⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_297_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 297-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53725); script_cve_id("CVE-2003-0033", "CVE-2003-0209"); script_bugtraq_id(7178,6963); script_version ("$"); name["english"] = "Debian Security Advisory DSA 297-1 (snort)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to snortannounced via advisory DSA 297-1.Two vulnerabilities have been discoverd in Snort, a popular networkintrusion detection system.  Snort comes with modules and plugins thatperform a variety of functions such as protocol analysis.  Thefollowing issues have been identified:Heap overflow in Snort stream4 preprocessor(VU#139129, CVE-2003-0209, Bugtraq Id 7178)Researchers at CORE Security Technologies have discovered aremotely exploitable inteter overflow that results in overwritingthe heap in the stream4 preprocessor module.  This module allowsSnort to reassemble TCP packet fragments for further analysis.  Anattacker could insert arbitrary code that would be executed asthe user running Snort, probably root.Buffer overflow in Snort RPC preprocessor(VU#916785, CVE-2003-0033, Bugtraq Id 6963)Researchers at Internet Security Systems X-Force have discovered aremotely exploitable buffer overflow in the Snort RPC preprocessormodule.  Snort incorrectly checks the lengths of what is beingnormalized against the current packet size.  An attacker couldexploit this to execute arbitrary code under the privileges of theSnort process, probably root.For the stable distribution (woody) these problems have been fixed inversion 1.8.4beta1-3.1.The old stable distribution (potato) is not affected by these problemssince it doesn't contain the problematic code.For the unstable distribution (sid) these problems have been fixed inversion 2.0.0-1.We recommend that you upgrade your snort package immediately.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20297-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 297-1 (snort)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"snort-doc", ver:"1.8.4beta1-3.1", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"snort-rules-default", ver:"1.8.4beta1-3.1", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"snort", ver:"1.8.4beta1-3.1", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"snort-common", ver:"1.8.4beta1-3.1", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"snort-mysql", ver:"1.8.4beta1-3.1", rls:"DEB3.0")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -