5a4c36c2c67\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 21550 47ca0ca752d9eaf470a425557ed7cca9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 15658 0071409645abb27fac956fe0230014b9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 28880 a270f097cfeeb733fbb65fb54a7854dd\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 11512 344e47e3088734025bec645beb923c86\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 2715834 ecf56e2c12b8e2a44e384c72439c4ed5\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-enchant_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 7504 7659f855b478897a9ae514c355439287\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-intl_5.3.2-1ubuntu4.6_armel.deb\r\n Size/MD5: 50900 2d1909d622ec9bc2350ad62569249874\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 2982390 831e5eca51f2419f5818d434db284546\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 5771702 56fe6e6df92e09380d876642af5380f2\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 2890492 140915153f47f11856901c84820be068\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 551598 07f46408ad1ecd97379ed85399414665\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 28370 2fccc6fca3f44df0474a9b33e230a347\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 11211024 2929424c681f42af04863ea0575eecd7\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 404914 d087838bea6c5846c0eb11312f05e136\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 39864 f868077f95f9dfc418fc500cd8494e80\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 14332 15b24326fc979b89a464363ef63bbfe0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 19160 646142beb100e0e2f9a14f235cb6dcdc\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 68996 b640a1031d42d7cbe2e7aff12829f2c5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 33944 1b0e6a66ca7398f8475c459c99ee3c44\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 55472 76b72f26e08aa45f511f2af59c890c04\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 7482 f577ab49d3dd8525d03b269db67f157c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 4384 03354e6742660a09bf84242f79b8aa1e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 10730 cecc9fed9b82ebf55de4ae540b3484ca\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 51978 cac8f3273beadfb63674c6856690473c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 24766 777af0607ded40852827902b3cfb4066\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 17830 90e7aa5abc55826ed167c75243850bc3\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 34084 734bc0abdf803b4b6f8853a38e3e8b57\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 13294 c6b9eb2de9e6705bcbeff056cdab595d\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 2982024 186b9f16187871e65315958c25d510b3\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-enchant_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 8296 2eb32e661e8e623873f6042cb5233043\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-intl_5.3.2-1ubuntu4.6_powerpc.deb\r\n Size/MD5: 60530 4ced8317938fb126970fff4a420854f9\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 2894338 705436aef4d2949e90a77a95bd292bad\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 5645508 b0b22997491f803dd770e76f7a4d2e2f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 2825972 ab9106c0d0173dfca220af6dc8396e70\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 547346 d0f9411ba79daf250504060c0e6cf3b0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 27074 3d430898426064b4c3435f8afcbb9d65\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 10621222 98f8d882e3a80e5d141968d7d8bcb819\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 404906 39b5ebb15706bea58be4db1392987aa8\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 36724 dfe7ded0b5ddd6064806190a637646d5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 13434 71f93169324a20accfe7da16197860a6\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 17410 0f64440681b5847f0266b50c6c4e040d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 62088 32fa95fa4d34b298aa48248c2d3f0d15\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 30936 303b6ab55dbc17094c25051ea0a1bdc0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 50514 0812e6bcbb0df06269e3458768870d93\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 7144 d588848979de91b502df2c1b5fdcc129\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 4140 eb91d5d349a3a2a4285cdcb7914b7b14\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 10800 d8a53293bab378791a529ce68422ff7e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 46572 e42143c783a7111ebe4bb41daed0b4a1\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sybase_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 22928 25dfcf83304e7bdea419260077820a87\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 16886 eaeb116eb49625b91b25c507e71e631c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 32172 c9acb8ffca3acba3d6bb148b2132da5d\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 12108 0125aa3d93a3d7d7db9225270d5abda5\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 2893690 fe786ee9ba78325ea46f192af98f4032\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-enchant_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 7490 6b951fe70259633af0388019bed230d5\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-intl_5.3.2-1ubuntu4.6_sparc.deb\r\n Size/MD5: 54036 796ca4df04bfa667cd16a0dd6df2a5a1\r\n\r\nUpdated packages for Ubuntu 10.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.3-1ubuntu9.2.diff.gz\r\n Size/MD5: 196816 ede7dff78a1e215a0c478267c57dd1a8\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.3-1ubuntu9.2.dsc\r\n Size/MD5: 3246 8629ecc0b18d05ce19ddd8a6fd5c2be9\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.3.orig.tar.gz\r\n Size/MD5: 13921529 5adf1a537895c2ec933fddd48e78d8a2\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php-pear_5.3.3-1ubuntu9.2_all.deb\r\n Size/MD5: 362866 d63047ea2c45970adee41c85604d6964\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5_5.3.3-1ubuntu9.2_all.deb\r\n Size/MD5: 1122 f82fcb497f9831db617344e959fde575\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 3106010 973e07bb984b8446ef3ef2a2d5cfa00f\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 6028052 4742fca65397445228556709c11a8f2e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 3017590 26176b87d42a1a885a0a73953fe16a97\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 564200 66c937ec1b51a82affba110775a5d7e4\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 26874 79f6429a811276a34005ac5b5a26b1e2\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dbg_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 12405206 e01720b9f146509a2ed7bbf2ac70b13a\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 418324 5e1f55067b100fbdb0e8480450a6e917\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 38490 da775d309a31452c687fdce9402400bd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 16210 8dee00c5c4c8b72ca548165d0aadd447\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 19560 f417e4b2d2909845c4d08b609ddda459\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 75428 bdb08e4faee81589828ec316a3e6a52b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 35320 12ccfcdcb41110413ee8f10e99742529\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 59076 35210edb7d5afc9e31c2bc59912898cb\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 8048 de86320c471cdf767edab14b178daefd\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 4294 617566b3834b56b042967071460a272c\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 11170 0a4959dc691f4ff2d9ec63da62a33c72\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 54912 804acc24f4b7f6f07f03b6e5fdd9876e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 17952 0bd747dd720bd13f12ffbc07f583c9fb\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 34626 9a8e1665929e1f3de53ccc948d91e99e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 13044 a022258a7261c170bc357ba68fe477ec\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/libapache2-mod-php5filter_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 3104626 04c9ab77e009f27eb3712b8a0cffd5d3\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-enchant_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 8810 10a01a8e1a887be8f8c93fd8173b2637\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-fpm_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 3042170 7740a71d177414ff403e3c5b53c5e971\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-intl_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 58768 68e5e73df9bd861d6d1e53dfc3c18c66\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-sybase_5.3.3-1ubuntu9.2_amd64.deb\r\n Size/MD5: 26040 3c1dfa40fba7450e2a3f2090a9a4a4e6\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/libapache2-mod-php5_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 2944260 619f260f6c8c8d01abebfb898de87117\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cgi_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 5835312 9ccb840393ef5c52ef0bce1575351218\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-cli_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 2922192 140a51e9a83fc7688adfd1c5595e5559\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-common_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 555754 fa2fb0a9e101cac612f3ca769fa95d85\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-curl_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 25296 de9d5ed65071a30717fa966a7560b5be\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dbg_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 12617506 c9451c5504e6171b8eb9c502c4249968\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-dev_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 416994 3305cef2fe12c6f36d7b115bdd542077\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gd_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 33970 2d2b533f8dd03dcb37123fe02261b8f0\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-gmp_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 13966 f06c7e37882ff66e28c9f0c3466a6e5b\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-ldap_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 17154 5ca6d14918a60d9b8dcf14ace08959a5\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-mysql_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 65966 97682a4e4926622ff574fd8270cbd946\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-odbc_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 30826 9da385d8063f43060649efa9a7484d41\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pgsql_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 53722 fda31c7958a6747dc40fa0278e8a2e5d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-pspell_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 7148 f8719b35bc86a7e177c367d3dcd78714\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-recode_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 4098 62dc4cc3b37074275da051ee912ff52d\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-snmp_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 10014 5361d7a815cdda47babd766ae36c7f7e\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-sqlite_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 46950 4182f187abc09b075649432f5da56542\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-tidy_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 16070 db4f45c6d85ea94ffaf697d4022dc002\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xmlrpc_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 31656 9196ef437de957ca3d7596ba42e9eab3\r\n http://security.ubuntu.com/ubuntu/pool/main/p/php5/php5-xsl_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 12030 56742dde4c1b020a4f9dda5f434d8671\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/libapache2-mod-php5filter_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 2943178 d44b4b3954ad2727a92b8acf5db30c47\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-enchant_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 7634 5d139c268d1e5fc648327fc3bbbf114c\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-fpm_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 2944984 8442b12c63ed8301b5c671e5a2f6c8e0\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-intl_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 53300 650b608670e209ee475c8a568d477c13\r\n http://security.ubuntu.com/ubuntu/pool/universe/p/php5/php5-sybase_5.3.3-1ubuntu9.2_i386.deb\r\n Size/MD5: 23158 5d6b41b8f92447380d93e6640a22b18b\r\n\r\n armel architecture (ARM Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 2999022 daa8e8b7fdfa1a65cd661d853c0143b1\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 5965966 ba709c7dbcec4e38e88a9daa24887d42\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 2986806 02a3968a3deac621ce433e9f8147a43b\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 563518 3fd934f0a502ef4e37606867bbbd2ea6\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 25206 5d18abe9252cdc5229b7e91b68d778bb\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 13759836 a141409295cd7b8e31ab83afae643d95\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 418820 f56a2c2cbfd56bf8a78c1530a049e6f5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 37292 96b920810bbbdf8e430e7d6bacd77411\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 13568 1ecc1622475107f35d019bdabf098f01\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 17466 b1e77bb8269754bd0c72ed1ac5c45841\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 63208 5deb4c388eb305128f6e620cb74347cf\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 30618 7cc27fbb2e7cf59351267081ce916cd0\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 52906 fa8dc748d6914d9b75adce594ba3d4be\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 6984 afb04370d5ffd75298abfc74f95f7889\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 3906 51d1a684e7c674fd181a74dc5a69c7bf\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 9834 fca5b32f63f46f9f360f73da1528a26c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 44546 6f7d8d3b215a37f8f8ba7e0baee9cf63\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 15714 c1361163ce77383881da78fd454a19b9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 30168 73b69174f080b4f989f620506000b901\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 11460 e326bbcc1a5990751e84e18d23c4a61d\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 2998222 eb97aaadbbc526badb470f2ab588a2c5\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-enchant_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 7568 1f46699a9422cc125c2be6cfc6564660\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-fpm_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 3009278 0bd50c06173a9b871393bbfca607fc5a\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-intl_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 53476 712b3516cb52a3a2a251ec6c139aea4f\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-sybase_5.3.3-1ubuntu9.2_armel.deb\r\n Size/MD5: 21894 11b9b427bf4f3af130d7505b309bd019\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/p/php5/libapache2-mod-php5_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 3091760 cec535868df930364de273a8d9813a59\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cgi_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 5985056 b7ee8229012587e24d13bc02db88f67f\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-cli_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 2995916 3098a23a9264dae8e41437bcf38e2f59\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-common_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 564322 4b319d44925b0b8bdea42d38f16983f9\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-curl_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 28146 aea39e463fcfd7607c25a958478c5845\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dbg_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 13393736 1d680f8e9ccc4e46b6cc75ccc0f1ffeb\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-dev_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 415382 96279bcdf5259326622013f78761b112\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gd_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 39282 54b73faba10e5f0fb1b89fb841e4f51e\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-gmp_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 14098 1d635c8a683e4652fb0c445dac4eb920\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-ldap_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 18866 a9df988c0ce9ad79aa97ade72c414615\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-mysql_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 71472 60fdf09b45f88dd51d0c71fd2a639731\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-odbc_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 33306 16e77b3081a9457b4db1a3288712de8c\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pgsql_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 57710 3f077e55f4e8717f073897eec80d472a\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-pspell_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 7358 ae45fd458e011e64de815f508aaced39\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-recode_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 4304 52632bfc349c5883be00ec66e17d91c3\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-snmp_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 10536 ced4d0df904e53b38d3bddcfd8d37f78\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-sqlite_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 51082 24d3991267a44a6000c97158867522db\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-tidy_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 17504 bf1a3717987213dd64c51d3f303594c5\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xmlrpc_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 33772 f6a1f330aa73cd54d0097ab39462d521\r\n http://ports.ubuntu.com/pool/main/p/php5/php5-xsl_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 13018 c9c704c34d475d926778b24ce8f56fdf\r\n http://ports.ubuntu.com/pool/universe/p/php5/libapache2-mod-php5filter_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 3090844 e7c0485f0f0e3ef3e908a79c2ff700c6\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-enchant_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 8090 2358caf8d8d658d240184bac30663c4e\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-fpm_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 3021744 50656fd1da08c5fee4a3a074a86f0a0d\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-intl_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 59640 ee69e7ae68194393189e3c78b93db10a\r\n http://ports.ubuntu.com/pool/universe/p/php5/php5-sybase_5.3.3-1ubuntu9.2_powerpc.deb\r\n Size/MD5: 24378 337e728142f95116ae790202beda4801\r\n\r\n", "cvss3": {}, "published": "2011-01-13T00:00:00", "type": "securityvulns", "title": "[USN-1042-1] PHP vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-4645", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4409"], "modified": "2011-01-13T00:00:00", "id": "SECURITYVULNS:DOC:25489", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25489", "sourceData": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:38", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- -------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2155-1 security@debian.org\r\nhttp://www.debian.org/security/ Moritz Muehlenhoff\r\nJanuary 30, 2011 http://www.debian.org/security/faq\r\n- -------------------------------------------------------------------------\r\n\r\nPackage : freetype\r\nVulnerability : several\r\nProblem type : remote\r\nDebian-specific: no\r\nCVE ID : CVE-2010-3814 CVE-2010-3855\r\n\r\nTwo buffer overflows were found in the Freetype font library, which could\r\nlead to the execution of arbitrary code.