⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_956_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 956-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(56209); script_bugtraq_id(16357); script_cve_id("CVE-2006-0353"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 956-1 (lsh-utils)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to lsh-utilsannounced via advisory DSA 956-1.Stefan Pfetzing discovered that lshd, a Secure Shell v2 (SSH2)protocol server, leaks a couple of file descriptors, related to therandomness generator, to user shells which are started by lshd.  Alocal attacker can truncate the server's seed file, which may preventthe server from starting, and with some more effort, maybe also cracksession keys.After applying this update, you should remove the server's seed file(/var/spool/lsh/yarrow-seed-file) and then regenerate it withlsh-make-seed --server as root.For security reasons, lsh-make-seed really needs to be run from theconsole of the system you are running it on.  If you run lsh-make-seedusing a remote shell, the timing information lsh-make-seed uses forits random seed creation is likely to be screwed.  If need be, you cangenerate the random seed on a different system than that which it willeventually be on, by installing the lsh-utils package and runninglsh-make-seed -o my-other-server-seed-file.  You may then transferthe seed to the destination system as using a secure connection.The old stable distribution (woody) may not be affected by this problem.For the stable distribution (sarge) this problem has been fixed inversion 2.0.1-3sarge1.For the unstable distribution (sid) this problem has been fixed inversion 2.0.1cdbs-4.We recommend that you upgrade your lsh-server package.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20956-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 956-1 (lsh-utils)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2006 E-Soft Inc. http://www.securiytspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"lsh-utils-doc", ver:"2.0.1-3sarge1", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"lsh-client", ver:"2.0.1-3sarge1", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"lsh-server", ver:"2.0.1-3sarge1", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"lsh-utils", ver:"2.0.1-3sarge1", rls:"DEB3.1")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -