File: debian_DSA-694.nasl

package info (click to toggle)
nessus-plugins 2.2.8-1.1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 15,508 kB
  • ctags: 251
  • sloc: sh: 8,346; ansic: 4,452; pascal: 3,089; perl: 704; makefile: 172; php: 1
file content (62 lines) | stat: -rw-r--r-- 2,522 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
# This script was automatically generated from the dsa-694
# Debian Security Advisory
# It is released under the Nessus Script Licence.
# Advisory is copyright 1997-2004 Software in the Public Interest, Inc.
# See http://www.debian.org/license
# DSA2nasl Convertor is copyright 2004 Michel Arboi

if (! defined_func('bn_random')) exit(0);

desc = '
Several vulnerabilities have been discovered in xloadimage, an image
viewer for X11.  The Common Vulnerabilities and Exposures project
identifies the following problems:
    Tavis Ormandy of the Gentoo Linux Security Audit Team has reported
    a flaw in the handling of compressed images, where shell
    meta-characters are not adequately escaped.
    Insufficient validation of image properties have been
    discovered which could potentially result in buffer management
    errors.
For the stable distribution (woody) these problems have been fixed in
version 4.1-10woody1.
For the unstable distribution (sid) these problems have been fixed in
version 4.1-14.2.
We recommend that you upgrade your xloadimage package.


Solution : http://www.debian.org/security/2005/dsa-694
Risk factor : High';

if (description) {
 script_id(17577);
 script_version("$Revision: 1.4 $");
 script_xref(name: "DSA", value: "694");
 script_cve_id("CVE-2005-0638", "CVE-2005-0639");

 script_description(english: desc);
 script_copyright(english: "This script is (C) 2005 Michel Arboi <mikhail@nessus.org>");
 script_name(english: "[DSA694] DSA-694-1 xloadimage");
 script_category(ACT_GATHER_INFO);
 script_family(english: "Debian Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/Debian/dpkg-l");
 script_summary(english: "DSA-694-1 xloadimage");
 exit(0);
}

include("debian_package.inc");

w = 0;
if (deb_check(prefix: 'xloadimage', release: '3.0', reference: '4.1-10woody1')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package xloadimage is vulnerable in Debian 3.0.\nUpgrade to xloadimage_4.1-10woody1\n');
}
if (deb_check(prefix: 'xloadimage', release: '3.1', reference: '4.1-14.2')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package xloadimage is vulnerable in Debian 3.1.\nUpgrade to xloadimage_4.1-14.2\n');
}
if (deb_check(prefix: 'xloadimage', release: '3.0', reference: '4.1-10woody1')) {
 w ++;
 if (report_verbosity > 0) desc = strcat(desc, '\nThe package xloadimage is vulnerable in Debian woody.\nUpgrade to xloadimage_4.1-10woody1\n');
}
if (w) { security_hole(port: 0, data: desc); }