\r\n\r\nFor the stable distribution (lenny), this problem has been fixed in\r\nversion 2.3.7-2+lenny5.\r\n\r\nFor the testing distribution (squeeze), this problem has been fixed in\r\nversion 2.4.2-2.1.\r\n\r\nFor the unstable distribution (sid), this problem has been fixed in\r\nversion 2.4.2-2.1.\r\n\r\nWe recommend that you upgrade your freetype packages.\r\n\r\nFurther information about Debian Security Advisories, how to apply\r\nthese updates to your system and frequently asked questions can be\r\nfound at: http://www.debian.org/security/\r\n\r\nMailing list: debian-security-announce@lists.debian.org\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n\r\niEYEARECAAYFAk1FuvEACgkQXm3vHE4uylo66wCePRZ8jHcXFk7DXLqI4bB3Ms9x\r\nRCAAn03RUcs4Qpb11uteJWbJTLRuRS+C\r\n=YCTp\r\n-----END PGP SIGNATURE-----", "cvss3": {}, "published": "2011-02-03T00:00:00", "type": "securityvulns", "title": "[SECURITY] [DSA 2155-1] freetype security update", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3855", "CVE-2010-3814"], "modified": "2011-02-03T00:00:00", "id": "SECURITYVULNS:DOC:25605", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25605", "sourceData": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:40", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ------------------------------------------------------------------------\r\n VMware Security Advisory\r\n\r\nAdvisory ID: VMSA-2011-0007\r\nSynopsis: VMware ESXi and ESX Denial of Service and third party\r\n updates for Likewise components and ESX Service\r\n Console\r\nIssue date: 2011-04-28\r\nUpdated on: 2011-04-28\r\nCVE numbers: CVE-2011-1785 CVE-2011-1786 CVE-2010-1324\r\n CVE-2010-1323 CVE-2010-4020 CVE-2010-4021\r\n CVE-2010-2240\r\n- ------------------------------------------------------------------------\r\n\r\n1. Summary\r\n\r\n VMware ESXi and ESX could encounter a socket exhaustion situation\r\n which may lead to a denial of service. Updates to Likewise components\r\n and to the ESX Service Console address security vulnerabilities.\r\n\r\n2. Relevant releases\r\n\r\n VMware ESXi 4.1 without patch ESXi410-201104401-SG.\r\n VMware ESXi 4.0 without patch ESXi400-201104401-SG.\r\n\r\n VMware ESX 4.1 without patch ESX410-201104401-SG.\r\n VMware ESX 4.0 without patch ESX400-201104401-SG.\r\n\r\n3. Problem Description\r\n\r\n a. ESX/ESXi Socket Exhaustion\r\n \r\n By sending malicious network traffic to an ESXi or ESX host an\r\n attacker could exhaust the available sockets which would prevent\r\n further connections to the host. In the event a host becomes\r\n inaccessible its virtual machines will continue to run and have\r\n network connectivity but a reboot of the ESXi or ESX host may be\r\n required in order to be able to connect to the host again.\r\n\r\n ESXi and ESX hosts may intermittently lose connectivity caused by\r\n applications that do not correctly close sockets. If this occurs an\r\n error message similar to the following may be written to the vpxa\r\n log:\r\n \r\n socket() returns -1 (Cannot allocate memory)\r\n\r\n An error message similar to the following may be written to the\r\n vmkernel logs:\r\n\r\n socreate(type=2, proto=17) failed with error 55\r\n\r\n VMware would like to thank Jimmy Scott at inet-solutions.be for\r\n reporting this issue to us.\r\n\r\n The Common Vulnerabilities and Exposures Project (cve.mitre.org) has\r\n assigned the name CVE-2011-1785 to this issue.\r\n\r\n Column 4 of the following table lists the action required to\r\n remediate the vulnerability in each release, if a solution is\r\n available.\r\n\r\n VMware Product Running Replace with/\r\n Product Version on Apply Patch\r\n ============= ======== ======= =================\r\n vCenter any Windows not affected\r\n\r\n hosted * any any not affected\r\n\r\n ESXi 4.1 ESXi ESXi410-201104401-SG\r\n ESXi 4.0 ESXi ESXi400-201104401-SG\r\n ESXi 3.5 ESXi not affected\r\n\r\n ESX 4.1 ESX ESX410-201104401-SG\r\n ESX 4.0 ESX ESX400-201104401-SG\r\n ESX 3.5 ESX not affected\r\n ESX 3.0.3 ESX not affected\r\n\r\n * hosted products are VMware Workstation, Player, ACE, Fusion.\r\n\r\n b. Likewise package update\r\n \r\n Updates to the vmware-esx-likewise-openldap and\r\n vmware-esx-likewise-krb5 packages address several security issues.\r\n\r\n One of the vulnerabilities is specific to Likewise while the other\r\n vulnerabilities are present in the MIT version of krb5.\r\n An incorrect assert() call in Likewise may lead to a termination\r\n of the Likewise-open lsassd service if a username with an illegal\r\n byte sequence is entered for user authentication when logging in to\r\n the Active Directory domain of the ESXi/ESX host. This would lead to\r\n a denial of service.\r\n The MIT-krb5 vulnerabilities are detailed in MITKRB5-SA-2010-007.\r\n\r\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\r\n assigned the names CVE-2011-1786 (Likewise-only issue),\r\n CVE-2010-1324, CVE-2010-1323, CVE-2010-4020, CVE-2010-4021 to these\r\n issues.\r\n\r\n Column 4 of the following table lists the action required to\r\n remediate the vulnerability in each release, if a solution is\r\n available.\r\n\r\n VMware Product Running Replace with/\r\n Product Version on Apply Patch\r\n ============= ======== ======= =================\r\n vCenter any Windows not affected\r\n\r\n hosted * any any not affected\r\n\r\n ESXi 4.1 ESXi ESXi410-201104401-SG\r\n ESXi 4.0 ESXi not affected\r\n ESXi 3.5 ESXi not affected\r\n\r\n ESX 4.1 ESX ESX410-201104401-SG\r\n ESX 4.0 ESX not affected\r\n ESX 3.5 ESX not affected\r\n ESX 3.0.3 ESX not affected\r\n\r\n c. ESX third party update for Service Console kernel\r\n \r\n The Service Console kernel is updated to include a fix for a\r\n security issue.\r\n \r\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\r\n assigned the name CVE-2010-2240 to this issue.\r\n\r\n VMware Product Running Replace with/\r\n\r\n Product Version on Apply Patch\r\n ============= ======== ======= =================\r\n vCenter any Windows not affected\r\n\r\n hosted * any any not affected\r\n\r\n ESXi any ESXi not affected\r\n\r\n ESX 4.1 ESX ESX410-201104401-SG\r\n ESX 4.0 ESX see VMSA-2011-0003 section j\r\n ESX 3.5 ESX not applicable\r\n ESX 3.0.3 ESX not applicable\r\n\r\n * hosted products are VMware Workstation, Player, ACE, Fusion.\r\n\r\n4. Solution\r\n\r\n Please review the patch/release notes for your product and version\r\n and verify the checksum of your downloaded file.\r\n\r\n ESXi 4.1\r\n --------\r\n ESXi410-201104001\r\n Download link:\r\n \r\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-276-20110420-682\r\n352/ESXi410-201104001.zip\r\n md5sum: 23bd026d6cbca718fe50ed1dd73cfe9d\r\n sha1sum: 82fa6da02a1f37430a15a659254426b3d3a62662\r\n http://kb.vmware.com/kb/1035111\r\n \r\n ESXi410-201104001 contains ESXi410-201104401-SG.\r\n\r\n\r\n ESX 4.1\r\n -------\r\n ESX410-201104001\r\n Download link:\r\n \r\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-275-20110420-062\r\n017/ESX410-201104001.zip\r\n md5sum: 757c3370ae63c75ef5b2178bd35a4ac3\r\n sha1sum: 95cfdc08e0988b4a0c0c3ea1a1acc1c661979888\r\n http://kb.vmware.com/kb/1035110\r\n \r\n ESX410-201104001 contains ESX410-201104401-SG.\r\n\r\n\r\n ESXi 4.0\r\n --------\r\n ESXi400-201104001\r\n Download link:\r\n \r\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-278-20110424-080\r\n274/ESXi400-201104001.zip\r\n md5sum: 08216b7ba18988f608326e245ac27e98\r\n sha1sum: 508a04532f0af007ce7c9d7693371470ed8257f0\r\n http://kb.vmware.com/kb/1037261\r\n \r\n ESXi400-201104001 contains ESXi400-201104401-SG.\r\n \r\n\r\n ESX 4.0\r\n -------\r\n ESX400-201104001\r\n Download link:\r\n \r\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-277-20110424-816\r\n604/ESX400-201104001.zip\r\n md5sum: 1a305fbf6c751403e56ef4e33cabde06\r\n sha1sum: bc7577cb80e69fbe81e3e9272a182deb42987b3d\r\n http://kb.vmware.com/kb/1037260\r\n\r\n ESX400-201104001 contains ESX400-201104401-SG.\r\n\r\n\r\n5. References\r\n\r\n CVE numbers\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1785\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1786\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240\r\n\r\n VMSA-2011-0003\r\n http://www.vmware.com/security/advisories/VMSA-2011-0003.html\r\n\r\n MITKRB5-SA-2010-007\r\n http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2010-007.txt\r\n\r\n- ------------------------------------------------------------------------\r\n6. Change log\r\n\r\n2011-04-28 VMSA-2011-0007\r\nInitial security advisory in conjunction with the release of\r\nESX/ESXi 4.0 and ESX/ESXi 4.1 patches on 2011-04-28.\r\n\r\n- ------------------------------------------------------------------------\r\n\r\n7. Contact\r\n\r\nE-mail list for product security notifications and announcements:\r\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\r\n\r\nThis Security Advisory is posted to the following lists:\r\n\r\n * security-announce at lists.vmware.com\r\n * bugtraq at securityfocus.com\r\n * full-disclosure at lists.grok.org.uk\r\n\r\nE-mail: security at vmware.com\r\nPGP key at: http://kb.vmware.com/kb/1055\r\n\r\nVMware Security Advisories\r\nhttp://www.vmware.com/security/advisories\r\n\r\nVMware security response policy\r\nhttp://www.vmware.com/support/policies/security_response.html\r\n\r\nGeneral support life cycle policy\r\nhttp://www.vmware.com/support/policies/eos.html\r\n\r\nVMware Infrastructure support life cycle policy\r\nhttp://www.vmware.com/support/policies/eos_vi.html\r\n\r\nCopyright 2011 VMware Inc. All rights reserved.\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: PGP Desktop 9.8.3 (Build 4028)\r\nCharset: utf-8\r\n\r\nwj8DBQFNuZubDEcm8Vbi9kMRAnwpAKDmLblfA++OHuWKEOiOzXmayf3JEgCgwfbN\r\nkr36WEecIMy3XzvjG84ikVM=\r\n=9R0l\r\n-----END PGP SIGNATURE-----", "cvss3": {}, "published": "2011-05-02T00:00:00", "type": "securityvulns", "title": "VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2011-1785", "CVE-2011-1786", "CVE-2010-2240", "CVE-2010-1323"], "modified": "2011-05-02T00:00:00", "id": "SECURITYVULNS:DOC:26274", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:26274", "sourceData": "", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:36", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2010:153\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : apache\r\n Date : August 16, 2010\r\n Affected: 2009.0, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been found and corrected in apache:\r\n \r\n The mod_cache and mod_dav modules in the Apache HTTP Server 2.2.x\r\n before 2.2.16 allow remote attackers to cause a denial of service\r\n (process crash) via a request that lacks a path (CVE-2010-1452).\r\n \r\n mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix,\r\n does not close the backend connection if a timeout occurs when reading\r\n a response from a persistent connection, which allows remote attackers\r\n to obtain a potentially sensitive response intended for a different\r\n client in opportunistic circumstances via a normal HTTP request.\r\n NOTE: this is the same issue as CVE-2010-2068, but for a different\r\n OS and set of affected versions (CVE-2010-2791).\r\n \r\n Packages for 2009.0 are provided as of the Extended Maintenance\r\n Program. Please visit this link to learn more:\r\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\r\n \r\n The updated packages have been patched to correct these issues.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2791\r\n http://httpd.apache.org/security/vulnerabilities_22.html\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2009.0:\r\n 238de136ebd4ef12d69c2bc8a3e3d3be 2009.0/i586/apache-base-2.2.9-12.10mdv2009.0.i586.rpm\r\n 141124279c0755c0299d59587f0eafeb 2009.0/i586/apache-devel-2.2.9-12.10mdv2009.0.i586.rpm\r\n 05cf83c379680e3ed51340b42d084b54 2009.0/i586/apache-htcacheclean-2.2.9-12.10mdv2009.0.i586.rpm\r\n 9e1f554bb3705dedaddba825f1b56403 2009.0/i586/apache-mod_authn_dbd-2.2.9-12.10mdv2009.0.i586.rpm\r\n 9a3655c03604fcd04b4d1e0e34dedffc 2009.0/i586/apache-mod_cache-2.2.9-12.10mdv2009.0.i586.rpm\r\n 0a92ae5396ef3bc58481964474fbbb19 2009.0/i586/apache-mod_dav-2.2.9-12.10mdv2009.0.i586.rpm\r\n 63df221d5cf990cd347466419a8b0377 2009.0/i586/apache-mod_dbd-2.2.9-12.10mdv2009.0.i586.rpm\r\n 1b2dbf225749350a9bb7dcdf20b92227 2009.0/i586/apache-mod_deflate-2.2.9-12.10mdv2009.0.i586.rpm\r\n 5ecc8f17635dd7e7428292628daeda79 2009.0/i586/apache-mod_disk_cache-2.2.9-12.10mdv2009.0.i586.rpm\r\n 8fab3607fe02e1564939f8c20f0d207b 2009.0/i586/apache-mod_file_cache-2.2.9-12.10mdv2009.0.i586.rpm\r\n 88cd61a082b42899bda94777ab7e62aa 2009.0/i586/apache-mod_ldap-2.2.9-12.10mdv2009.0.i586.rpm\r\n 1ff181c8481cda668fcb129052ab094c 2009.0/i586/apache-mod_mem_cache-2.2.9-12.10mdv2009.0.i586.rpm\r\n 6eedc6c5d7727f408882a07d0408bbdd 2009.0/i586/apache-mod_proxy-2.2.9-12.10mdv2009.0.i586.rpm\r\n ba21753018cb8fb4aa4750e8fe77e022 2009.0/i586/apache-mod_proxy_ajp-2.2.9-12.10mdv2009.0.i586.rpm\r\n 2a90910cff8efc4dd4c61db469548bf5 2009.0/i586/apache-mod_ssl-2.2.9-12.10mdv2009.0.i586.rpm\r\n 35e3bca53a5880a07b24ad72f6dd6d07 2009.0/i586/apache-modules-2.2.9-12.10mdv2009.0.i586.rpm\r\n 62e5846e1811ba312d6bb8f049493788 2009.0/i586/apache-mod_userdir-2.2.9-12.10mdv2009.0.i586.rpm\r\n 0f15da6722a641d7d5e5b911e8c0cece 2009.0/i586/apache-mpm-event-2.2.9-12.10mdv2009.0.i586.rpm\r\n 9b9f2d505afcc686c7d7fd1fb80615f7 2009.0/i586/apache-mpm-itk-2.2.9-12.10mdv2009.0.i586.rpm\r\n d839ec4ccd71e89115f9f62cd6ceee36 2009.0/i586/apache-mpm-peruser-2.2.9-12.10mdv2009.0.i586.rpm\r\n e4ae2a88b622053fe3b319343fadaf1e 2009.0/i586/apache-mpm-prefork-2.2.9-12.10mdv2009.0.i586.rpm\r\n 797172063095f4f48199e0f5c6df34df 2009.0/i586/apache-mpm-worker-2.2.9-12.10mdv2009.0.i586.rpm\r\n 56a686181dec3713a922e2beb1b74515 2009.0/i586/apache-source-2.2.9-12.10mdv2009.0.i586.rpm \r\n ffc80b53691b9200454d986e66728aa2 2009.0/SRPMS/apache-2.2.9-12.10mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n c578a6e9a29e81df145a388e8696e8f0 2009.0/x86_64/apache-base-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 168df22318ae9ea5be0f265b9aaa486a 2009.0/x86_64/apache-devel-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 3fd73c32becdc0c7ea67283c3a056e52 2009.0/x86_64/apache-htcacheclean-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 875d0e01dd140f65da24a14eb57ae484 2009.0/x86_64/apache-mod_authn_dbd-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 3247dcd354558d0fe035feda4416c8a0 2009.0/x86_64/apache-mod_cache-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 101c210907cd0e5d289081d80f83892e 2009.0/x86_64/apache-mod_dav-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 10b7a5d979b99bcbf38fdbe0e036a1cf 2009.0/x86_64/apache-mod_dbd-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 82c0a9a58e60d6018447052ad22b4507 2009.0/x86_64/apache-mod_deflate-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n fae88ae076de0bc2528f6b01f96c0608 2009.0/x86_64/apache-mod_disk_cache-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n a506f22a169f2de5a2705eeb6742fc69 2009.0/x86_64/apache-mod_file_cache-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 069155f234c22f55c30d20bda33dd40a 2009.0/x86_64/apache-mod_ldap-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n c4a56e07aabaac67a5fb491b72cbdd5e 2009.0/x86_64/apache-mod_mem_cache-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 842ce796a5ce358267588e62dc6c1d84 2009.0/x86_64/apache-mod_proxy-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n de2dfcf5017e07456237ebaebb94b63a 2009.0/x86_64/apache-mod_proxy_ajp-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n e7424124fd455d338fe7807085a465f8 2009.0/x86_64/apache-mod_ssl-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n cc51ff1bc2bb86fa375c64a83cbe5669 2009.0/x86_64/apache-modules-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n bd9169da6ee818841c99f893d97758ab 2009.0/x86_64/apache-mod_userdir-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n d786b5b3e993f6b762984939a59188ac 2009.0/x86_64/apache-mpm-event-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 3663a04f5b3bece171140300beca60a6 2009.0/x86_64/apache-mpm-itk-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 1893fd3799e3914f79b4e99435f7f28d 2009.0/x86_64/apache-mpm-peruser-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n 08cf47881f23b2f6423c7c0243369468 2009.0/x86_64/apache-mpm-prefork-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n b79fc5815401552c1ee4dd411ea60e9e 2009.0/x86_64/apache-mpm-worker-2.2.9-12.10mdv2009.0.x86_64.rpm\r\n d03ac2690298a61b630ec151fef1110b 2009.0/x86_64/apache-source-2.2.9-12.10mdv2009.0.x86_64.rpm \r\n ffc80b53691b9200454d986e66728aa2 2009.0/SRPMS/apache-2.2.9-12.10mdv2009.0.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n cae43472379d49f78134e2058709677a mes5/i586/apache-base-2.2.9-12.10mdvmes5.1.i586.rpm\r\n a71d55063dc1c638e2dfeed6379405e7 mes5/i586/apache-devel-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 96c5a3f3408f16608e4aa0eae921eadc mes5/i586/apache-htcacheclean-2.2.9-12.10mdvmes5.1.i586.rpm\r\n d91c5806b0647c7de4a7ae5a7acb5901 mes5/i586/apache-mod_authn_dbd-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 51709df2ae1d1bbbb80161d17823ed54 mes5/i586/apache-mod_cache-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 76d66f1632147a1db2a66ec8449676a7 mes5/i586/apache-mod_dav-2.2.9-12.10mdvmes5.1.i586.rpm\r\n c8fc9d26366cf23cb4e02e0ba7c40ab1 mes5/i586/apache-mod_dbd-2.2.9-12.10mdvmes5.1.i586.rpm\r\n f407cb9d289d4df8f395b7469221af83 mes5/i586/apache-mod_deflate-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 870246ffc86e5453bebc0adeff740f23 mes5/i586/apache-mod_disk_cache-2.2.9-12.10mdvmes5.1.i586.rpm\r\n c373b7252a58575f8b100cc9a77897d6 mes5/i586/apache-mod_file_cache-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 72b7c2d21a4aa038d384bb15f1171acd mes5/i586/apache-mod_ldap-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 7c4d510bdaa58bb13b4281283462d4e8 mes5/i586/apache-mod_mem_cache-2.2.9-12.10mdvmes5.1.i586.rpm\r\n e88f86183f1edab93caf98a98496237d mes5/i586/apache-mod_proxy-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 5c6f9547a6ff4faad90cf8f4fa6ad841 mes5/i586/apache-mod_proxy_ajp-2.2.9-12.10mdvmes5.1.i586.rpm\r\n ebb11a941f84db7fbc28ce274f9e8ba6 mes5/i586/apache-mod_ssl-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 9854699e46d9dfdfcabc5cd034c00b96 mes5/i586/apache-modules-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 51323be198089431321036224db67d03 mes5/i586/apache-mod_userdir-2.2.9-12.10mdvmes5.1.i586.rpm\r\n c046c955c1c506c03197d392df79c748 mes5/i586/apache-mpm-event-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 704649a20a5017f880eb36f2759fa835 mes5/i586/apache-mpm-itk-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 91003a47a1b7a5be432db522d40c00f8 mes5/i586/apache-mpm-peruser-2.2.9-12.10mdvmes5.1.i586.rpm\r\n adb996091556269761169421570ca809 mes5/i586/apache-mpm-prefork-2.2.9-12.10mdvmes5.1.i586.rpm\r\n 28d84353ee16bb7945fcfcf8cafd8c66 mes5/i586/apache-mpm-worker-2.2.9-12.10mdvmes5.1.i586.rpm\r\n f4ebb8202d84b91e93c79f65188ca23e mes5/i586/apache-source-2.2.9-12.10mdvmes5.1.i586.rpm \r\n da98e1bb9ad5504b54849dc44dd0c405 mes5/SRPMS/apache-2.2.9-12.10mdvmes5.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 94082a462cbbedc8c26aab5b6573bf82 mes5/x86_64/apache-base-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 315b539457792bc6e30b59564d6c1aa5 mes5/x86_64/apache-devel-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n defdf4efb19dfbd2efe8f799957dba00 mes5/x86_64/apache-htcacheclean-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 46b8507c6df22032fb25df9f1057d473 mes5/x86_64/apache-mod_authn_dbd-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 08732297da7d96414a6e66d0b5fe4f72 mes5/x86_64/apache-mod_cache-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 6d059d9fc62ec59c93afb20fe2b1e134 mes5/x86_64/apache-mod_dav-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 7a6a0e7b8086db5bfde394f0bbff7299 mes5/x86_64/apache-mod_dbd-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 8977f6e2b5b6bb21f456752a215019b0 mes5/x86_64/apache-mod_deflate-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n a642f9d74eed23992905d4ca26570b1a mes5/x86_64/apache-mod_disk_cache-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 6c583416f58264f0e6be8a8dfd426715 mes5/x86_64/apache-mod_file_cache-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 40092f4dd75fdb25506c136c6ae1cd87 mes5/x86_64/apache-mod_ldap-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n c4323601dc144cb51e024cf178dfe414 mes5/x86_64/apache-mod_mem_cache-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 584fff4d5eb4b4c55da1d298468fab68 mes5/x86_64/apache-mod_proxy-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n cd69b1c53233a546f26ac1a06a56b76f mes5/x86_64/apache-mod_proxy_ajp-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 68d9fcdd47f4767dfb4e58f210c31d97 mes5/x86_64/apache-mod_ssl-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 86c8a0a66627ad73123a7a8f19442c08 mes5/x86_64/apache-modules-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n de0d632919fc6edfd091f3b1871c0ca9 mes5/x86_64/apache-mod_userdir-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 0e4d84870327be57163579b66c3ac104 mes5/x86_64/apache-mpm-event-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 0959bfed96992d16c58f9ee22c04af07 mes5/x86_64/apache-mpm-itk-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 43eb9f6c352bbbe049628bbd41756b9b mes5/x86_64/apache-mpm-peruser-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 919a363ca56831f04f2e622cc1a192f3 mes5/x86_64/apache-mpm-prefork-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n ec1d3e1ae8c2bc3e547fd8f095fcfe23 mes5/x86_64/apache-mpm-worker-2.2.9-12.10mdvmes5.1.x86_64.rpm\r\n 7637fb712b7b08cffda967a66c3c47aa mes5/x86_64/apache-source-2.2.9-12.10mdvmes5.1.x86_64.rpm \r\n da98e1bb9ad5504b54849dc44dd0c405 mes5/SRPMS/apache-2.2.9-12.10mdvmes5.1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFMaTSHmqjQ0CJFipgRAtoCAJ9BGN6CAncvlMzNDaRADUpkjPp7uACg7Mpx\r\nrElFxWU84znmOrOERj6iHh8=\r\n=oTXe\r\n-----END PGP SIGNATURE-----", "cvss3": {}, "published": "2010-08-19T00:00:00", "type": "securityvulns", "title": "[ MDVSA-2010:153 ] apache", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-2791", "CVE-2010-2068", "CVE-2010-1452"], "modified": "2010-08-19T00:00:00", "id": "SECURITYVULNS:DOC:24548", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24548", "sourceData": "", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-09-04T14:19:59", "description": "This host is missing an important security update according to\n Mac OS X 10.6.6 Update/Mac OS X Security Update 2011-001.", "cvss3": {}, "published": "2011-08-26T00:00:00", "type": "openvas", "title": "Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-0187", "CVE-2010-4008", "CVE-2011-0181", "CVE-2011-0174", "CVE-2011-0186", "CVE-2011-0182", "CVE-2011-0173", "CVE-2011-0188", "CVE-2011-0176", "CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4261", "CVE-2010-3802", "CVE-2010-3089", "CVE-2011-0175", "CVE-2006-7243", "CVE-2010-3436", "CVE-2011-0189", "CVE-2010-4021", "CVE-2011-0180", "CVE-2010-3870", "CVE-2011-0184", "CVE-2011-0190", "CVE-2011-0179", "CVE-2011-0170", "CVE-2010-4009", "CVE-2010-3801", "CVE-2010-2068", "CVE-2011-0191", "CVE-2011-0178", "CVE-2010-0405", "CVE-2011-1417", "CVE-2011-0194", "CVE-2010-3315", "CVE-2010-1452", "CVE-2010-4479", "CVE-2010-3709", "CVE-2011-0172", "CVE-2011-0193", "CVE-2010-4494", "CVE-2011-0177", "CVE-2010-3710", "CVE-2010-3855", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-3814", "CVE-2010-4409", "CVE-2010-4260", "CVE-2010-1323", "CVE-2010-3434", "CVE-2010-3069", "CVE-2011-0192", "CVE-2011-0183"], "modified": "2017-08-28T00:00:00", "id": "OPENVAS:902470", "href": "http://plugins.openvas.org/nasl.php?oid=902470", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_macosx_su11-001.nasl 7015 2017-08-28 11:51:24Z teissa $\n#\n# Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow attackers to execute arbitrary code in\n the context of the browser, inject scripts, bypass certain security\n restrictions or cause a denial-of-service condition.\n Impact Level: System/Application\";\ntag_affected = \"X11,\n ATS,\n PHP,\n HFS,\n Ruby,\n Samba,\n bzip2,\n Kernel,\n AirPort,\n Apache,\n ClamAV,\n Mailman,\n Libinfo,\n libxml,\n ImageIO,\n Kerberos,\n CoreText,\n Terminal,\n Installer,\n QuickLook,\n QuickTime,\n Image RAW,\n Subversion,\n CarbonCore,\n AppleScript,\n File Quarantine\";\ntag_insight = \"For more information on the vulnerabilities refer to the links below.\";\ntag_solution = \"Upgrade to Mac OS X 10.6.7 or Run Mac Updates and update the Security\n Update 2011-001\n For updates refer to http://support.apple.com/kb/HT1222\";\ntag_summary = \"This host is missing an important security update according to\n Mac OS X 10.6.6 Update/Mac OS X Security Update 2011-001.\";\n\nif(description)\n{\n script_id(902470);\n script_version(\"$Revision: 7015 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-08-28 13:51:24 +0200 (Mon, 28 Aug 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-26 14:59:42 +0200 (Fri, 26 Aug 2011)\");\n script_cve_id(\"CVE-2011-0172\", \"CVE-2010-1452\", \"CVE-2010-2068\", \"CVE-2011-0173\",\n \"CVE-2011-0174\", \"CVE-2011-0175\", \"CVE-2011-0176\", \"CVE-2011-0177\",\n \"CVE-2010-0405\", \"CVE-2011-0178\", \"CVE-2010-3434\", \"CVE-2010-4260\",\n \"CVE-2010-4261\", \"CVE-2010-4479\", \"CVE-2011-0179\", \"CVE-2011-0180\",\n \"CVE-2011-0170\", \"CVE-2011-0181\", \"CVE-2011-0191\", \"CVE-2011-0192\",\n \"CVE-2011-0194\", \"CVE-2011-0193\", \"CVE-2011-0190\", \"CVE-2010-1323\",\n \"CVE-2010-1324\", \"CVE-2010-4020\", \"CVE-2010-4021\", \"CVE-2011-0182\",\n \"CVE-2011-0183\", \"CVE-2010-4008\", \"CVE-2010-4494\", \"CVE-2010-3089\",\n \"CVE-2006-7243\", \"CVE-2010-2950\", \"CVE-2010-3709\", \"CVE-2010-3710\",\n \"CVE-2010-4409\", \"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-4150\",\n \"CVE-2011-0184\", \"CVE-2011-1417\", \"CVE-2011-0186\", \"CVE-2010-4009\",\n \"CVE-2010-3801\", \"CVE-2011-0187\", \"CVE-2010-3802\", \"CVE-2011-0188\",\n \"CVE-2010-3069\", \"CVE-2010-3315\", \"CVE-2011-0189\", \"CVE-2010-3814\",\n \"CVE-2010-3855\", \"CVE-2010-3870\", \"CVE-2010-4150\");\n script_bugtraq_id(46988, 41963, 40827, 46984, 46987, 46991, 46971, 46994, 43331,\n 46989, 43555, 45152, 45152, 45152, 46993, 46982, 46659, 46996,\n 46657, 46658, 46973, 46972, 47023, 45118, 45116, 45117, 45122,\n 46997, 46990, 44779, 45617, 43187, 44951, 44718, 43926, 45119,\n 44723, 44718, 44980, 46965, 46832, 46995, 45241, 45240, 46992,\n 45239, 46966, 43212, 43678, 44643, 44214, 44605, 44980);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)\");\n script_xref(name : \"URL\" , value : \"http://support.apple.com/kb/HT1222\");\n script_xref(name : \"URL\" , value : \"http://lists.apple.com/archives/security-announce//2011//Mar/msg00006.html\");\n\n script_copyright(\"Copyright (c) 2011 SecPod\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n script_mandatory_keys(\"ssh/login/osx_name\",\"ssh/login/osx_version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-macosx.inc\");\ninclude(\"version_func.inc\");\n\n## Get the OS name\nosName = get_kb_item(\"ssh/login/osx_name\");\nif(!osName){\n exit (0);\n}\n\n## Get the OS Version\nosVer = get_kb_item(\"ssh/login/osx_version\");\nif(!osVer){\n exit(0);\n}\n\n## Check for the Mac OS X and Mac OS X Server\nif(\"Mac OS X\" >< osName || \"Mac OS X Server\" >< osName)\n{\n ## Check the affected OS versions\n if(version_is_less_equal(version:osVer, test_version:\"10.5.8\") ||\n version_in_range(version:osVer, test_version:\"10.6\", test_version2:\"10.6.6\"))\n {\n ## Check for the security update 2011.001\n if(isosxpkgvuln(fixed:\"com.apple.pkg.update.security.\", diff:\"2011.001\"))\n {\n security_message(0);\n exit(0);\n }\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-08-01T16:18:37", "description": "This host is missing an important security update according to\n Mac OS X 10.6.6 Update/Mac OS X Security Update 2011-001.", "cvss3": {}, "published": "2011-08-26T00:00:00", "type": "openvas", "title": "Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-0187", "CVE-2010-4008", "CVE-2011-0181", "CVE-2011-0174", "CVE-2011-0186", "CVE-2011-0182", "CVE-2011-0173", "CVE-2011-0188", "CVE-2011-0176", "CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4261", "CVE-2010-3802", "CVE-2010-3089", "CVE-2011-0175", "CVE-2006-7243", "CVE-2010-3436", "CVE-2011-0189", "CVE-2010-4021", "CVE-2011-0180", "CVE-2010-3870", "CVE-2011-0184", "CVE-2011-0190", "CVE-2011-0179", "CVE-2011-0170", "CVE-2010-4009", "CVE-2010-3801", "CVE-2010-2068", "CVE-2011-0191", "CVE-2011-0178", "CVE-2010-0405", "CVE-2011-1417", "CVE-2011-0194", "CVE-2010-3315", "CVE-2010-1452", "CVE-2010-4479", "CVE-2010-3709", "CVE-2011-0172", "CVE-2011-0193", "CVE-2010-4494", "CVE-2011-0177", "CVE-2010-3710", "CVE-2010-3855", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-3814", "CVE-2010-4409", "CVE-2010-4260", "CVE-2010-1323", "CVE-2010-3434", "CVE-2010-3069", "CVE-2011-0192", "CVE-2011-0183"], "modified": "2019-09-20T00:00:00", "id": "OPENVAS:1361412562310902470", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902470", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902470\");\n script_version(\"2019-09-20T11:01:01+0000\");\n script_tag(name:\"last_modification\", value:\"2019-09-20 11:01:01 +0000 (Fri, 20 Sep 2019)\");\n script_tag(name:\"creation_date\", value:\"2011-08-26 14:59:42 +0200 (Fri, 26 Aug 2011)\");\n script_cve_id(\"CVE-2011-0172\", \"CVE-2010-1452\", \"CVE-2010-2068\", \"CVE-2011-0173\",\n \"CVE-2011-0174\", \"CVE-2011-0175\", \"CVE-2011-0176\", \"CVE-2011-0177\",\n \"CVE-2010-0405\", \"CVE-2011-0178\", \"CVE-2010-3434\", \"CVE-2010-4260\",\n \"CVE-2010-4261\", \"CVE-2010-4479\", \"CVE-2011-0179\", \"CVE-2011-0180\",\n \"CVE-2011-0170\", \"CVE-2011-0181\", \"CVE-2011-0191\", \"CVE-2011-0192\",\n \"CVE-2011-0194\", \"CVE-2011-0193\", \"CVE-2011-0190\", \"CVE-2010-1323\",\n \"CVE-2010-1324\", \"CVE-2010-4020\", \"CVE-2010-4021\", \"CVE-2011-0182\",\n \"CVE-2011-0183\", \"CVE-2010-4008\", \"CVE-2010-4494\", \"CVE-2010-3089\",\n \"CVE-2006-7243\", \"CVE-2010-2950\", \"CVE-2010-3709\", \"CVE-2010-3710\",\n \"CVE-2010-4409\", \"CVE-2010-3436\",\n \"CVE-2011-0184\", \"CVE-2011-1417\", \"CVE-2011-0186\", \"CVE-2010-4009\",\n \"CVE-2010-3801\", \"CVE-2011-0187\", \"CVE-2010-3802\", \"CVE-2011-0188\",\n \"CVE-2010-3069\", \"CVE-2010-3315\", \"CVE-2011-0189\", \"CVE-2010-3814\",\n \"CVE-2010-3855\", \"CVE-2010-3870\", \"CVE-2010-4150\");\n script_bugtraq_id(46988, 41963, 40827, 46984, 46987, 46991, 46971, 46994, 43331,\n 46989, 43555, 45152, 45152, 45152, 46993, 46982, 46659, 46996,\n 46657, 46658, 46973, 46972, 47023, 45118, 45116, 45117, 45122,\n 46997, 46990, 44779, 45617, 43187, 44951, 44718, 43926, 45119,\n 44723, 44718, 44980, 46965, 46832, 46995, 45241, 45240, 46992,\n 45239, 46966, 43212, 43678, 44643, 44214, 44605, 44980);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)\");\n script_xref(name:\"URL\", value:\"http://support.apple.com/kb/HT1222\");\n script_xref(name:\"URL\", value:\"https://lists.apple.com/archives/security-announce//2011//Mar/msg00006.html\");\n\n script_copyright(\"Copyright (c) 2011 SecPod\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/osx_name\", \"ssh/login/osx_version\", re:\"ssh/login/osx_version=^10\\.[0-6]\\.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow attackers to execute arbitrary code in\n the context of the browser, inject scripts, bypass certain security\n restrictions or cause a denial-of-service condition.\");\n\n script_tag(name:\"affected\", value:\"X11,\n\n ATS,\n\n PHP,\n\n HFS,\n\n Ruby,\n\n Samba,\n\n bzip2,\n\n Kernel,\n\n AirPort,\n\n Apache,\n\n ClamAV,\n\n Mailman,\n\n Libinfo,\n\n libxml,\n\n ImageIO,\n\n Kerberos,\n\n CoreText,\n\n Terminal,\n\n Installer,\n\n QuickLook,\n\n QuickTime,\n\n Image RAW,\n\n Subversion,\n\n CarbonCore,\n\n AppleScript,\n\n File Quarantine\");\n\n script_tag(name:\"insight\", value:\"Please see the references for more information on the vulnerabilities.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mac OS X 10.6.7 or Run Mac Updates and update the Security\n Update 2011-001\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security update according to\n Mac OS X 10.6.6 Update/Mac OS X Security Update 2011-001.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-macosx.inc\");\ninclude(\"version_func.inc\");\n\nosName = get_kb_item( \"ssh/login/osx_name\" );\nif( ! osName ) exit( 0 );\n\nosVer = get_kb_item( \"ssh/login/osx_version\" );\nif( ! osVer ) exit( 0 );\n\nif( \"Mac OS X\" >< osName || \"Mac OS X Server\" >< osName ) {\n if( version_is_less_equal( version:osVer, test_version:\"10.5.8\" ) ||\n version_in_range( version:osVer, test_version:\"10.6\", test_version2:\"10.6.6\" ) ) {\n if( isosxpkgvuln( fixed:\"com.apple.pkg.update.security.\", diff:\"2011.001\" ) ) {\n report = report_fixed_ver( installed_version:osName + \" \" + osVer, fixed_version:\"Install the missing security update 2011.001\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n }\n}\n\nexit( 99 );\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-01-02T10:54:59", "description": "Check for the Version of php", "cvss3": {}, "published": "2010-12-28T00:00:00", "type": "openvas", "title": "Mandriva Update for php MDVSA-2010:254 (php)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-4409"], "modified": "2017-12-22T00:00:00", "id": "OPENVAS:831283", "href": "http://plugins.openvas.org/nasl.php?oid=831283", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for php MDVSA-2010:254 (php)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"This is a maintenance and security update that upgrades php to 5.3.4\n for 2010.0/2010.1.\n\n Security Enhancements and Fixes in PHP 5.3.4:\n \n * Paths with NULL in them (foo\\0bar.txt) are now considered as invalid\n (CVE-2006-7243).\n * Fixed bug #53512 (NumberFormatter::setSymbol crash on bogus values)\n (CVE-2010-4409)\n \n Please note that CVE-2010-4150, CVE-2010-3870, CVE-2010-3436,\n CVE-2010-3709, CVE-2010-3710 were fixed in previous advisories.\n \n Key Bug Fixes in PHP 5.3.4 include:\n \n * Added stat support for zip stream.\n * Added follow_location (enabled by default) option for the http\n stream support.\n * Added a 3rd parameter to get_html_translation_table. It now takes\n a charset hint, like htmlentities et al.\n * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect\n zend multibyte at runtime.\n * Multiple improvements to the FPM SAPI.\n * Over 100 other bug fixes.\n \n Additional post 5.3.4 fixes:\n \n * Fixed bug #53517 (segfault in pgsql_stmt_execute() when postgres\n is down).\n * Fixed bug #53541 (format string bug in ext/phar).\n \n Additionally some of the PECL extensions has been upgraded and/or\n rebuilt for the new php version.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"php on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00015.php\");\n script_id(831283);\n script_version(\"$Revision: 8226 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-22 07:30:26 +0100 (Fri, 22 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:254\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4409\", \"CVE-2010-4150\", \"CVE-2010-3870\", \"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-3710\");\n script_name(\"Mandriva Update for php MDVSA-2010:254 (php)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_php\", rpm:\"apache-mod_php~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc\", rpm:\"php-apc~3.1.6~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc-admin\", rpm:\"php-apc-admin~3.1.6~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~1.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator-admin\", rpm:\"php-eaccelerator-admin~0.9.6.1~1.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gearman\", rpm:\"php-gearman~0.7.0~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ini\", rpm:\"php-ini~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mailparse\", rpm:\"php-mailparse~2.1.5~8.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcal\", rpm:\"php-mcal~0.6~35.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-optimizer\", rpm:\"php-optimizer~0.1~0.alpha2.8.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-phar\", rpm:\"php-phar~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pinba\", rpm:\"php-pinba~0.0.5~2.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sasl\", rpm:\"php-sasl~0.1.0~33.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sphinx\", rpm:\"php-sphinx~1.0.4~2.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ssh2\", rpm:\"php-ssh2~0.11.2~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-suhosin\", rpm:\"php-suhosin~0.9.32.1~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tclink\", rpm:\"php-tclink~3.4.5~7.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-timezonedb\", rpm:\"php-timezonedb~2010.15~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-translit\", rpm:\"php-translit~0.6.0~15.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-vld\", rpm:\"php-vld~0.10.1~1.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xattr\", rpm:\"php-xattr~1.1.0~13.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xdebug\", rpm:\"php-xdebug~2.1.0~0.3mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_php\", rpm:\"apache-mod_php~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc\", rpm:\"php-apc~3.1.6~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc-admin\", rpm:\"php-apc-admin~3.1.6~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dio\", rpm:\"php-dio~0.0.2~6.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator-admin\", rpm:\"php-eaccelerator-admin~0.9.6.1~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fam\", rpm:\"php-fam~5.0.1~10.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filepro\", rpm:\"php-filepro~5.1.6~20.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-idn\", rpm:\"php-idn~1.2b~18.