⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_1185_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1185-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(57478); script_cve_id("CVE-2006-2940", "CVE-2006-3738", "CVE-2006-4343", "CVE-2006-2937"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 1185-1 (openssl)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to opensslannounced via advisory DSA 1185-1.Multiple vulnerabilities have been discovered in the OpenSSLcryptographic software package that could allow an attacker to launcha denial of service attack by exhausting system resources or crashingprocesses on a victim's computer.CVE-2006-2937Dr S N Henson of the OpenSSL core team and Open NetworkSecurity recently developed an ASN1 test suite for NISCC(www.niscc.gov.uk). When the test suite was run againstOpenSSL two denial of service vulnerabilities were discovered.During the parsing of certain invalid ASN1 structures an errorcondition is mishandled. This can result in an infinite loopwhich consumes system memory.Any code which uses OpenSSL to parse ASN1 data from untrustedsources is affected. This includes SSL servers which enableclient authentication and S/MIME applications.CVE-2006-3738Tavis Ormandy and Will Drewry of the Google Security Teamdiscovered a buffer overflow in SSL_get_shared_ciphers utilityfunction, used by some applications such as exim and mysql.  Anattacker could send a list of ciphers that would overrun abuffer.CVE-2006-4343Tavis Ormandy and Will Drewry of the Google Security Teamdiscovered a possible DoS in the sslv2 client code.  Where aclient application uses OpenSSL to make a SSLv2 connection toa malicious server that server could cause the client tocrash.CVE-2006-2940Dr S N Henson of the OpenSSL core team and Open NetworkSecurity recently developed an ASN1 test suite for NISCC(www.niscc.gov.uk). When the test suite was run againstOpenSSL a DoS was discovered.Certain types of public key can take disproportionate amountsof time to process. This could be used by an attacker in adenial of service attack.For the stable distribution (sarge) these problems have been fixed inversion 0.9.7e-3sarge3.For the unstable and testing distributions (sid and etch,respectively), these problems will be fixed in version 0.9.7k-2 of theopenssl097 compatibility libraries, and version 0.9.8c-2 of theopenssl package.We recommend that you upgrade your openssl package.  Note thatSolution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201185-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1185-1 (openssl)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2006 E-Soft Inc. http://www.securiytspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"libssl-dev", ver:"0.9.7e-3sarge3", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"libssl0.9.7", ver:"0.9.7e-3sarge3", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"openssl", ver:"0.9.7e-3sarge3", rls:"DEB3.1")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -