deb_146_2.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 99 行
NASL
99 行
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 146-2## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53408); script_bugtraq_id(5356); script_cve_id("CVE-2002-0391"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 146-2 (dietlibc)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to dietlibcannounced via advisory DSA 146-2.The upstream author of dietlibc, Felix von Leitner, discovered apotential division by zero chance in the fwrite and calloc integeroverflow checks, which are fixed in the version below.The new version includes fixes from DSA 146-1. For completness weenclose the text of the other advisory:An integer overflow bug has been discovered in the RPC libraryused by dietlibc, a libc optimized for small size, which isderived from the SunRPC library. This bug could be exploited togain unauthorized root access to software linking to this code.The packages below also fix integer overflows in the calloc, freadand fwrite code. They are also more strict regarding hostile DNSpackets that could lead to a vulnerability otherwise.This problem has been fixed in version 0.12-2.4 for the current stabledistribution (woody) and in version 0.20-0cvs20020808 for the unstabledistribution (sid). Debian 2.2 (potato) is not affected since itdoesn't contain dietlibc packages.We recommend that you upgrade your dietlibc packages immediately.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20146-2Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 146-2 (dietlibc)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"dietlibc-doc", ver:"0.12-2.4", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"dietlibc-dev", ver:"0.12-2.4", rls:"DEB3.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?