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ini\", rpm:\"php-ini~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mailparse\", rpm:\"php-mailparse~2.1.5~3.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcal\", rpm:\"php-mcal~0.6~30.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-optimizer\", rpm:\"php-optimizer~0.1~0.alpha2.3.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-phar\", rpm:\"php-phar~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sasl\", rpm:\"php-sasl~0.1.0~28.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ssh2\", rpm:\"php-ssh2~0.11.2~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-suhosin\", rpm:\"php-suhosin~0.9.32.1~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tclink\", rpm:\"php-tclink~3.4.5~1.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-timezonedb\", rpm:\"php-timezonedb~2010.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-translit\", rpm:\"php-translit~0.6.0~10.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-vld\", rpm:\"php-vld~0.10.1~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xattr\", rpm:\"php-xattr~1.1.0~9.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xdebug\", rpm:\"php-xdebug~2.1.0~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-22T13:06:18", "description": "Check for the Version of php", "cvss3": {}, "published": "2010-12-28T00:00:00", "type": "openvas", "title": "Mandriva Update for php MDVSA-2010:254 (php)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-4409"], "modified": "2018-01-22T00:00:00", "id": "OPENVAS:1361412562310831283", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831283", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for php MDVSA-2010:254 (php)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"This is a maintenance and security update that upgrades php to 5.3.4\n for 2010.0/2010.1.\n\n Security Enhancements and Fixes in PHP 5.3.4:\n \n * Paths with NULL in them (foo\\0bar.txt) are now considered as invalid\n (CVE-2006-7243).\n * Fixed bug #53512 (NumberFormatter::setSymbol crash on bogus values)\n (CVE-2010-4409)\n \n Please note that CVE-2010-4150, CVE-2010-3870, CVE-2010-3436,\n CVE-2010-3709, CVE-2010-3710 were fixed in previous advisories.\n \n Key Bug Fixes in PHP 5.3.4 include:\n \n * Added stat support for zip stream.\n * Added follow_location (enabled by default) option for the http\n stream support.\n * Added a 3rd parameter to get_html_translation_table. It now takes\n a charset hint, like htmlentities et al.\n * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect\n zend multibyte at runtime.\n * Multiple improvements to the FPM SAPI.\n * Over 100 other bug fixes.\n \n Additional post 5.3.4 fixes:\n \n * Fixed bug #53517 (segfault in pgsql_stmt_execute() when postgres\n is down).\n * Fixed bug #53541 (format string bug in ext/phar).\n \n Additionally some of the PECL extensions has been upgraded and/or\n rebuilt for the new php version.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"php on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00015.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831283\");\n script_version(\"$Revision: 8485 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-22 08:57:57 +0100 (Mon, 22 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:254\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4409\", \"CVE-2010-4150\", \"CVE-2010-3870\", \"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-3710\");\n script_name(\"Mandriva Update for php MDVSA-2010:254 (php)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_php\", rpm:\"apache-mod_php~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc\", rpm:\"php-apc~3.1.6~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc-admin\", rpm:\"php-apc-admin~3.1.6~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~1.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator-admin\", rpm:\"php-eaccelerator-admin~0.9.6.1~1.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gearman\", rpm:\"php-gearman~0.7.0~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ini\", rpm:\"php-ini~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mailparse\", rpm:\"php-mailparse~2.1.5~8.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcal\", rpm:\"php-mcal~0.6~35.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-optimizer\", rpm:\"php-optimizer~0.1~0.alpha2.8.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-phar\", rpm:\"php-phar~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pinba\", rpm:\"php-pinba~0.0.5~2.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sasl\", rpm:\"php-sasl~0.1.0~33.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sphinx\", rpm:\"php-sphinx~1.0.4~2.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ssh2\", rpm:\"php-ssh2~0.11.2~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-suhosin\", rpm:\"php-suhosin~0.9.32.1~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tclink\", rpm:\"php-tclink~3.4.5~7.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-timezonedb\", rpm:\"php-timezonedb~2010.15~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-translit\", rpm:\"php-translit~0.6.0~15.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-vld\", rpm:\"php-vld~0.10.1~1.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xattr\", rpm:\"php-xattr~1.1.0~13.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xdebug\", rpm:\"php-xdebug~2.1.0~0.3mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.4~0.1mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_php\", rpm:\"apache-mod_php~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc\", rpm:\"php-apc~3.1.6~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-apc-admin\", rpm:\"php-apc-admin~3.1.6~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dio\", rpm:\"php-dio~0.0.2~6.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator-admin\", rpm:\"php-eaccelerator-admin~0.9.6.1~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fam\", rpm:\"php-fam~5.0.1~10.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filepro\", rpm:\"php-filepro~5.1.6~20.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-idn\", rpm:\"php-idn~1.2b~18.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ini\", rpm:\"php-ini~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mailparse\", rpm:\"php-mailparse~2.1.5~3.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcal\", rpm:\"php-mcal~0.6~30.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-optimizer\", rpm:\"php-optimizer~0.1~0.alpha2.3.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-phar\", rpm:\"php-phar~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sasl\", rpm:\"php-sasl~0.1.0~28.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ssh2\", rpm:\"php-ssh2~0.11.2~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-suhosin\", rpm:\"php-suhosin~0.9.32.1~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tclink\", rpm:\"php-tclink~3.4.5~1.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-timezonedb\", rpm:\"php-timezonedb~2010.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-translit\", rpm:\"php-translit~0.6.0~10.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-vld\", rpm:\"php-vld~0.10.1~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xattr\", rpm:\"php-xattr~1.1.0~9.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xdebug\", rpm:\"php-xdebug~2.1.0~0.3mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.4~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:53", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for maniadrive FEDORA-2010-18976", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310862767", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862767", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for maniadrive FEDORA-2010-18976\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862767\");\n script_version(\"$Revision: 14316 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 12:36:02 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2010-18976\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for maniadrive FEDORA-2010-18976\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'maniadrive'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"maniadrive on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"maniadrive\", rpm:\"maniadrive~1.2~23.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:43", "description": "Check for the Version of maniadrive", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for maniadrive FEDORA-2010-19011", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862766", "href": "http://plugins.openvas.org/nasl.php?oid=862766", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for maniadrive FEDORA-2010-19011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"maniadrive on Fedora 13\";\ntag_insight = \"ManiaDrive is an arcade car game on acrobatic tracks, with a quick and nervous\n gameplay (tracks almost never exceed one minute). Features: Complex car\n physics, Challenging "story mode", LAN and Internet mode, Live scores,\n Track editor, Dedicated server with HTTP interface and More than 30 blocks.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html\");\n script_id(862766);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-19011\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for maniadrive FEDORA-2010-19011\");\n\n script_summary(\"Check for the Version of maniadrive\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"maniadrive\", rpm:\"maniadrive~1.2~23.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:27", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php-eaccelerator FEDORA-2010-18976", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310862778", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862778", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php-eaccelerator FEDORA-2010-18976\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052844.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862778\");\n script_version(\"$Revision: 14316 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 12:36:02 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2010-18976\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php-eaccelerator FEDORA-2010-18976\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php-eaccelerator'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"php-eaccelerator on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~3.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:39", "description": "Check for the Version of php", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php FEDORA-2010-19011", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862764", "href": "http://plugins.openvas.org/nasl.php?oid=862764", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2010-19011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PHP is an HTML-embedded scripting language. PHP attempts to make it\n easy for developers to write dynamically generated web pages. PHP also\n offers built-in database integration for several commercial and\n non-commercial database management systems, so writing a\n database-enabled webpage with PHP is fairly simple. The most common\n use of PHP coding is probably as a replacement for CGI scripts.\n\n The php package contains the module which adds support for the PHP\n language to Apache HTTP Server.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"php on Fedora 13\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052837.html\");\n script_id(862764);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-19011\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php FEDORA-2010-19011\");\n\n script_summary(\"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~1.fc13.1\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:55:44", "description": "Check for the Version of php", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php FEDORA-2010-18976", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862769", "href": "http://plugins.openvas.org/nasl.php?oid=862769", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2010-18976\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"PHP is an HTML-embedded scripting language. PHP attempts to make it\n easy for developers to write dynamically generated web pages. PHP also\n offers built-in database integration for several commercial and\n non-commercial database management systems, so writing a\n database-enabled webpage with PHP is fairly simple. The most common\n use of PHP coding is probably as a replacement for CGI scripts.\n\n The php package contains the module which adds support for the PHP\n language to Apache HTTP Server.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"php on Fedora 14\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052843.html\");\n script_id(862769);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18976\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php FEDORA-2010-18976\");\n\n script_summary(\"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~1.fc14.1\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:55:28", "description": "Check for the Version of php-eaccelerator", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php-eaccelerator FEDORA-2010-19011", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862777", "href": "http://plugins.openvas.org/nasl.php?oid=862777", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php-eaccelerator FEDORA-2010-19011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"php-eaccelerator on Fedora 13\";\ntag_insight = \"eAccelerator is a further development of the MMCache PHP Accelerator & Encoder.\n It increases performance of PHP scripts by caching them in compiled state, so\n that the overhead of compiling is almost completely eliminated.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052835.html\");\n script_id(862777);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-19011\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php-eaccelerator FEDORA-2010-19011\");\n\n script_summary(\"Check for the Version of php-eaccelerator\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~3.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:57", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for maniadrive FEDORA-2010-19011", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310862766", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862766", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for maniadrive FEDORA-2010-19011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862766\");\n script_version(\"$Revision: 14316 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 12:36:02 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2010-19011\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for maniadrive FEDORA-2010-19011\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'maniadrive'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC13\");\n script_tag(name:\"affected\", value:\"maniadrive on Fedora 13\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"maniadrive\", rpm:\"maniadrive~1.2~23.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:35", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php FEDORA-2010-19011", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310862764", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862764", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2010-19011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052837.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862764\");\n script_version(\"$Revision: 14316 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 12:36:02 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2010-19011\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php FEDORA-2010-19011\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC13\");\n script_tag(name:\"affected\", value:\"php on Fedora 13\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~1.fc13.1\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:40", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php-eaccelerator FEDORA-2010-19011", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310862777", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862777", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php-eaccelerator FEDORA-2010-19011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052835.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862777\");\n script_version(\"$Revision: 14316 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 12:36:02 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2010-19011\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php-eaccelerator FEDORA-2010-19011\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php-eaccelerator'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC13\");\n script_tag(name:\"affected\", value:\"php-eaccelerator on Fedora 13\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~3.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:25", "description": "Check for the Version of maniadrive", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for maniadrive FEDORA-2010-18976", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862767", "href": "http://plugins.openvas.org/nasl.php?oid=862767", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for maniadrive FEDORA-2010-18976\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"maniadrive on Fedora 14\";\ntag_insight = \"ManiaDrive is an arcade car game on acrobatic tracks, with a quick and nervous\n gameplay (tracks almost never exceed one minute). Features: Complex car\n physics, Challenging "story mode", LAN and Internet mode, Live scores,\n Track editor, Dedicated server with HTTP interface and More than 30 blocks.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html\");\n script_id(862767);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18976\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for maniadrive FEDORA-2010-18976\");\n\n script_summary(\"Check for the Version of maniadrive\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"maniadrive\", rpm:\"maniadrive~1.2~23.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:55:42", "description": "Check for the Version of php-eaccelerator", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php-eaccelerator FEDORA-2010-18976", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862778", "href": "http://plugins.openvas.org/nasl.php?oid=862778", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php-eaccelerator FEDORA-2010-18976\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"php-eaccelerator on Fedora 14\";\ntag_insight = \"eAccelerator is a further development of the MMCache PHP Accelerator & Encoder.\n It increases performance of PHP scripts by caching them in compiled state, so\n that the overhead of compiling is almost completely eliminated.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052844.html\");\n script_id(862778);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18976\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php-eaccelerator FEDORA-2010-18976\");\n\n script_summary(\"Check for the Version of php-eaccelerator\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"php-eaccelerator\", rpm:\"php-eaccelerator~0.9.6.1~3.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:40:04", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-11T00:00:00", "type": "openvas", "title": "Fedora Update for php FEDORA-2010-18976", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4150", "CVE-2010-2950", "CVE-2010-4409"], "modified": "2019-03-19T00:00:00", "id": "OPENVAS:1361412562310862769", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862769", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for php FEDORA-2010-18976\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052843.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862769\");\n script_version(\"$Revision: 14316 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 12:36:02 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-11 16:07:49 +0100 (Tue, 11 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"FEDORA\", value:\"2010-18976\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-4150\", \"CVE-2010-3709\", \"CVE-2010-3436\", \"CVE-2010-2950\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2009-5016\", \"CVE-2010-4409\");\n script_name(\"Fedora Update for php FEDORA-2010-18976\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'php'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"php on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.4~1.fc14.1\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-12-14T11:48:27", "description": "Check for the Version of clamav", "cvss3": {}, "published": "2010-12-28T00:00:00", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2010-18564", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-0405", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2017-12-13T00:00:00", "id": "OPENVAS:862740", "href": "http://plugins.openvas.org/nasl.php?oid=862740", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2010-18564\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"clamav on Fedora 13\";\ntag_insight = \"Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this\n software is the integration with mail servers (attachment scanning). The\n package provides a flexible and scalable multi-threaded daemon, a command\n line scanner, and a tool for automatic updating via Internet. The programs\n are based on a shared library distributed with the Clam AntiVirus package,\n which you can use with your own software. The virus database is based on\n the virus database from OpenAntiVirus, but contains additional signatures\n (including signatures for popular polymorphic viruses, too) and is KEPT UP\n TO DATE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html\");\n script_id(862740);\n script_version(\"$Revision: 8092 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-13 07:31:16 +0100 (Wed, 13 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18564\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-0405\", \"CVE-2010-4479\");\n script_name(\"Fedora Update for clamav FEDORA-2010-18564\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~1300.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:07", "description": "Check for the Version of clamav", "cvss3": {}, "published": "2010-12-28T00:00:00", "type": "openvas", "title": "Fedora Update for clamav FEDORA-2010-18564", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-0405", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2017-12-26T00:00:00", "id": "OPENVAS:1361412562310862740", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862740", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for clamav FEDORA-2010-18564\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"clamav on Fedora 13\";\ntag_insight = \"Clam AntiVirus is an anti-virus toolkit for UNIX. The main purpose of this\n software is the integration with mail servers (attachment scanning). The\n package provides a flexible and scalable multi-threaded daemon, a command\n line scanner, and a tool for automatic updating via Internet. The programs\n are based on a shared library distributed with the Clam AntiVirus package,\n which you can use with your own software. The virus database is based on\n the virus database from OpenAntiVirus, but contains additional signatures\n (including signatures for popular polymorphic viruses, too) and is KEPT UP\n TO DATE.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052401.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862740\");\n script_version(\"$Revision: 8246 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-26 08:29:20 +0100 (Tue, 26 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-28 07:11:56 +0100 (Tue, 28 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2010-18564\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-0405\", \"CVE-2010-4479\");\n script_name(\"Fedora Update for clamav FEDORA-2010-18564\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC13\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~1300.fc13\", rls:\"FC13\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:18", "description": "Check for the Version of krb5", "cvss3": {}, "published": "2010-12-09T00:00:00", "type": "openvas", "title": "Mandriva Update for krb5 MDVSA-2010:246 (krb5)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-1323"], "modified": "2017-12-27T00:00:00", "id": "OPENVAS:1361412562310831270", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831270", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for krb5 MDVSA-2010:246 (krb5)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in krb5:\n\n An unauthenticated remote attacker could alter a SAM-2 challenge,\n affecting the prompt text seen by the user or the kind of response\n sent to the KDC. Under some circumstances, this can negate the\n incremental security benefit of using a single-use authentication\n mechanism token. An unauthenticated remote attacker has a 1/256\n chance of forging KRB-SAFE messages in an application protocol if the\n targeted pre-existing session uses an RC4 session key. Few application\n protocols use KRB-SAFE messages (CVE-2010-1323).\n \n An unauthenticated remote attacker can forge GSS tokens that\n are intended to be integrity-protected but unencrypted, if the\n targeted pre-existing application session uses a DES session key. An\n authenticated remote attacker can forge PACs if using a KDC that does\n not filter client-provided PAC data. This can result in privilege\n escalation against a service that relies on PAC contents to make\n authorization decisions. An unauthenticated remote attacker has a 1/256\n chance of swapping a client-issued KrbFastReq into a different KDC-REQ,\n if the armor key is RC4. The consequences are believed to be minor\n (CVE-2010-1324).\n \n An authenticated remote attacker that controls a legitimate service\n principal has a 1/256 chance of forging the AD-SIGNEDPATH signature\n if the TGT key is RC4, allowing it to use self-generated evidence\n tickets for S4U2Proxy, instead of tickets obtained from the user or\n with S4U2Self. Configurations using RC4 for the TGT key are believed\n to be rare. An authenticated remote attacker has a 1/256 chance of\n forging AD-KDC-ISSUED signatures on authdata elements in tickets\n having an RC4 service key, resulting in privilege escalation against\n a service that relies on these signatures. There are no known uses\n of the KDC-ISSUED authdata container at this time (CVE-2010-4020.\n \n An authenticated remote attacker that controls a legitimate service\n principal could obtain a valid service ticket to itself containing\n valid KDC-generated authorization data for a client whose TGS-REQ\n it has intercepted. The attacker could then use this ticket for\n S4U2Proxy to impersonate the targeted client even if the client never\n authenticated to the subverted service. The vulnerable configuration\n is believed to be rare (CVE-2010-4021).\n \n The updated packages have been patched to correct this issue.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"krb5 on Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00001.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831270\");\n script_version(\"$Revision: 8250 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 08:29:15 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-09 08:26:35 +0100 (Thu, 09 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"MDVSA\", value: \"2010:246\");\n script_cve_id(\"CVE-2010-1323\", \"CVE-2010-1324\", \"CVE-2010-4020\", \"CVE-2010-4021\");\n script_name(\"Mandriva Update for krb5 MDVSA-2010:246 (krb5)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of krb5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"krb5\", rpm:\"krb5~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-pkinit-openssl\", rpm:\"krb5-pkinit-openssl~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server\", rpm:\"krb5-server~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server-ldap\", rpm:\"krb5-server-ldap~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-workstation\", rpm:\"krb5-workstation~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53\", rpm:\"libkrb53~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53-devel\", rpm:\"libkrb53-devel~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53\", rpm:\"lib64krb53~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53-devel\", rpm:\"lib64krb53-devel~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"krb5\", rpm:\"krb5~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-pkinit-openssl\", rpm:\"krb5-pkinit-openssl~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server\", rpm:\"krb5-server~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server-ldap\", rpm:\"krb5-server-ldap~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-workstation\", rpm:\"krb5-workstation~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53\", rpm:\"libkrb53~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53-devel\", rpm:\"libkrb53-devel~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53\", rpm:\"lib64krb53~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53-devel\", rpm:\"lib64krb53-devel~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-12-04T11:18:13", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1030-1", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for krb5 vulnerabilities USN-1030-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-1323"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840547", "href": "http://plugins.openvas.org/nasl.php?oid=840547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1030_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for krb5 vulnerabilities USN-1030-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that Kerberos did not properly determine the\n acceptability of certain checksums. A remote attacker could use certain\n checksums to alter the prompt message, modify a response to a Key\n Distribution Center (KDC) or forge a KRB-SAFE message. (CVE-2010-1323)\n\n It was discovered that Kerberos did not properly determine the\n acceptability of certain checksums. A remote attacker could use certain\n checksums to forge GSS tokens or gain privileges. This issue only affected\n Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2010-1324)\n \n It was discovered that Kerberos did not reject RC4 key-derivation\n checksums. An authenticated remote user could use this issue to forge\n AD-SIGNEDPATH or AD-KDC-ISSUED signatures and possibly gain privileges.\n This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2010-4020)\n \n It was discovered that Kerberos did not properly restrict the use of TGT\n credentials for armoring TGS requests. A remote authenticated user could\n use this flaw to impersonate a client. This issue only affected Ubuntu\n 9.10. (CVE-2010-4021)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1030-1\";\ntag_affected = \"krb5 vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 8.04 LTS ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1030-1/\");\n script_id(840547);\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"USN\", value: \"1030-1\");\n script_cve_id(\"CVE-2010-1323\", \"CVE-2010-1324\", \"CVE-2010-4020\", \"CVE-2010-4021\");\n script_name(\"Ubuntu Update for krb5 vulnerabilities USN-1030-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssapi-krb5-2\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssrpc4\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libk5crypto3\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5clnt6\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5srv6\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkdb5-4\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-3\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5support0\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-clients\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-ftpd\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc-ldap\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-rsh-server\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-telnetd\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libkadm55\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb53\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-clients\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-ftpd\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-rsh-server\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-telnetd\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-multidev\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssapi-krb5-2\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssrpc4\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libk5crypto3\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5clnt-mit7\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5srv-mit7\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkdb5-4\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-3\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5support0\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc-ldap\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm55\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb53\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-clients\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-ftpd\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-rsh-server\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-telnetd\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-multidev\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssapi-krb5-2\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssrpc4\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libk5crypto3\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5clnt-mit7\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5srv-mit7\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkdb5-4\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-3\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5support0\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc-ldap\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:39:36", "description": "The remote host is missing an update to the system\n as announced in the referenced advisory.", "cvss3": {}, "published": "2011-01-24T00:00:00", "type": "openvas", "title": "FreeBSD Ports: php5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-2094", "CVE-2010-3709", "CVE-2010-4150", "CVE-2010-2950"], "modified": "2019-03-14T00:00:00", "id": "OPENVAS:136141256231068689", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231068689", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: freebsd_php57.nasl 14170 2019-03-14 09:24:12Z cfischer $\n#\n# Auto generated from VID b2a6fc0e-070f-11e0-a6e9-00215c6a37bb\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.68689\");\n script_version(\"$Revision: 14170 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-14 10:24:12 +0100 (Thu, 14 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-2950\", \"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-4150\");\n script_name(\"FreeBSD Ports: php5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsd\", \"ssh/login/freebsdrel\");\n\n script_tag(name:\"insight\", value:\"The following packages are affected:\n\n php5\n php52\n\nCVE-2010-2950\nFormat string vulnerability in stream.c in the phar extension in PHP\n5.3.x through 5.3.3 allows context-dependent attackers to obtain\nsensitive information (memory contents) and possibly execute arbitrary\ncode via a crafted phar:// URI that is not properly handled by the\nphar_stream_flush function, leading to errors in the\nphp_stream_wrapper_log_error function. NOTE: this vulnerability exists\nbecause of an incomplete fix for CVE-2010-2094.\n\nCVE-2010-3436\nfopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote\nattackers to bypass open_basedir restrictions via vectors related to\nthe length of a filename.\n\nCVE-2010-3709\nThe ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14\nand 5.3.x through 5.3.3 allows context-dependent attackers to cause a\ndenial of service (NULL pointer dereference and application crash) via\na crafted ZIP archive.\n\nCVE-2010-4150\nDouble free vulnerability in the imap_do_open function in the IMAP\nextension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3\nbefore 5.3.4 allows attackers to cause a denial of service (memory\ncorruption) or possibly execute arbitrary code via unspecified\nvectors.\");\n\n script_tag(name:\"solution\", value:\"Update your system with the appropriate patches or\n software upgrades.\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update to the system\n as announced in the referenced advisory.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-bsd.inc\");\n\nvuln = FALSE;\ntxt = \"\";\n\nbver = portver(pkg:\"php5\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.3.4\")<0) {\n txt += 'Package php5 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\nbver = portver(pkg:\"php52\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.2.15\")<0) {\n txt += 'Package php52 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\n\nif(vuln) {\n security_message(data:txt);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-02T21:13:29", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "cvss3": {}, "published": "2011-01-24T00:00:00", "type": "openvas", "title": "FreeBSD Ports: php5", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-7243", "CVE-2010-3436", "CVE-2010-2094", "CVE-2010-3709", "CVE-2010-4150", "CVE-2010-2950"], "modified": "2017-02-25T00:00:00", "id": "OPENVAS:68689", "href": "http://plugins.openvas.org/nasl.php?oid=68689", "sourceData": "#\n#VID b2a6fc0e-070f-11e0-a6e9-00215c6a37bb\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID b2a6fc0e-070f-11e0-a6e9-00215c6a37bb\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n php5\n php52\n\nCVE-2010-2950\nFormat string vulnerability in stream.c in the phar extension in PHP\n5.3.x through 5.3.3 allows context-dependent attackers to obtain\nsensitive information (memory contents) and possibly execute arbitrary\ncode via a crafted phar:// URI that is not properly handled by the\nphar_stream_flush function, leading to errors in the\nphp_stream_wrapper_log_error function. NOTE: this vulnerability exists\nbecause of an incomplete fix for CVE-2010-2094.\n\nCVE-2010-3436\nfopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote\nattackers to bypass open_basedir restrictions via vectors related to\nthe length of a filename.