Check for the Version of update
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_suse_2013_1349_1.nasl 8494 2018-01-23 06:57:55Z teissa $
#
# SuSE Update for update openSUSE-SU-2013:1349-1 (update)
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2013 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
if(description)
{
script_id(850551);
script_version("$Revision: 8494 $");
script_tag(name:"last_modification", value:"$Date: 2018-01-23 07:57:55 +0100 (Tue, 23 Jan 2018) $");
script_tag(name:"creation_date", value:"2013-12-10 13:21:24 +0530 (Tue, 10 Dec 2013)");
script_cve_id("CVE-2013-4124");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_name("SuSE Update for update openSUSE-SU-2013:1349-1 (update)");
tag_insight = "
This update of samba fixed the following issues:
- The pam_winbind require_membership_of option allows for a
list of SID, but currently only provides buffer space for
~20 (bnc#806501).
- Samba 3.0.x to 4.0.7 are affected by a denial of service
attack on authenticated or guest connections
CVE-2013-4124 (bnc#829969).
- PIDL: fix parsing linemarkers in preprocessor output
(bso#9636).
- build:autoconf: fix output of syslog-facility check
(bso#9983).
- libreplace: add a missing 'eval' to the
AC_VERIFY_C_PROTOTYPE macro.
- Remove ldapsmb from the main spec file.
- Don't bzip2 the main tar ball, use the upstream gziped
one instead.
- Fix crash bug during Win8 sync (bso#9822).
- Check for system libtevent and link dbwrap_tool and
dbwrap_torture against it (bso#9881).
- errno gets overwritten in call to check_parent_exists()
(bso#9927).
- Fix a bug of drvupgrade of smbcontrol (bso#9941).
- Document idmap_ad rfc2307 attribute requirements
(bso#9880) (bnc#820531).
- Don't package the SWAT man page while its build is
disabled (bnc#816647).
- Don't install the tdb utilities man pages on post-12.1
systems (bnc#823549).
- Fix libreplace license ambiguity (bso#8997)
(bnc#765270).
- s3-docs: Remove 'experimental' label on 'max
protocol=SMB2' parameter (bso#9688).
- Remove the compound_related_in_progress state from the
smb2 global state (bso#9722).
- Makefile: Don't know how to make LIBNDR_PREG_OBJ
(bso#9868).
- Fix is_printer_published GUID retrieval (bso#9900)
(bnc#798856).
- Fix 'map untrusted to domain' with NTLMv2 (bso#9817)
(bnc#817919).
- Don't modify the pidfile name when a custom config file
path is used (bnc#812929).
- Add extra attributes for AD printer publishing
(bso#9378) (bnc#798856).
- Fix vfs_catia module (bso#9701) (bnc#824833). systems
(bnc#804822) (bnc#821889).
- Fix AD printer publishing (bso#9378) (bnc#798856).";
tag_affected = "update on openSUSE 12.3";
tag_solution = "Please Install the Updated Packages.";
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name: "openSUSE-SU", value: "2013:1349_1");
script_tag(name: "summary" , value: "Check for the Version of update");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2013 Greenbone Networks GmbH");
script_family("SuSE Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/suse", "ssh/login/rpms");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "openSUSE12.3")
{
if ((res = isrpmvuln(pkg:"libnetapi-devel", rpm:"libnetapi-devel~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libnetapi0", rpm:"libnetapi0~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libnetapi0-debuginfo", rpm:"libnetapi0-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbclient-devel", rpm:"libsmbclient-devel~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbclient0", rpm:"libsmbclient0~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbclient0-debuginfo", rpm:"libsmbclient0-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbsharemodes-devel", rpm:"libsmbsharemodes-devel~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbsharemodes0", rpm:"libsmbsharemodes0~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbsharemodes0-debuginfo", rpm:"libsmbsharemodes0-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwbclient-devel", rpm:"libwbclient-devel~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwbclient0", rpm:"libwbclient0~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwbclient0-debuginfo", rpm:"libwbclient0-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba", rpm:"samba~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-client", rpm:"samba-client~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-client-debuginfo", rpm:"samba-client-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-debuginfo", rpm:"samba-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-debugsource", rpm:"samba-debugsource~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-devel", rpm:"samba-devel~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-krb-printing", rpm:"samba-krb-printing~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-krb-printing-debuginfo", rpm:"samba-krb-printing-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-winbind", rpm:"samba-winbind~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-winbind-debuginfo", rpm:"samba-winbind-debuginfo~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbclient0-32bit", rpm:"libsmbclient0-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libsmbclient0-debuginfo-32bit", rpm:"libsmbclient0-debuginfo-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwbclient0-32bit", rpm:"libwbclient0-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"libwbclient0-debuginfo-32bit", rpm:"libwbclient0-debuginfo-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-32bit", rpm:"samba-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-client-32bit", rpm:"samba-client-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-client-debuginfo-32bit", rpm:"samba-client-debuginfo-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-debuginfo-32bit", rpm:"samba-debuginfo-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-winbind-32bit", rpm:"samba-winbind-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-winbind-debuginfo-32bit", rpm:"samba-winbind-debuginfo-32bit~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba-doc", rpm:"samba-doc~3.6.12~59.9.1", rls:"openSUSE12.3")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}