📄 deb_124_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 124-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53399); script_version ("$"); name["english"] = "Debian Security Advisory DSA 124-1 (mtr)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to mtrannounced via advisory DSA 124-1.The authors of mtr released a new upstream version, noting anon-exploitable buffer overflow in their ChangeLog. PrzemyslawFrasunek, however, found an easy way to exploit this bug, which allowsan attacker to gain access to the raw socket, which makes IP spoofingand other malicious network activity possible.The problem has been fixed by the Debian maintainer in version 0.41-6for the stable distribution of Debian by backporting the upstream fixand in version 0.48-1 for the testing/unstable distribution.We recommend that you upgrade your mtr package immediately.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20124-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 124-1 (mtr)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"mtr", ver:"0.41-6", rls:"DEB2.2")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -