Vulnerabilities > CVE-2004-0791 - Remote Denial Of Service vulnerability in Multiple Vendor TCP/IP Implementation ICMP
Summary
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Exploit-Db
description | Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS. CVE-2004-0791. Dos exploits for multiple platform |
id | EDB-ID:25387 |
last seen | 2016-02-03 |
modified | 2005-04-12 |
published | 2005-04-12 |
reporter | Fernando Gont |
source | https://www.exploit-db.com/download/25387/ |
title | Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS |
Nessus
NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL23440942.NASL description The vulnerability described in this article was initially fixed in earlier versions, but a regression was reintroduced in BIG-IP 12.x through13.x. For information about earlier versions, refer toK4583: Insufficient validation of ICMP error messages - VU#222750 / CVE-2004-0790(9.x - 10.x). Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the last seen 2020-06-01 modified 2020-06-02 plugin id 100000 published 2017-05-08 reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/100000 title F5 Networks BIG-IP : Insufficient validation of ICMP error messages (K23440942) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from F5 Networks BIG-IP Solution K23440942. # # The text description of this plugin is (C) F5 Networks. # include("compat.inc"); if (description) { script_id(100000); script_version("3.6"); script_cvs_date("Date: 2019/05/09 9:52:02"); script_cve_id("CVE-2004-0790", "CVE-2004-0791", "CVE-2004-1060", "CVE-2005-0065", "CVE-2005-0066", "CVE-2005-0067", "CVE-2005-0068"); script_bugtraq_id(13124); script_name(english:"F5 Networks BIG-IP : Insufficient validation of ICMP error messages (K23440942)"); script_summary(english:"Checks the BIG-IP version."); script_set_attribute( attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch." ); script_set_attribute( attribute:"description", value: "The vulnerability described in this article was initially fixed in earlier versions, but a regression was reintroduced in BIG-IP 12.x through13.x. For information about earlier versions, refer toK4583: Insufficient validation of ICMP error messages - VU#222750 / CVE-2004-0790(9.x - 10.x). Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the 'blind connection-reset attack.' NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. (CVE-2004-0790) Impact A remote attacker can interfere with the Path MTU Discovery process and cause a performance degradation or reset of FastL4 accelerated TCP connections by spoofing a specifically craftedInternet Control Message Protocol (ICMP) message. This vulnerability only applies to FastL4 virtual servers on BIG-IP platforms with the embedded Packet Velocity Acceleration (ePVA) chip.The ePVA chip is a hardware acceleration Field Programmable Gate Array (FPGA) that delivers high-performance Layer 4 (L4) IPv4 throughput. ePVA chips are included on the following BIG-IP platforms : B2100 Blade in the VIPRION C2400 or C2200 Chassis B2150 Blade in the VIPRION C2400 or C2200 Chassis B2250 Blade in the VIPRION C2400 or C2200 Chassis B4300 Blade in the VIPRION C4480 or C4800 Chassis B4340 Blade in the VIPRION C4480 or C4800 Chassis BIG-IP 12000 series BIG-IP 10000 series BIG-IP 7000 series BIG-IP 5000 series BIG-IP i5000 series BIG-IP i7000 series BIG-IP i10000 series" ); script_set_attribute( attribute:"see_also", value:"https://support.f5.com/csp/article/K23440942" ); script_set_attribute( attribute:"see_also", value:"https://support.f5.com/csp/article/K4583" ); script_set_attribute( attribute:"solution", value: "Upgrade to one of the non-vulnerable versions listed in the F5 Solution K23440942." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_advanced_firewall_manager"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_acceleration_manager"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_visibility_and_reporting"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager"); script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_policy_enforcement_manager"); script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip"); script_set_attribute(attribute:"vuln_publication_date", value:"2004/04/12"); script_set_attribute(attribute:"patch_publication_date", value:"2017/05/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/05/08"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"F5 Networks Local Security Checks"); script_dependencies("f5_bigip_detect.nbin"); script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version", "Settings/ParanoidReport"); exit(0); } include("f5_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); version = get_kb_item("Host/BIG-IP/version"); if ( ! version ) audit(AUDIT_OS_NOT, "F5 Networks BIG-IP"); if ( isnull(get_kb_item("Host/BIG-IP/hotfix")) ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/hotfix"); if ( ! get_kb_item("Host/BIG-IP/modules") ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/modules"); sol = "K23440942"; vmatrix = make_array(); if (report_paranoia < 2) audit(AUDIT_PARANOID); # AFM vmatrix["AFM"] = make_array(); vmatrix["AFM"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["AFM"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # AM vmatrix["AM"] = make_array(); vmatrix["AM"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["AM"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # APM vmatrix["APM"] = make_array(); vmatrix["APM"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["APM"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # ASM vmatrix["ASM"] = make_array(); vmatrix["ASM"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["ASM"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # AVR vmatrix["AVR"] = make_array(); vmatrix["AVR"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["AVR"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # LC vmatrix["LC"] = make_array(); vmatrix["LC"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["LC"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # LTM vmatrix["LTM"] = make_array(); vmatrix["LTM"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["LTM"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); # PEM vmatrix["PEM"] = make_array(); vmatrix["PEM"]["affected" ] = make_list("13.0.0","12.0.0-12.1.2"); vmatrix["PEM"]["unaffected"] = make_list("13.0.0HF1","12.1.2HF1","11.4.0-11.6.1"); if (bigip_is_affected(vmatrix:vmatrix, sol:sol)) { if (report_verbosity > 0) security_hole(port:0, extra:bigip_report_get()); else security_hole(0); exit(0); } else { tested = bigip_get_tested_modules(); audit_extra = "For BIG-IP module(s) " + tested + ","; if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version); else audit(AUDIT_HOST_NOT, "running any of the affected modules"); }
NASL family CISCO NASL id CISCO-SA-20050412-ICMP.NASL description A document that describes how the Internet Control Message Protocol (ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol (TCP) has been made publicly available. This document has been published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled last seen 2020-06-01 modified 2020-06-02 plugin id 48985 published 2010-09-01 reporter This script is (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/48985 title Crafted ICMP Messages Can Cause Denial of Service - Cisco Systems code # # (C) Tenable Network Security, Inc. # # Security advisory is (C) CISCO, Inc. # See https://www.cisco.com/en/US/products/products_security_advisory09186a0080436587.shtml if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(48985); script_version("1.16"); script_cve_id( "CVE-2004-0790", "CVE-2004-0791", "CVE-2004-1060", "CVE-2005-0065", "CVE-2005-0066", "CVE-2005-0067", "CVE-2005-0068" ); script_bugtraq_id(13124); script_xref(name:"CERT", value:"222750"); script_xref(name:"CISCO-BUG-ID", value:"CSCed78149"); script_xref(name:"CISCO-BUG-ID", value:"CSCef43691"); script_xref(name:"CISCO-BUG-ID", value:"CSCef44699"); script_xref(name:"CISCO-BUG-ID", value:"CSCef45332"); script_xref(name:"CISCO-BUG-ID", value:"CSCef46728"); script_xref(name:"CISCO-BUG-ID", value:"CSCef54204"); script_xref(name:"CISCO-BUG-ID", value:"CSCef54206"); script_xref(name:"CISCO-BUG-ID", value:"CSCef54947"); script_xref(name:"CISCO-BUG-ID", value:"CSCef57566"); script_xref(name:"CISCO-BUG-ID", value:"CSCef60659"); script_xref(name:"CISCO-BUG-ID", value:"CSCef61610"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh04183"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh20083"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh45454"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh59823"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh62307"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh63449"); script_xref(name:"CISCO-BUG-ID", value:"CSCeh65337"); script_xref(name:"CISCO-BUG-ID", value:"CSCsa52807"); script_xref(name:"CISCO-BUG-ID", value:"CSCsa59600"); script_xref(name:"CISCO-BUG-ID", value:"CSCsa60692"); script_xref(name:"CISCO-BUG-ID", value:"CSCsa61864"); script_xref(name:"CISCO-SA", value:"cisco-sa-20050412-icmp"); script_name(english:"Crafted ICMP Messages Can Cause Denial of Service - Cisco Systems"); script_set_attribute(attribute:"synopsis", value: "The remote device is missing a vendor-supplied security patch" ); script_set_attribute(attribute:"description", value: 'A document that describes how the Internet Control Message Protocol (ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol (TCP) has been made publicly available. This document has been published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled "ICMP Attacks Against TCP" (draft-gont-tcpm-icmp-attacks-03.txt ). These attacks, which only affect sessions terminating or originating on a device itself, can be of three types: Successful attacks may cause connection resets or reduction of throughput in existing connections, depending on the attack type. Multiple Cisco products are affected by the attacks described in this Internet draft. Cisco has made free software available to address these vulnerabilities. In some cases there are workarounds available to mitigate the effects of the vulnerability. '); script_set_attribute(attribute:"see_also", value: "https://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html"); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050412-icmp script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?1ba12045"); # https://www.cisco.com/en/US/products/products_security_advisory09186a0080436587.shtml script_set_attribute(attribute:"see_also", value: "http://www.nessus.org/u?8b803ffb"); script_set_attribute(attribute:"solution", value: "Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20050412-icmp." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value: "local"); script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios"); script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/12"); script_set_attribute(attribute:"patch_publication_date", value: "2005/04/12"); script_set_attribute(attribute:"plugin_publication_date", value: "2010/09/01"); script_cvs_date("Date: 2018/11/15 20:50:20"); script_end_attributes(); script_summary(english:"Uses SNMP to determine if a flaw is present"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencie("cisco_ios_version.nasl"); script_require_keys("Host/Cisco/IOS/Version"); exit(0); } include("cisco_func.inc"); # version = get_kb_item_or_exit("Host/Cisco/IOS/Version"); # Affected: 12.0 if (check_release(version: version, patched: make_list("12.0(28c)") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.0DA")) { security_warning(port:0, extra: '\nUpdate to 12.2(12)DA8 or later\n'); exit(0); } if (deprecated_version(version, "12.0DB")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.0DC")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } # Affected: 12.0S if (check_release(version: version, patched: make_list("12.0(27)S5", "12.0(28)S3", "12.0(30)S1", "12.0(31)S"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.0SC")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } if (deprecated_version(version, "12.0SL")) { security_warning(port:0, extra: '\nUpdate to 12.0(31)S or later\n'); exit(0); } if (deprecated_version(version, "12.0SP")) { security_warning(port:0, extra: '\nUpdate to 12.0(31)S or later\n'); exit(0); } if (deprecated_version(version, "12.0ST")) { security_warning(port:0, extra: '\nUpdate to 12.0(31)S or later\n'); exit(0); } if (deprecated_version(version, "12.0SX")) { security_warning(port:0, extra: '\nNo fixes are planned for 12.0SX releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.0SZ")) { security_warning(port:0, extra: '\nUpdate to 12.0(31)S or later\n'); exit(0); } if (deprecated_version(version, "12.0T")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } # Affected: 12.0W5 if ("W5" >< version && check_release(version: version, patched: make_list("12.0(25)W5(27c)", "12.0(28)W5(31a)") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.0WC if (check_release(version: version, patched: make_list("12.0(5)WC12") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.0XA")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XB")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XC")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XD")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XE")) { security_warning(port:0, extra: '\nUpdate to 12.1(26)E1 or later\n'); exit(0); } if (deprecated_version(version, "12.0XF")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XG")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XH")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XI")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XJ")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XK")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.0XL")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.0XM")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XN")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XQ")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } if (deprecated_version(version, "12.0XR")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.0XS")) { security_warning(port:0, extra: '\nUpdate to 12.1(26)E1 or later\n'); exit(0); } if (deprecated_version(version, "12.0XV")) { security_warning(port:0, extra: '\nUpdate to 12.1(27) or later\n'); exit(0); } # Affected: 12.1 if (check_release(version: version, patched: make_list("12.1(27)"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.1AA")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1AX")) { security_warning(port:0, extra: '\nUpdate to 12.2(25)EY or later\n'); exit(0); } if (deprecated_version(version, "12.1AZ")) { security_warning(port:0, extra: '\nUpdate to 12.1(22)EA4 or later\n'); exit(0); } if (deprecated_version(version, "12.1DA")) { security_warning(port:0, extra: '\nUpdate to 12.2(12)DA8 or later\n'); exit(0); } if (deprecated_version(version, "12.1DB")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.1DC")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } # Affected: 12.1E if (check_release(version: version, patched: make_list("12.1(22)E6", "12.1(23)E3", "12.1(26)E1") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.1EA if (check_release(version: version, patched: make_list("12.1(22)EA4") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.1EB")) { security_warning(port:0, extra: '\nNo fixes are available for 12.1EB releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.1EC")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } # Affected: 12.1EO if (check_release(version: version, patched: make_list("12.1(19)EO4") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.1EU")) { security_warning(port:0, extra: '\nUpdate to 12.2(20)EU or later\n'); exit(0); } if (deprecated_version(version, "12.1EV")) { security_warning(port:0, extra: '\nNo fixes are available for 12.1EV releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.1EW")) { security_warning(port:0, extra: '\nUpdate to 12.2(18)EW3 or later\n'); exit(0); } if (deprecated_version(version, "12.1EX")) { security_warning(port:0, extra: '\nUpdate to 12.1(26)E1 or later\n'); exit(0); } if (deprecated_version(version, "12.1EY")) { security_warning(port:0, extra: '\nUpdate to 12.1(26)E1 or later\n'); exit(0); } if (deprecated_version(version, "12.1T")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XA")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XB")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XC")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XD")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XE")) { security_warning(port:0, extra: '\nUpdate to 12.1(26)E1 or later\n'); exit(0); } if (deprecated_version(version, "12.1XF")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XG")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XH")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XI")) { security_warning(port:0, extra: '\nUpdate to 12.2(28) or later\n'); exit(0); } if (deprecated_version(version, "12.1XJ")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XL")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XM")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XP")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XQ")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XR")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XT")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XU")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1XV")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YA")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YB")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YC")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YD")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YE")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YF")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YH")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YI")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.1YJ")) { security_warning(port:0, extra: '\nUpdate to 12.1(22)EA4 or later\n'); exit(0); } # Affected: 12.2 if (check_release(version: version, patched: make_list("12.2(28)"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2B")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.2BC if (check_release(version: version, patched: make_list("12.2(15)BC2f") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2BW")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2BY")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2BZ")) { security_warning(port:0, extra: '\nUpdate to 12.3(7)XI5 or later\n'); exit(0); } # Affected: 12.2CX if (deprecated_version(version, "12.2CX")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } # Affected: 12.2CY if (deprecated_version(version, "12.2CY")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } if (deprecated_version(version, "12.2CZ")) { security_warning(port:0, extra: '\nNo fix is planned for 12.2CZ releases. Upgrade to a supported release\n'); exit(0); } # Affected: 12.2DA if (check_release(version: version, patched: make_list("12.2(12)DA8") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2DD")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2DX")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.2EU if (check_release(version: version, patched: make_list("12.2(20)EU"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.2EW if (check_release(version: version, patched: make_list("12.2(18)EW3") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.2EWA if (check_release(version: version, patched: make_list("12.2(25)EWA") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2EX")) { security_warning(port:0, extra: '\nUpdate to 12.2(25)SEB or later\n'); exit(0); } # Affected: 12.2EY if (check_release(version: version, patched: make_list("12.2(25)EY") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2JA")) { security_warning(port:0, extra: '\nUpdate to 12.3(4)JA or later\n'); exit(0); } if (deprecated_version(version, "12.2JK")) { security_warning(port:0, extra: '\nNo fixes are available for 12.2JK releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.2MB")) { security_warning(port:0, extra: '\nNo fixes are available for 12.2MB releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.2MC")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.2S if (check_release(version: version, patched: make_list("12.2(14)S13", "12.2(18)S8", "12.2(20)S7", "12.2(25)S3") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.2SE if (check_release(version: version, patched: make_list("12.2(25)SEB"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.2SO if (check_release(version: version, patched: make_list("12.2(18)SO1") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2SU")) { security_warning(port:0, extra: '\nNo fixes are available for 12.2SU releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.2SV")) { security_warning(port:0, extra: '\nUpdate to 12.2(25)S3 or later\n'); exit(0); } if (deprecated_version(version, "12.2SW")) { security_warning(port:0, extra: '\nNo fixes are available for 12.2SU releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.2SX")) { security_warning(port:0, extra: '\nUpdate to 12.2(17d)SXB7 or later\n'); exit(0); } # Affected: 12.2SXA and 12.2SXB if (("SXA" >< version || "SXB" >< version) && check_release(version: version, patched: make_list("12.2(17d)SXB7") )) { security_warning(port:0, extra: '\nUpdate to 12.2(17d)SXB7 or later\n'); exit(0); } # Affected: 12.2SXD if ("SXD" >< version && check_release(version: version, patched: make_list("12.2(18)SXD4") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2SY")) { security_warning(port:0, extra: '\nUpdate to 12.2(17d)SXB7 or later\n'); exit(0); } if (deprecated_version(version, "12.2SZ")) { security_warning(port:0, extra: '\nUpdate to 12.2(20)S7 or later\n'); exit(0); } # Affected: 12.2T if (check_release(version: version, patched: make_list("12.2(15)T15") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2XA")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XB")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XC")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2XD")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XE")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XF")) { security_warning(port:0, extra: '\nUpdate to 12.2(15)BC2f or later\n'); exit(0); } if (deprecated_version(version, "12.2XG")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XH")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XI")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XJ")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XK")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XL")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XM")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XN")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XQ")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XR")) { security_warning(port:0, extra: '\nUpdate to 12.3(4)JA or later\n'); exit(0); } if (deprecated_version(version, "12.2XT")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XU")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2XW")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } # Affected: 12.2YA if (check_release(version: version, patched: make_list("12.2(4)YA9") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2YB")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YC")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YD")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YE")) { security_warning(port:0, extra: '\nUpdate to 12.2(25)S3 or later\n'); exit(0); } if (deprecated_version(version, "12.2YF")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YG")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YH")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YJ")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YK")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YL")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YM")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YN")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YO")) { security_warning(port:0, extra: '\nUpdate to 12.2(17d)SXB7 or later\n'); exit(0); } if (deprecated_version(version, "12.2YQ")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YR")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YT")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2YU")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YV")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YW")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YX")) { security_warning(port:0, extra: '\nNo fixes are available for 12.2YX releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.2YY")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2YZ")) { security_warning(port:0, extra: '\nUpdate to 12.2(20)S7 or later\n'); exit(0); } if (deprecated_version(version, "12.2ZA")) { security_warning(port:0, extra: '\nUpdate to 12.2(17d)SXB7 or later\n'); exit(0); } if (deprecated_version(version, "12.2ZB")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2ZC")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2ZD")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2ZE")) { security_warning(port:0, extra: '\nUpdate to 12.3(13) or later\n'); exit(0); } if (deprecated_version(version, "12.2ZF")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2ZG")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.2ZH if (check_release(version: version, patched: make_list("12.2(13)ZH6") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2ZJ")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2ZK")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.2ZL if (check_release(version: version, patched: make_list("12.2(15)ZL2") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.2ZN")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.2ZP")) { security_warning(port:0, extra: '\nNo fixes are available for 12.2ZP releases. Upgrade to a supported release\n'); exit(0); } # Affected: 12.3 if (check_release(version: version, patched: make_list("12.3(3h)", "12.3(5e)", "12.3(6e)", "12.3(9d)", "12.3(10c)", "12.3(12b)", "12.3(13a)", "12.3(13)"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3B")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.3BC if (check_release(version: version, patched: make_list("12.3(9a)BC2") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3BW")) { security_warning(port:0, extra: '\nUpdate to 12.3(7)T8 or later\n'); exit(0); } # Affected: 12.3JA if (check_release(version: version, patched: make_list("12.3(4)JA"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.3T if (check_release(version: version, patched: make_list("12.3(7)T8", "12.3(8)T7", "12.3(11)T4", "12.3(14)T"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3XA")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XB")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.3XC if (check_release(version: version, patched: make_list("12.3(2)XC3") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3XD")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XE")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XF")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XG")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3XG releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.3XH")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.3XI if (check_release(version: version, patched: make_list("12.3(7)XI3") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3XJ")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3XJ releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.3XK")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XL")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XM")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XQ")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XR")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XS")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } if (deprecated_version(version, "12.3XT")) { security_warning(port:0, extra: '\nUpdate to 12.3(4)JA or later\n'); exit(0); } if (deprecated_version(version, "12.3XU")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3XU releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.3XW")) { security_warning(port:0, extra: '\nUpdate to 12.3(11)YF2 or later\n'); exit(0); } if (deprecated_version(version, "12.3XX")) { security_warning(port:0, extra: '\nUpdate to 12.3(14)T or later\n'); exit(0); } # Affected: 12.3XY if (check_release(version: version, patched: make_list("12.3(8)XY4") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3YA")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3YA releases. Upgrade to a supported release\n'); exit(0); } if (deprecated_version(version, "12.3YD")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3YD releases. Upgrade to a supported release\n'); exit(0); } # Affected: 12.3YF if (check_release(version: version, patched: make_list("12.3(11)YF2") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.3YG if (check_release(version: version, patched: make_list("12.3(8)YG1") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3YH")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3YH releases. Upgrade to a supported release\n'); exit(0); } # Affected: 12.3YI if (check_release(version: version, patched: make_list("12.3(8)YI"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } if (deprecated_version(version, "12.3YJ")) { security_warning(port:0, extra: '\nNo fixes are available for 12.3YJ releases. Upgrade to a supported release\n'); exit(0); } # Affected: 12.3YK if (check_release(version: version, patched: make_list("12.3(11)YK"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: TCPv6 if (check_release(version: version, patched: make_list("12.3(11)YK") )) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.3YN if (check_release(version: version, patched: make_list("12.3(11)YN"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } # Affected: 12.3YQ if (check_release(version: version, patched: make_list("12.3(14)YQ"))) { security_warning(port:0, extra: '\nUpdate to ' + patch_update + ' or later\n'); exit(0); } exit(0, "The remote host is not affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_117470.NASL description SunOS 5.9_x86: tcp Patch. Date this patch was last updated by Sun : Jul/09/07 last seen 2016-09-26 modified 2011-09-18 plugin id 18079 published 2005-04-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=18079 title Solaris 9 (x86) : 117470-09 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/09/17. # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(18079); script_version("1.30"); script_name(english: "Solaris 9 (x86) : 117470-09"); script_cve_id("CVE-2004-0790", "CVE-2004-0791", "CVE-2006-3920"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 117470-09"); script_set_attribute(attribute: "description", value: 'SunOS 5.9_x86: tcp Patch. Date this patch was last updated by Sun : Jul/09/07'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/117470-09"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_publication_date", value: "2005/04/17"); script_cvs_date("Date: 2018/08/13 14:32:38"); script_set_attribute(attribute:"vuln_publication_date", value: "2005/09/07"); script_end_attributes(); script_summary(english: "Check for patch 117470-09"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"117470-09", obsoleted_by:"119435-20 ", package:"SUNWcsr", version:"11.9.0,REV=2002.11.04.02.51"); e += solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"117470-09", obsoleted_by:"119435-20 ", package:"SUNWcsu", version:"11.9.0,REV=2002.11.04.02.51"); e += solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"117470-09", obsoleted_by:"119435-20 ", package:"SUNWhea", version:"11.9.0,REV=2002.11.04.02.51"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_warning(0); else security_warning(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_25644.NASL description s700_800 11.11 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884) - An HP-UX 11.11 machine with TRANSPORT patches PHNE_24211, PHNE_24506, PHNE_25134, or PHNE_25642 may be exposed to a denial of service through the malicious use of the last seen 2020-06-01 modified 2020-06-02 plugin id 16508 published 2005-02-16 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/16508 title HP-UX PHNE_25644 : s700_800 11.11 cumulative ARPA Transport patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_25644. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(16508); script_version("1.25"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2001-0328", "CVE-2004-0790", "CVE-2004-0791", "CVE-2004-1060"); script_bugtraq_id(13124); script_xref(name:"CERT-CC", value:"2001-09"); script_xref(name:"CERT", value:"532967"); script_xref(name:"HP", value:"emr_na-c00576017"); script_xref(name:"HP", value:"emr_na-c00994439"); script_xref(name:"HP", value:"emr_na-c01336000"); script_xref(name:"HP", value:"HPSBUX00192"); script_xref(name:"HP", value:"HPSBUX00205"); script_xref(name:"HP", value:"HPSBUX01164"); script_xref(name:"HP", value:"SSRT071390"); script_xref(name:"HP", value:"SSRT080009"); script_xref(name:"HP", value:"SSRT4884"); script_name(english:"HP-UX PHNE_25644 : s700_800 11.11 cumulative ARPA Transport patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.11 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884) - An HP-UX 11.11 machine with TRANSPORT patches PHNE_24211, PHNE_24506, PHNE_25134, or PHNE_25642 may be exposed to a denial of service through the malicious use of the 'ndd' command. (HPSBUX00192 SSRT071390) - TCP Initial Sequence Number (ISN) randomization specified in RFC 1948 is available for HP-UX. References: CVE-2001-0328, CERT