CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
96.5%
Fix several security updates in xpdf (3.02pl3 patch applied).
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2009-3794.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(36210);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183");
script_bugtraq_id(34568);
script_xref(name:"FEDORA", value:"2009-3794");
script_name(english:"Fedora 9 : xpdf-3.02-13.fc9 (2009-3794)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Fix several security updates in xpdf (3.02pl3 patch applied).
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=490612"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=490614"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=490625"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495886"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495887"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495889"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495892"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495894"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495896"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=495899"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2009-April/022484.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?7e3b5f08"
);
script_set_attribute(attribute:"solution", value:"Update the affected xpdf package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(20, 119, 189, 399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:xpdf");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:9");
script_set_attribute(attribute:"patch_publication_date", value:"2009/04/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/22");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^9([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 9.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC9", reference:"xpdf-3.02-13.fc9")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xpdf");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183
www.nessus.org/u?7e3b5f08
bugzilla.redhat.com/show_bug.cgi?id=490612
bugzilla.redhat.com/show_bug.cgi?id=490614
bugzilla.redhat.com/show_bug.cgi?id=490625
bugzilla.redhat.com/show_bug.cgi?id=495886
bugzilla.redhat.com/show_bug.cgi?id=495887
bugzilla.redhat.com/show_bug.cgi?id=495889
bugzilla.redhat.com/show_bug.cgi?id=495892
bugzilla.redhat.com/show_bug.cgi?id=495894
bugzilla.redhat.com/show_bug.cgi?id=495896
bugzilla.redhat.com/show_bug.cgi?id=495899