\n\nCVE-2010-3709\nThe ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14\nand 5.3.x through 5.3.3 allows context-dependent attackers to cause a\ndenial of service (NULL pointer dereference and application crash) via\na crafted ZIP archive.\n\nCVE-2010-4150\nDouble free vulnerability in the imap_do_open function in the IMAP\nextension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3\nbefore 5.3.4 allows attackers to cause a denial of service (memory\ncorruption) or possibly execute arbitrary code via unspecified\nvectors.\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\";\n\nif(description)\n{\n script_id(68689);\n script_version(\"$Revision: 5424 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-25 17:52:36 +0100 (Sat, 25 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2006-7243\", \"CVE-2010-2950\", \"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-4150\");\n script_name(\"FreeBSD Ports: php5\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"php5\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.3.4\")<0) {\n txt += 'Package php5 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"php52\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.2.15\")<0) {\n txt += 'Package php52 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-14T11:48:34", "description": "Check for the Version of krb5", "cvss3": {}, "published": "2010-12-09T00:00:00", "type": "openvas", "title": "Mandriva Update for krb5 MDVSA-2010:246 (krb5)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-1323"], "modified": "2017-12-14T00:00:00", "id": "OPENVAS:831270", "href": "http://plugins.openvas.org/nasl.php?oid=831270", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for krb5 MDVSA-2010:246 (krb5)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in krb5:\n\n An unauthenticated remote attacker could alter a SAM-2 challenge,\n affecting the prompt text seen by the user or the kind of response\n sent to the KDC. Under some circumstances, this can negate the\n incremental security benefit of using a single-use authentication\n mechanism token. An unauthenticated remote attacker has a 1/256\n chance of forging KRB-SAFE messages in an application protocol if the\n targeted pre-existing session uses an RC4 session key. Few application\n protocols use KRB-SAFE messages (CVE-2010-1323).\n \n An unauthenticated remote attacker can forge GSS tokens that\n are intended to be integrity-protected but unencrypted, if the\n targeted pre-existing application session uses a DES session key. An\n authenticated remote attacker can forge PACs if using a KDC that does\n not filter client-provided PAC data. This can result in privilege\n escalation against a service that relies on PAC contents to make\n authorization decisions. An unauthenticated remote attacker has a 1/256\n chance of swapping a client-issued KrbFastReq into a different KDC-REQ,\n if the armor key is RC4. The consequences are believed to be minor\n (CVE-2010-1324).\n \n An authenticated remote attacker that controls a legitimate service\n principal has a 1/256 chance of forging the AD-SIGNEDPATH signature\n if the TGT key is RC4, allowing it to use self-generated evidence\n tickets for S4U2Proxy, instead of tickets obtained from the user or\n with S4U2Self. Configurations using RC4 for the TGT key are believed\n to be rare. An authenticated remote attacker has a 1/256 chance of\n forging AD-KDC-ISSUED signatures on authdata elements in tickets\n having an RC4 service key, resulting in privilege escalation against\n a service that relies on these signatures. There are no known uses\n of the KDC-ISSUED authdata container at this time (CVE-2010-4020.\n \n An authenticated remote attacker that controls a legitimate service\n principal could obtain a valid service ticket to itself containing\n valid KDC-generated authorization data for a client whose TGS-REQ\n it has intercepted. The attacker could then use this ticket for\n S4U2Proxy to impersonate the targeted client even if the client never\n authenticated to the subverted service. The vulnerable configuration\n is believed to be rare (CVE-2010-4021).\n \n The updated packages have been patched to correct this issue.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"krb5 on Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00001.php\");\n script_id(831270);\n script_version(\"$Revision: 8109 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-14 07:31:15 +0100 (Thu, 14 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-09 08:26:35 +0100 (Thu, 09 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"MDVSA\", value: \"2010:246\");\n script_cve_id(\"CVE-2010-1323\", \"CVE-2010-1324\", \"CVE-2010-4020\", \"CVE-2010-4021\");\n script_name(\"Mandriva Update for krb5 MDVSA-2010:246 (krb5)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of krb5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"krb5\", rpm:\"krb5~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-pkinit-openssl\", rpm:\"krb5-pkinit-openssl~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server\", rpm:\"krb5-server~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server-ldap\", rpm:\"krb5-server-ldap~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-workstation\", rpm:\"krb5-workstation~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53\", rpm:\"libkrb53~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53-devel\", rpm:\"libkrb53-devel~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53\", rpm:\"lib64krb53~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53-devel\", rpm:\"lib64krb53-devel~1.8.1~0.3mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"krb5\", rpm:\"krb5~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-pkinit-openssl\", rpm:\"krb5-pkinit-openssl~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server\", rpm:\"krb5-server~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-server-ldap\", rpm:\"krb5-server-ldap~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"krb5-workstation\", rpm:\"krb5-workstation~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53\", rpm:\"libkrb53~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libkrb53-devel\", rpm:\"libkrb53-devel~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53\", rpm:\"lib64krb53~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64krb53-devel\", rpm:\"lib64krb53-devel~1.8.1~5.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-02T10:54:48", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1030-1", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for krb5 vulnerabilities USN-1030-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-4021", "CVE-2010-1323"], "modified": "2017-12-22T00:00:00", "id": "OPENVAS:1361412562310840547", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840547", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1030_1.nasl 8228 2017-12-22 07:29:52Z teissa $\n#\n# Ubuntu Update for krb5 vulnerabilities USN-1030-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that Kerberos did not properly determine the\n acceptability of certain checksums. A remote attacker could use certain\n checksums to alter the prompt message, modify a response to a Key\n Distribution Center (KDC) or forge a KRB-SAFE message. (CVE-2010-1323)\n\n It was discovered that Kerberos did not properly determine the\n acceptability of certain checksums. A remote attacker could use certain\n checksums to forge GSS tokens or gain privileges. This issue only affected\n Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2010-1324)\n \n It was discovered that Kerberos did not reject RC4 key-derivation\n checksums. An authenticated remote user could use this issue to forge\n AD-SIGNEDPATH or AD-KDC-ISSUED signatures and possibly gain privileges.\n This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2010-4020)\n \n It was discovered that Kerberos did not properly restrict the use of TGT\n credentials for armoring TGS requests. A remote authenticated user could\n use this flaw to impersonate a client. This issue only affected Ubuntu\n 9.10. (CVE-2010-4021)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1030-1\";\ntag_affected = \"krb5 vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 8.04 LTS ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1030-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840547\");\n script_version(\"$Revision: 8228 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-22 08:29:52 +0100 (Fri, 22 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"USN\", value: \"1030-1\");\n script_cve_id(\"CVE-2010-1323\", \"CVE-2010-1324\", \"CVE-2010-4020\", \"CVE-2010-4021\");\n script_name(\"Ubuntu Update for krb5 vulnerabilities USN-1030-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssapi-krb5-2\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssrpc4\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libk5crypto3\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5clnt6\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5srv6\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkdb5-4\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-3\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5support0\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-clients\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-ftpd\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc-ldap\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-rsh-server\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-telnetd\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.7dfsg~beta3-1ubuntu0.7\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libkadm55\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb53\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-clients\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-ftpd\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-rsh-server\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-telnetd\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.4.3-5ubuntu0.12\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-multidev\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssapi-krb5-2\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssrpc4\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libk5crypto3\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5clnt-mit7\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5srv-mit7\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkdb5-4\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-3\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5support0\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc-ldap\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.8.1+dfsg-2ubuntu0.4\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm55\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb53\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-clients\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-ftpd\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-rsh-server\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-telnetd\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.6.dfsg.3~beta1-2ubuntu1.6\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"krb5-multidev\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-user\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssapi-krb5-2\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libgssrpc4\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libk5crypto3\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5clnt-mit7\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkadm5srv-mit7\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkdb5-4\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-3\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dbg\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5-dev\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libkrb5support0\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-admin-server\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc-ldap\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-kdc\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-pkinit\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"krb5-doc\", ver:\"1.8.1+dfsg-5ubuntu0.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:39:05", "description": "The remote host is missing an update as announced\nvia advisory SSA:2010-357-01.", "cvss3": {}, "published": "2012-09-11T00:00:00", "type": "openvas", "title": "Slackware Advisory SSA:2010-357-01 php", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3436", "CVE-2010-3709", "CVE-2010-4150"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:136141256231068802", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231068802", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2010_357_01.nasl 14202 2019-03-15 09:16:15Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.68802\");\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 10:16:15 +0100 (Fri, 15 Mar 2019) $\");\n script_cve_id(\"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-4150\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_version(\"$Revision: 14202 $\");\n script_name(\"Slackware Advisory SSA:2010-357-01 php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\", re:\"ssh/login/release=SLK(11\\.0|12\\.0|12\\.1|12\\.2|13\\.0|13\\.1)\");\n\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2010-357-01\");\n\n script_tag(name:\"insight\", value:\"New php packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0,\n13.1, and -current to fix security issues.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to the new package(s).\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update as announced\nvia advisory SSA:2010-357-01.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-slack.inc\");\n\nreport = \"\";\nres = \"\";\n\nif((res = isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack11.0\", rls:\"SLK11.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack12.0\", rls:\"SLK12.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack12.1\", rls:\"SLK12.1\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack12.2\", rls:\"SLK12.2\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack13.0\", rls:\"SLK13.0\")) != NULL) {\n report += res;\n}\nif((res = isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack13.1\", rls:\"SLK13.1\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-12-04T11:18:04", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1031-1", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for clamav vulnerabilities USN-1031-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840546", "href": "http://plugins.openvas.org/nasl.php?oid=840546", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1031_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for clamav vulnerabilities USN-1031-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Arkadiusz Miskiewicz and others discovered that the PDF processing\n code in libclamav improperly validated input. This could allow a\n remote attacker to craft a PDF document that could crash clamav or\n possibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\n It was discovered that an off-by-one error in the icon_cb function\n in pe_icons.c in libclamav could allow an attacker to corrupt\n memory, causing clamav to crash or possibly execute arbitrary code.\n (CVE-2010-4261)\n \n In the default installation, attackers would be isolated by the\n clamav AppArmor profile.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1031-1\";\ntag_affected = \"clamav vulnerabilities on Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1031-1/\");\n script_id(840546);\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"1031-1\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_name(\"Ubuntu Update for clamav vulnerabilities USN-1031-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-19T15:05:00", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1031-1", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for clamav vulnerabilities USN-1031-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2018-01-18T00:00:00", "id": "OPENVAS:1361412562310840546", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840546", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1031_1.nasl 8457 2018-01-18 07:58:32Z teissa $\n#\n# Ubuntu Update for clamav vulnerabilities USN-1031-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Arkadiusz Miskiewicz and others discovered that the PDF processing\n code in libclamav improperly validated input. This could allow a\n remote attacker to craft a PDF document that could crash clamav or\n possibly execute arbitrary code. (CVE-2010-4260, CVE-2010-4479)\n\n It was discovered that an off-by-one error in the icon_cb function\n in pe_icons.c in libclamav could allow an attacker to corrupt\n memory, causing clamav to crash or possibly execute arbitrary code.\n (CVE-2010-4261)\n \n In the default installation, attackers would be isolated by the\n clamav AppArmor profile.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1031-1\";\ntag_affected = \"clamav vulnerabilities on Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1031-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840546\");\n script_version(\"$Revision: 8457 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 08:58:32 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"1031-1\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\");\n script_name(\"Ubuntu Update for clamav vulnerabilities USN-1031-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"clamav-daemon\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-dbg\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-freshclam\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav-dev\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libclamav6\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-milter\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-base\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-docs\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"clamav-testfiles\", ver:\"0.96.3+dfsg-2ubuntu1.0.10.04.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:51:14", "description": "The remote host is missing an update as announced\nvia advisory SSA:2010-357-01.", "cvss3": {}, "published": "2012-09-11T00:00:00", "type": "openvas", "title": "Slackware Advisory SSA:2010-357-01 php ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3436", "CVE-2010-3709", "CVE-2010-4150"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:68802", "href": "http://plugins.openvas.org/nasl.php?oid=68802", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: esoft_slk_ssa_2010_357_01.nasl 6598 2017-07-07 09:36:44Z cfischer $\n# Description: Auto-generated from the corresponding slackware advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"New php packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0,\n13.1, and -current to fix security issues.\";\ntag_summary = \"The remote host is missing an update as announced\nvia advisory SSA:2010-357-01.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2010-357-01\";\n \nif(description)\n{\n script_id(68802);\n script_tag(name:\"creation_date\", value:\"2012-09-11 01:34:21 +0200 (Tue, 11 Sep 2012)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:36:44 +0200 (Fri, 07 Jul 2017) $\");\n script_cve_id(\"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-4150\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_version(\"$Revision: 6598 $\");\n script_name(\"Slackware Advisory SSA:2010-357-01 php \");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Slackware Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/slackware_linux\", \"ssh/login/slackpack\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-slack.inc\");\nvuln = 0;\nif(isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack11.0\", rls:\"SLK11.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack12.0\", rls:\"SLK12.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack12.1\", rls:\"SLK12.1\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack12.2\", rls:\"SLK12.2\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack13.0\", rls:\"SLK13.0\")) {\n vuln = 1;\n}\nif(isslkpkgvuln(pkg:\"php\", ver:\"5.2.16-i486-1_slack13.1\", rls:\"SLK13.1\")) {\n vuln = 1;\n}\n\nif(vuln) {\n security_message(0);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-12-20T13:17:55", "description": "Check for the Version of clamav", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Mandriva Update for clamav MDVSA-2010:249 (clamav)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2017-12-19T00:00:00", "id": "OPENVAS:1361412562310831280", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831280", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for clamav MDVSA-2010:249 (clamav)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in clamav:\n\n Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV\n before 0.96.5 allow remote attackers to cause a denial of service\n (application crash) or possibly execute arbitrary code via a crafted\n PDF document (CVE-2010-4260, (CVE-2010-4479).\n \n Off-by-one error in the icon_cb function in pe_icons.c in libclamav\n in ClamAV before 0.96.5 allows remote attackers to cause a denial of\n service (memory corruption and application crash) or possibly execute\n arbitrary code via unspecified vectors. NOTE: some of these details\n are obtained from third party information (CVE-2010-4261).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated clamav packages have been upgraded to the 0.96.5 version\n that is not vulnerable to these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"clamav on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00006.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831280\");\n script_version(\"$Revision: 8168 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-19 08:30:15 +0100 (Tue, 19 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:249\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4479\", \"CVE-2010-4261\");\n script_name(\"Mandriva Update for clamav MDVSA-2010:249 (clamav)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-12T11:10:51", "description": "Check for the Version of clamav", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Mandriva Update for clamav MDVSA-2010:249 (clamav)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4261", "CVE-2010-4479", "CVE-2010-4260"], "modified": "2017-12-08T00:00:00", "id": "OPENVAS:831280", "href": "http://plugins.openvas.org/nasl.php?oid=831280", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for clamav MDVSA-2010:249 (clamav)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in clamav:\n\n Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV\n before 0.96.5 allow remote attackers to cause a denial of service\n (application crash) or possibly execute arbitrary code via a crafted\n PDF document (CVE-2010-4260, (CVE-2010-4479).\n \n Off-by-one error in the icon_cb function in pe_icons.c in libclamav\n in ClamAV before 0.96.5 allows remote attackers to cause a denial of\n service (memory corruption and application crash) or possibly execute\n arbitrary code via unspecified vectors. NOTE: some of these details\n are obtained from third party information (CVE-2010-4261).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated clamav packages have been upgraded to the 0.96.5 version\n that is not vulnerable to these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"clamav on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-12/msg00006.php\");\n script_id(831280);\n script_version(\"$Revision: 8037 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 07:32:03 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:249\");\n script_cve_id(\"CVE-2010-4260\", \"CVE-2010-4479\", \"CVE-2010-4261\");\n script_name(\"Mandriva Update for clamav MDVSA-2010:249 (clamav)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of clamav\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"clamav\", rpm:\"clamav~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-db\", rpm:\"clamav-db~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamav-milter\", rpm:\"clamav-milter~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"clamd\", rpm:\"clamd~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav6\", rpm:\"libclamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libclamav-devel\", rpm:\"libclamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav6\", rpm:\"lib64clamav6~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64clamav-devel\", rpm:\"lib64clamav-devel~0.96.5~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:55:51", "description": "The remote host is missing an update to php5\nannounced via advisory DSA 2195-1.", "cvss3": {}, "published": "2011-05-12T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2195-1 (php5)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-0441", "CVE-2010-3870", "CVE-2010-3709", "CVE-2010-3710", "CVE-2010-4150"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:69331", "href": "http://plugins.openvas.org/nasl.php?oid=69331", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2195_1.nasl 6613 2017-07-07 12:08:40Z cfischer $\n# Description: Auto-generated from advisory DSA 2195-1 (php5)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Stephane Chazelas discovered that the cronjob of the PHP 5 package in\nDebian suffers from a race condition which might be used to remove\narbitrary files from a system (CVE-2011-0441).\n\nWhen upgrading your php5-common package take special care to _accept_\nthe changes to the /etc/cron.d/php5 file. Ignoring them would leave the\nsystem vulnerable.\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 5.2.6.dfsg.1-1+lenny10.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 5.3.3-7+squeeze1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 5.3.6-1.\n\nAdditionally, the following vulnerabilities have also been fixed in the\noldstable distribution (lenny):\n\nCVE-2010-3709\n\nMaksymilian Arciemowicz discovered that the ZipArchive class\nmay dereference a NULL pointer when extracting comments from a zip\narchive, leading to application crash and possible denial of\nservice.\n\nCVE-2010-3710\n\nStefan Neufeind discovered that the FILTER_VALIDATE_EMAIL filter\ndoes not correctly handle long, to be validated, strings. Such\ncrafted strings may lead to denial of service because of high memory\nconsumption and application crash.\n\nCVE-2010-3870\n\nIt was discovered that PHP does not correctly handle certain UTF-8\nsequences and may be used to bypass XSS protections.\n\nCVE-2010-4150\n\nMateusz Kocielski discovered that the imap extension may try to\nfree already freed memory when processing user credentials, leading\nto application crash and possibly arbitrary code execution.\n\nWe recommend that you upgrade your php5 packages.\";\ntag_summary = \"The remote host is missing an update to php5\nannounced via advisory DSA 2195-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202195-1\";\n\n\nif(description)\n{\n script_id(69331);\n script_version(\"$Revision: 6613 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:08:40 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2011-0441\", \"CVE-2010-3709\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4150\");\n script_name(\"Debian Security Advisory DSA 2195-1 (php5)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libapache2-mod-php5\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-mod-php5filter\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php-pear\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-cgi\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-cli\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-common\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-curl\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-dbg\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-dev\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-gd\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-gmp\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-imap\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-interbase\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-ldap\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-mcrypt\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-mhash\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-mysql\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-odbc\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-pgsql\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-pspell\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-recode\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-snmp\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-sqlite\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-sybase\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-tidy\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-xmlrpc\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-xsl\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-mod-php5\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-mod-php5filter\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php-pear\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-cgi\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-cli\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-common\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-curl\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-dbg\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-dev\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-enchant\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-gd\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-gmp\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-imap\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-interbase\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-intl\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-ldap\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-mcrypt\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-mysql\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-odbc\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-pgsql\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-pspell\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-recode\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-snmp\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-sqlite\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-sybase\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-tidy\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-xmlrpc\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"php5-xsl\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-17T11:05:36", "description": "Check for the Version of krb5", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Fedora Update for krb5 FEDORA-2010-18409", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-1323"], "modified": "2018-01-16T00:00:00", "id": "OPENVAS:1361412562310862714", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862714", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for krb5 FEDORA-2010-18409\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"krb5 on Fedora 14\";\ntag_insight = \"Kerberos V5 is a trusted-third-party network authentication system,\n which can improve your network's security by eliminating the insecure\n practice of cleartext passwords.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862714\");\n script_version(\"$Revision: 8438 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-16 18:38:23 +0100 (Tue, 16 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2010-18409\");\n script_cve_id(\"CVE-2010-1323\", \"CVE-2010-1324\", \"CVE-2010-4020\");\n script_name(\"Fedora Update for krb5 FEDORA-2010-18409\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of krb5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"krb5\", rpm:\"krb5~1.8.2~7.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-12-20T13:18:11", "description": "Check for the Version of krb5", "cvss3": {}, "published": "2010-12-23T00:00:00", "type": "openvas", "title": "Fedora Update for krb5 FEDORA-2010-18409", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-1324", "CVE-2010-4020", "CVE-2010-1323"], "modified": "2017-12-19T00:00:00", "id": "OPENVAS:862714", "href": "http://plugins.openvas.org/nasl.php?oid=862714", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for krb5 FEDORA-2010-18409\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"krb5 on Fedora 14\";\ntag_insight = \"Kerberos V5 is a trusted-third-party network authentication system,\n which can improve your network's security by eliminating the insecure\n practice of cleartext passwords.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051976.html\");\n script_id(862714);\n script_version(\"$Revision: 8164 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-19 07:30:41 +0100 (Tue, 19 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-12-23 07:38:58 +0100 (Thu, 23 Dec 2010)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2010-18409\");\n script_cve_id(\"CVE-2010-1323\", \"CVE-2010-1324\", \"CVE-2010-4020\");\n script_name(\"Fedora Update for krb5 FEDORA-2010-18409\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of krb5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"krb5\", rpm:\"krb5~1.8.2~7.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:39:51", "description": "The remote host is missing an update to php5\nannounced via advisory DSA 2195-1.", "cvss3": {}, "published": "2011-05-12T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2195-1 (php5)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-0441", "CVE-2010-3870", "CVE-2010-3709", "CVE-2010-3710", "CVE-2010-4150"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:136141256231069331", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231069331", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2195_1.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Description: Auto-generated from advisory DSA 2195-1 (php5)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.69331\");\n script_version(\"$Revision: 14275 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-05-12 19:21:50 +0200 (Thu, 12 May 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2011-0441\", \"CVE-2010-3709\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4150\");\n script_name(\"Debian Security Advisory DSA 2195-1 (php5)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(5|6)\");\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202195-1\");\n script_tag(name:\"insight\", value:\"Stephane Chazelas discovered that the cronjob of the PHP 5 package in\nDebian suffers from a race condition which might be used to remove\narbitrary files from a system (CVE-2011-0441).\n\nWhen upgrading your php5-common package take special care to _accept_\nthe changes to the /etc/cron.d/php5 file. Ignoring them would leave the\nsystem vulnerable.\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 5.2.6.dfsg.1-1+lenny10.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 5.3.3-7+squeeze1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 5.3.6-1.\n\nAdditionally, the following vulnerabilities have also been fixed in the\noldstable distribution (lenny):\n\nCVE-2010-3709\n\nMaksymilian Arciemowicz discovered that the ZipArchive class\nmay dereference a NULL pointer when extracting comments from a zip\narchive, leading to application crash and possible denial of\nservice.\n\nCVE-2010-3710\n\nStefan Neufeind discovered that the FILTER_VALIDATE_EMAIL filter\ndoes not correctly handle long, to be validated, strings. Such\ncrafted strings may lead to denial of service because of high memory\nconsumption and application crash.\n\nCVE-2010-3870\n\nIt was discovered that PHP does not correctly handle certain UTF-8\nsequences and may be used to bypass XSS protections.\n\nCVE-2010-4150\n\nMateusz Kocielski discovered that the imap extension may try to\nfree already freed memory when processing user credentials, leading\nto application crash and possibly arbitrary code execution.\");\n\n script_tag(name:\"solution\", value:\"We recommend that you upgrade your php5 packages.\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update to php5\nannounced via advisory DSA 2195-1.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libapache2-mod-php5\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapache2-mod-php5filter\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php-pear\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-cgi\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-cli\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-common\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-curl\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-dbg\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-dev\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-gd\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-gmp\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-imap\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-interbase\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-ldap\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-mcrypt\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-mhash\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-mysql\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-odbc\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-pgsql\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-pspell\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-recode\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-snmp\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-sqlite\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-sybase\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-tidy\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-xmlrpc\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-xsl\", ver:\"5.2.6.dfsg.1-1+lenny10\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapache2-mod-php5\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapache2-mod-php5filter\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php-pear\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-cgi\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-cli\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-common\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-curl\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-dbg\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-dev\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-enchant\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-gd\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-gmp\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-imap\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-interbase\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-intl\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-ldap\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-mcrypt\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-mysql\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-odbc\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-pgsql\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-pspell\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-recode\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-snmp\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-sqlite\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-sybase\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-tidy\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-xmlrpc\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"php5-xsl\", ver:\"5.3.3-7+squeeze1\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-12-21T11:32:37", "description": "Check for the Version of php", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Mandriva Update for php MDVSA-2010:218 (php)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3436", "CVE-2010-3709", "CVE-2010-3710"], "modified": "2017-12-21T00:00:00", "id": "OPENVAS:831227", "href": "http://plugins.openvas.org/nasl.php?oid=831227", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for php MDVSA-2010:218 (php)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in php:\n\n Stack consumption vulnerability in the filter_var function in PHP 5.2.x\n through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL\n mode is used, allows remote attackers to cause a denial of service\n (memory consumption and application crash) via a long e-mail address\n string (CVE-2010-3710).