File: debian_DSA-627.nasl

package info (click to toggle)
nessus-plugins 2.2.8-1.1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 15,508 kB
  • ctags: 251
  • sloc: sh: 8,346; ansic: 4,452; pascal: 3,089; perl: 704; makefile: 172; php: 1
file content (73 lines) | stat: -rw-r--r-- 3,202 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
# This script was automatically generated from the dsa-627
# Debian Security Advisory
# It is released under the Nessus Script Licence.
# Advisory is copyright 1997-2004 Software in the Public Interest, Inc.
# See http://www.debian.org/license
# DSA2nasl Convertor is copyright 2004 Michel Arboi

if (! defined_func('bn_random')) exit(0);

desc = '
A cross-site scripting vulnerability has been discovered in namazu2, a
full text search engine.  An attacker could prepare specially crafted
input that would not be sanitised by namazu2 and hence displayed
verbatim for the victim.
For the stable distribution (woody) this problem has been fixed in
version 2.0.10-1woody3.
For the unstable distribution (sid) this problem has been fixed in
version 2.0.14-1.
We recommend that you upgrade your namazu2 package.


Solution : http://www.debian.org/security/2005/dsa-627
Risk factor : High';

if (description) {
 script_id(16105);
 script_version("$Revision: 1.4 $");
 script_xref(name: "DSA", value: "627");
 script_cve_id("CVE-2004-1318");

 script_description(english: desc);
 script_copyright(english: "This script is (C) 2005 Michel Arboi <mikhail@nessus.org>");
 script_name(english: "[DSA627] DSA-627-1 namazu2");
 script_category(ACT_GATHER_INFO);
 script_family(english: "Debian Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/Debian/dpkg-l");
 script_summary(english: "DSA-627-1 namazu2");
 exit(0);
}

include("debian_package.inc");

w = 0;
if (deb_check(prefix: 'libnmz3', release: '3.0', reference: '2.0.10-1woody3')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package libnmz3 is vulnerable in Debian 3.0.\nUpgrade to libnmz3_2.0.10-1woody3\n');
}
if (deb_check(prefix: 'libnmz3-dev', release: '3.0', reference: '2.0.10-1woody3')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package libnmz3-dev is vulnerable in Debian 3.0.\nUpgrade to libnmz3-dev_2.0.10-1woody3\n');
}
if (deb_check(prefix: 'namazu2', release: '3.0', reference: '2.0.10-1woody3')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package namazu2 is vulnerable in Debian 3.0.\nUpgrade to namazu2_2.0.10-1woody3\n');
}
if (deb_check(prefix: 'namazu2-common', release: '3.0', reference: '2.0.10-1woody3')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package namazu2-common is vulnerable in Debian 3.0.\nUpgrade to namazu2-common_2.0.10-1woody3\n');
}
if (deb_check(prefix: 'namazu2-index-tools', release: '3.0', reference: '2.0.10-1woody3')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package namazu2-index-tools is vulnerable in Debian 3.0.\nUpgrade to namazu2-index-tools_2.0.10-1woody3\n');
}
if (deb_check(prefix: 'namazu2', release: '3.1', reference: '2.0.14-1')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package namazu2 is vulnerable in Debian 3.1.\nUpgrade to namazu2_2.0.14-1\n');
}
if (deb_check(prefix: 'namazu2', release: '3.0', reference: '2.0.10-1woody3')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package namazu2 is vulnerable in Debian woody.\nUpgrade to namazu2_2.0.10-1woody3\n');
}
if (w) { security_hole(port: 0, data: desc); }