\n \n A NULL pointer dereference was discovered in\n ZipArchive::getArchiveComment (CVE-2010-3709).\n \n A possible flaw was discovered in open_basedir (CVE-2010-3436).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated packages have been patched to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"php on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-10/msg00044.php\");\n script_id(831227);\n script_version(\"$Revision: 8205 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-21 07:30:37 +0100 (Thu, 21 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"MDVSA\", value: \"2010:218\");\n script_cve_id(\"CVE-2010-3710\", \"CVE-2010-3709\", \"CVE-2010-3436\");\n script_name(\"Mandriva Update for php MDVSA-2010:218 (php)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dbase\", rpm:\"php-dbase~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fcgi\", rpm:\"php-fcgi~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mhash\", rpm:\"php-mhash~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mime_magic\", rpm:\"php-mime_magic~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ming\", rpm:\"php-ming~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ncurses\", rpm:\"php-ncurses~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite\", rpm:\"php-sqlite~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase\", rpm:\"php-sybase~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dbase\", rpm:\"php-dbase~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fcgi\", rpm:\"php-fcgi~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mhash\", rpm:\"php-mhash~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mime_magic\", rpm:\"php-mime_magic~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ming\", rpm:\"php-ming~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ncurses\", rpm:\"php-ncurses~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite\", rpm:\"php-sqlite~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase\", rpm:\"php-sybase~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dbase\", rpm:\"php-dbase~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fcgi\", rpm:\"php-fcgi~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mhash\", rpm:\"php-mhash~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mime_magic\", rpm:\"php-mime_magic~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ming\", rpm:\"php-ming~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ncurses\", rpm:\"php-ncurses~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite\", rpm:\"php-sqlite~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase\", rpm:\"php-sybase~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-19T15:04:43", "description": "Check for the Version of php", "cvss3": {}, "published": "2010-11-16T00:00:00", "type": "openvas", "title": "Mandriva Update for php MDVSA-2010:218 (php)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3436", "CVE-2010-3709", "CVE-2010-3710"], "modified": "2018-01-18T00:00:00", "id": "OPENVAS:1361412562310831227", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831227", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for php MDVSA-2010:218 (php)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were discovered and corrected in php:\n\n Stack consumption vulnerability in the filter_var function in PHP 5.2.x\n through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL\n mode is used, allows remote attackers to cause a denial of service\n (memory consumption and application crash) via a long e-mail address\n string (CVE-2010-3710).\n \n A NULL pointer dereference was discovered in\n ZipArchive::getArchiveComment (CVE-2010-3709).\n \n A possible flaw was discovered in open_basedir (CVE-2010-3436).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&products_id=490\n \n The updated packages have been patched to correct these issues.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"php on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-10/msg00044.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831227\");\n script_version(\"$Revision: 8457 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 08:58:32 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-11-16 14:49:48 +0100 (Tue, 16 Nov 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"MDVSA\", value: \"2010:218\");\n script_cve_id(\"CVE-2010-3710\", \"CVE-2010-3709\", \"CVE-2010-3436\");\n script_name(\"Mandriva Update for php MDVSA-2010:218 (php)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of php\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dbase\", rpm:\"php-dbase~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fcgi\", rpm:\"php-fcgi~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mhash\", rpm:\"php-mhash~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mime_magic\", rpm:\"php-mime_magic~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ming\", rpm:\"php-ming~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ncurses\", rpm:\"php-ncurses~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite\", rpm:\"php-sqlite~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase\", rpm:\"php-sybase~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.2.14~0.2mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.3~0.2mdv2010.1\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-doc\", rpm:\"php-doc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-enchant\", rpm:\"php-enchant~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fileinfo\", rpm:\"php-fileinfo~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fpm\", rpm:\"php-fpm~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-intl\", rpm:\"php-intl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite3\", rpm:\"php-sqlite3~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase_ct\", rpm:\"php-sybase_ct~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.3.3~0.2mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dbase\", rpm:\"php-dbase~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fcgi\", rpm:\"php-fcgi~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mhash\", rpm:\"php-mhash~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mime_magic\", rpm:\"php-mime_magic~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ming\", rpm:\"php-ming~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ncurses\", rpm:\"php-ncurses~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite\", rpm:\"php-sqlite~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase\", rpm:\"php-sybase~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.2.14~0.2mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libphp5_common5\", rpm:\"libphp5_common5~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bcmath\", rpm:\"php-bcmath~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-bz2\", rpm:\"php-bz2~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-calendar\", rpm:\"php-calendar~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cgi\", rpm:\"php-cgi~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-cli\", rpm:\"php-cli~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ctype\", rpm:\"php-ctype~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-curl\", rpm:\"php-curl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dba\", rpm:\"php-dba~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dbase\", rpm:\"php-dbase~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-devel\", rpm:\"php-devel~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-dom\", rpm:\"php-dom~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-exif\", rpm:\"php-exif~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-fcgi\", rpm:\"php-fcgi~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-filter\", rpm:\"php-filter~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ftp\", rpm:\"php-ftp~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gd\", rpm:\"php-gd~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gettext\", rpm:\"php-gettext~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-gmp\", rpm:\"php-gmp~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-hash\", rpm:\"php-hash~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-iconv\", rpm:\"php-iconv~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-imap\", rpm:\"php-imap~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-json\", rpm:\"php-json~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ldap\", rpm:\"php-ldap~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mbstring\", rpm:\"php-mbstring~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mcrypt\", rpm:\"php-mcrypt~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mhash\", rpm:\"php-mhash~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mime_magic\", rpm:\"php-mime_magic~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ming\", rpm:\"php-ming~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mssql\", rpm:\"php-mssql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysql\", rpm:\"php-mysql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-mysqli\", rpm:\"php-mysqli~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-ncurses\", rpm:\"php-ncurses~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-odbc\", rpm:\"php-odbc~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-openssl\", rpm:\"php-openssl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pcntl\", rpm:\"php-pcntl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo\", rpm:\"php-pdo~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_dblib\", rpm:\"php-pdo_dblib~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_mysql\", rpm:\"php-pdo_mysql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_odbc\", rpm:\"php-pdo_odbc~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_pgsql\", rpm:\"php-pdo_pgsql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pdo_sqlite\", rpm:\"php-pdo_sqlite~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pgsql\", rpm:\"php-pgsql~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-posix\", rpm:\"php-posix~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-pspell\", rpm:\"php-pspell~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-readline\", rpm:\"php-readline~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-recode\", rpm:\"php-recode~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-session\", rpm:\"php-session~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-shmop\", rpm:\"php-shmop~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-snmp\", rpm:\"php-snmp~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-soap\", rpm:\"php-soap~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sockets\", rpm:\"php-sockets~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sqlite\", rpm:\"php-sqlite~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sybase\", rpm:\"php-sybase~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvmsg\", rpm:\"php-sysvmsg~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvsem\", rpm:\"php-sysvsem~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-sysvshm\", rpm:\"php-sysvshm~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tidy\", rpm:\"php-tidy~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-tokenizer\", rpm:\"php-tokenizer~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-wddx\", rpm:\"php-wddx~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xml\", rpm:\"php-xml~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlreader\", rpm:\"php-xmlreader~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlrpc\", rpm:\"php-xmlrpc~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xmlwriter\", rpm:\"php-xmlwriter~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-xsl\", rpm:\"php-xsl~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zip\", rpm:\"php-zip~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php-zlib\", rpm:\"php-zlib~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"php\", rpm:\"php~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64php5_common5\", rpm:\"lib64php5_common5~5.2.14~0.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-24T12:51:05", "description": "The remote host is missing updates announced in\nadvisory GLSA 201110-20.", "cvss3": {}, "published": "2012-02-12T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201110-20 (Clam AntiVirus)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3627", "CVE-2011-2721", "CVE-2010-4261", "CVE-2011-1003", "CVE-2010-0405", "CVE-2010-4479", "CVE-2010-4260", "CVE-2010-3434"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:70783", "href": "http://plugins.openvas.org/nasl.php?oid=70783", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities were found in Clam AntiVirus, the most\n severe of which may allow the execution of arbitrary code.\";\ntag_solution = \"All Clam AntiVirus users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.97.3'\n \n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201110-20\nhttp://bugs.gentoo.org/show_bug.cgi?id=338226\nhttp://bugs.gentoo.org/show_bug.cgi?id=347627\nhttp://bugs.gentoo.org/show_bug.cgi?id=354019\nhttp://bugs.gentoo.org/show_bug.cgi?id=378815\nhttp://bugs.gentoo.org/show_bug.cgi?id=387521\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201110-20.\";\n\n \n \nif(description)\n{\n script_id(70783);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2010-0405\", \"CVE-2010-3434\", \"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\", \"CVE-2011-1003\", \"CVE-2011-2721\", \"CVE-2011-3627\");\n script_version(\"$Revision: 6593 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:18:14 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:40 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201110-20 (Clam AntiVirus)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"app-antivirus/clamav\", unaffected: make_list(\"ge 0.97.3\"), vulnerable: make_list(\"lt 0.97.3\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:59", "description": "The remote host is missing updates announced in\nadvisory GLSA 201110-20.", "cvss3": {}, "published": "2012-02-12T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201110-20 (Clam AntiVirus)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3627", "CVE-2011-2721", "CVE-2010-4261", "CVE-2011-1003", "CVE-2010-0405", "CVE-2010-4479", "CVE-2010-4260", "CVE-2010-3434"], "modified": "2018-10-12T00:00:00", "id": "OPENVAS:136141256231070783", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070783", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201110_20.nasl 11859 2018-10-12 08:53:01Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70783\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2010-0405\", \"CVE-2010-3434\", \"CVE-2010-4260\", \"CVE-2010-4261\", \"CVE-2010-4479\", \"CVE-2011-1003\", \"CVE-2011-2721\", \"CVE-2011-3627\");\n script_version(\"$Revision: 11859 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 10:53:01 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:40 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201110-20 (Clam AntiVirus)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities were found in Clam AntiVirus, the most\n severe of which may allow the execution of arbitrary code.\");\n script_tag(name:\"solution\", value:\"All Clam AntiVirus users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-antivirus/clamav-0.97.3'\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201110-20\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=338226\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=347627\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=354019\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=378815\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=387521\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201110-20.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"app-antivirus/clamav\", unaffected: make_list(\"ge 0.97.3\"), vulnerable: make_list(\"lt 0.97.3\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-09-23T15:15:20", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1042-1", "cvss3": {}, "published": "2011-01-14T00:00:00", "type": "openvas", "title": "Ubuntu Update for php5 vulnerabilities USN-1042-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4645", "CVE-2010-3436", "CVE-2010-3870", "CVE-2010-3709", "CVE-2009-5016", "CVE-2010-4156", "CVE-2010-3710", "CVE-2010-4409"], "modified": "2019-09-16T00:00:00", "id": "OPENVAS:1361412562310840564", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840564", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for php5 vulnerabilities USN-1042-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1042-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840564\");\n script_version(\"2019-09-16T06:54:58+0000\");\n script_tag(name:\"last_modification\", value:\"2019-09-16 06:54:58 +0000 (Mon, 16 Sep 2019)\");\n script_tag(name:\"creation_date\", value:\"2011-01-14 16:07:43 +0100 (Fri, 14 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"USN\", value:\"1042-1\");\n script_cve_id(\"CVE-2009-5016\", \"CVE-2010-3436\", \"CVE-2010-3709\", \"CVE-2010-3710\", \"CVE-2010-3870\", \"CVE-2010-4156\", \"CVE-2010-4409\", \"CVE-2010-4645\");\n script_name(\"Ubuntu Update for php5 vulnerabilities USN-1042-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(9\\.10|6\\.06 LTS|10\\.04 LTS|8\\.04 LTS|10\\.10)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1042-1\");\n script_tag(name:\"affected\", value:\"php5 vulnerabilities on Ubuntu 6.06 LTS,\n Ubuntu 8.04 LTS,\n Ubuntu 9.10,\n Ubuntu 10.04 LTS,\n Ubuntu 10.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"It was discover