CA-2001-09. (HPSBUX00205 SSRT080009)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00994439 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?b75e5227" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01336000 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?47614ae6" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00576017 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3a3e8ad7" ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_25644 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2002/04/26"); script_set_attribute(attribute:"patch_modification_date", value:"2006/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/16"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/04/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.11")) { exit(0, "The host is not affected since PHNE_25644 applies to a different OS release."); } patches = make_list("PHNE_25644", "PHNE_27063", "PHNE_28089", "PHNE_28895", "PHNE_29887", "PHNE_31247", "PHNE_33159", "PHNE_33628", "PHNE_34135", "PHNE_34672", "PHNE_35183", "PHNE_35351", "PHNE_36125", "PHNE_37671", "PHNE_37898", "PHNE_38678", "PHNE_39386", "PHNE_42029"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"Networking.NET-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET-PRG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN-64", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET2-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NMS2-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NW-ENG-A-MAN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.CORE-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.CORE2-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.SYS-ADMIN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"ProgSupport.C-INC", version:"B.11.11")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_32606.NASL description s700_800 11.23 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884) - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954) last seen 2020-06-01 modified 2020-06-02 plugin id 19362 published 2005-08-01 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19362 title HP-UX PHNE_32606 : s700_800 11.23 cumulative ARPA Transport patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_32606. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(19362); script_version("1.27"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2004-0790", "CVE-2004-0791", "CVE-2004-1060", "CVE-2005-1192"); script_bugtraq_id(13124); script_xref(name:"CERT", value:"532967"); script_xref(name:"HP", value:"emr_na-c00571568"); script_xref(name:"HP", value:"emr_na-c00576017"); script_xref(name:"HP", value:"HPSBUX01137"); script_xref(name:"HP", value:"HPSBUX01164"); script_xref(name:"HP", value:"SSRT4884"); script_xref(name:"HP", value:"SSRT5954"); script_name(english:"HP-UX PHNE_32606 : s700_800 11.23 cumulative ARPA Transport patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.23 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884) - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00571568 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?9aacfc53" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00576017 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3a3e8ad7" ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_32606 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/06/30"); script_set_attribute(attribute:"patch_modification_date", value:"2006/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/08/01"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/04/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.23")) { exit(0, "The host is not affected since PHNE_32606 applies to a different OS release."); } patches = make_list("PHNE_32606", "PHNE_33798", "PHNE_34671", "PHNE_35182", "PHNE_35765", "PHNE_35766", "PHNE_37395", "PHNE_37670", "PHNE_37897", "PHNE_38679", "PHNE_39387", "PHNE_41436", "PHNE_42094", "PHNE_43215"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"Networking.NET-PRG", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET2-KRN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET2-RUN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NMS2-KRN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NW-ENG-A-MAN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"OS-Core.CORE2-KRN", version:"B.11.23")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS10_118822.NASL description SunOS 5.10: kernel Patch. Date this patch was last updated by Sun : Feb/23/06 last seen 2018-09-02 modified 2018-08-13 plugin id 19367 published 2005-08-02 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=19367 title Solaris 10 (sparc) : 118822-30 code #%NASL_MIN_LEVEL 80502 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/09/17. # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(19367); script_version("1.38"); script_name(english: "Solaris 10 (sparc) : 118822-30"); script_cve_id("CVE-2004-0790", "CVE-2004-0791", "CVE-2005-3250", "CVE-2005-4701", "CVE-2008-1095"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 118822-30"); script_set_attribute(attribute: "description", value: 'SunOS 5.10: kernel Patch. Date this patch was last updated by Sun : Feb/23/06'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/118822-30"); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C"); script_cwe_id(264); script_set_attribute(attribute:"plugin_publication_date", value: "2005/08/02"); script_cvs_date("Date: 2019/10/25 13:36:22"); script_set_attribute(attribute:"vuln_publication_date", value: "2005/10/13"); script_end_attributes(); script_summary(english: "Check for patch 118822-30"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix.");
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_33395.NASL description s700_800 11.00 cumulative ARPA Transport patch : A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. last seen 2020-06-01 modified 2020-06-02 plugin id 19363 published 2005-08-01 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19363 title HP-UX PHNE_33395 : HP-UX TCP/IP Remote Denial of Service (DoS) (HPSBUX01164 SSRT4884 rev.9) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_33395. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(19363); script_version("1.20"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2004-0790", "CVE-2004-0791", "CVE-2004-1060"); script_bugtraq_id(13124); script_xref(name:"CERT", value:"532967"); script_xref(name:"HP", value:"emr_na-c00576017"); script_xref(name:"HP", value:"HPSBUX01164"); script_xref(name:"HP", value:"SSRT4884"); script_name(english:"HP-UX PHNE_33395 : HP-UX TCP/IP Remote Denial of Service (DoS) (HPSBUX01164 SSRT4884 rev.9)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.00 cumulative ARPA Transport patch : A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00576017 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3a3e8ad7" ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_33395 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/07/19"); script_set_attribute(attribute:"patch_modification_date", value:"2006/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/08/01"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/04/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00")) { exit(0, "The host is not affected since PHNE_33395 applies to a different OS release."); } patches = make_list("PHNE_33395", "PHNE_35729"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"Networking.NET-KRN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"Networking.NET-PRG", version:"B.11.00")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"Networking.NET2-KRN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"Networking.NMS2-KRN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"OS-Core.CORE2-KRN", version:"B.11.00")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS7_106541.NASL description SunOS 5.7: Kernel Update Patch. Date this patch was last updated by Sun : Dec/06/06 last seen 2016-09-26 modified 2011-10-24 plugin id 13086 published 2004-07-12 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=13086 title Solaris 7 (sparc) : 106541-44 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/10/24. # # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(13086); script_version("1.33"); script_name(english: "Solaris 7 (sparc) : 106541-44"); script_cve_id("CVE-2004-0790", "CVE-2004-0791"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 106541-44"); script_set_attribute(attribute: "description", value: 'SunOS 5.7: Kernel Update Patch. Date this patch was last updated by Sun : Dec/06/06'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "http://download.oracle.com/sunalerts/1001318.1.html"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/12"); script_cvs_date("Date: 2018/07/20 0:18:53"); script_end_attributes(); script_summary(english: "Check for patch 106541-44"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"FJSVhea", version:"1.0,REV=1998.11.16.20.05"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWarc", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWarcx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWatfsr", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcar", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcar", version:"11.7.0,REV=1999.01.11.15.30"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcarx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcarx", version:"11.7.0,REV=1998.11.30.15.02"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcpr", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcpr", version:"11.7.0,REV=1998.11.16.20.05"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcprx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcprx", version:"11.7.0,REV=1998.11.16.20.05"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcsl", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcslx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcsr", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcsu", version:"11.7.0,REV=1998.10.06.00.59"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcsxu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcvc", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWcvcx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWdpl", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWdplx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWdrr", version:"11.7.0,REV=1999.03.09.04.51"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWdrrx", version:"11.7.0,REV=1999.03.09.04.51"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWesu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWesxu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWhea", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWipc", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWkvm", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWkvm", version:"11.7.0,REV=1999.01.11.15.30"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWkvmx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWkvmx", version:"11.7.0,REV=1998.11.16.20.05"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWnisu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWpcmci", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWpcmcu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWpcmcx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWscpu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWscpux", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWssad", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWssadx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWsxr", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWtnfc", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWtnfcx", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWtoo", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWtoox", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWvolr", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWvolu", version:"11.7.0,REV=1998.09.01.04.16"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"106541-44", obsoleted_by:"", package:"SUNWypu", version:"11.7.0,REV=1998.09.01.04.16"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_warning(0); else security_warning(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_33159.NASL description s700_800 11.11 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954) - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884) last seen 2020-06-01 modified 2020-06-02 plugin id 18608 published 2005-07-05 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18608 title HP-UX PHNE_33159 : s700_800 11.11 cumulative ARPA Transport patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_33159. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(18608); script_version("1.24"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2004-0790", "CVE-2004-0791", "CVE-2004-1060", "CVE-2005-1192"); script_bugtraq_id(13124); script_xref(name:"CERT", value:"532967"); script_xref(name:"HP", value:"emr_na-c00571568"); script_xref(name:"HP", value:"emr_na-c00576017"); script_xref(name:"HP", value:"HPSBUX01137"); script_xref(name:"HP", value:"HPSBUX01164"); script_xref(name:"HP", value:"SSRT4884"); script_xref(name:"HP", value:"SSRT5954"); script_name(english:"HP-UX PHNE_33159 : s700_800 11.11 cumulative ARPA Transport patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.11 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954) - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00571568 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?9aacfc53" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00576017 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3a3e8ad7" ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_33159 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/06/24"); script_set_attribute(attribute:"patch_modification_date", value:"2006/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/05"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/04/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.11")) { exit(0, "The host is not affected since PHNE_33159 applies to a different OS release."); } patches = make_list("PHNE_33159", "PHNE_33628", "PHNE_34135", "PHNE_34672", "PHNE_35183", "PHNE_35351", "PHNE_36125", "PHNE_37671", "PHNE_37898", "PHNE_38678", "PHNE_39386", "PHNE_42029"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"Networking.NET-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET-PRG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN-64", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NET2-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NMS2-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"Networking.NW-ENG-A-MAN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.CORE-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.CORE2-KRN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.SYS-ADMIN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"ProgSupport.C-INC", version:"B.11.11")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS7_X86_106542.NASL description SunOS 5.7_x86: Kernel Update Patch. Date this patch was last updated by Sun : Nov/27/06 last seen 2016-09-26 modified 2011-10-24 plugin id 13193 published 2004-07-12 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=13193 title Solaris 7 (x86) : 106542-43 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/10/24. # # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(13193); script_version("1.29"); script_name(english: "Solaris 7 (x86) : 106542-43"); script_cve_id("CVE-2004-0790", "CVE-2004-0791"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 106542-43"); script_set_attribute(attribute: "description", value: 'SunOS 5.7_x86: Kernel Update Patch. Date this patch was last updated by Sun : Nov/27/06'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "http://download.oracle.com/sunalerts/1001318.1.html"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/12"); script_cvs_date("Date: 2018/07/20 0:18:53"); script_end_attributes(); script_summary(english: "Check for patch 106542-43"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWarc", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWatfsr", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWcar", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWcsl", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWcsr", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWcsu", version:"11.7.0,REV=1998.10.06.01.22"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWdpl", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWesu", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWhea", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWipc", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWkvm", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWnisu", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWpcmci", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWpcmcu", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWscpu", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWtnfc", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWtoo", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWvolr", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWvolu", version:"11.7.0,REV=1998.09.01.04.53"); e += solaris_check_patch(release:"5.7_x86", arch:"i386", patch:"106542-43", obsoleted_by:"", package:"SUNWypu", version:"11.7.0,REV=1998.09.01.04.53"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_warning(0); else security_warning(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_26125.NASL description s700_800 11.00 ndd(1M) cumulative patch : A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. last seen 2020-06-01 modified 2020-06-02 plugin id 18399 published 2005-05-30 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18399 title HP-UX PHNE_26125 : HP-UX TCP/IP Remote Denial of Service (DoS) (HPSBUX01164 SSRT4884 rev.9) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-043.NASL description Updated kernel packages that fix several security issues in Red Hat Enterprise Linux 3 are now available. The Linux kernel handles the basic functions of the operating system. This advisory includes fixes for several security issues : iSEC Security Research discovered a VMA handling flaw in the uselib(2) system call of the Linux kernel. A local user could make use of this flaw to gain elevated (root) privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1235 to this issue. A flaw was discovered where an executable could cause a VMA overlap leading to a crash. A local user could trigger this flaw by creating a carefully crafted a.out binary on 32-bit systems or a carefully crafted ELF binary on Itanium systems. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0003 to this issue. iSEC Security Research discovered a flaw in the page fault handler code that could lead to local users gaining elevated (root) privileges on multiprocessor machines. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0001 to this issue. A patch that coincidentally fixed this issue was committed to the Update 4 kernel release in December 2004. Therefore Red Hat Enterprise Linux 3 kernels provided by RHBA-2004:550 and subsequent updates are not vulnerable to this issue. A flaw in the system call filtering code in the audit subsystem included in Red Hat Enterprise Linux 3 allowed a local user to cause a crash when auditing was enabled. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1237 to this issue. Olaf Kirch discovered that the recent security fixes for cmsg_len handling (CVE-2004-1016) broke 32-bit compatibility on 64-bit platforms such as AMD64 and Intel EM64T. A patch to correct this issue is included. A recent Internet Draft by Fernando Gont recommended that ICMP Source Quench messages be ignored by hosts. A patch to ignore these messages is included. Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed. All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. last seen 2020-06-01 modified 2020-06-02 plugin id 16211 published 2005-01-19 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/16211 title RHEL 3 : kernel (RHSA-2005:043) NASL family Solaris Local Security Checks NASL id SOLARIS10_X86_118844.NASL description SunOS 5.10_x86: kernel Patch. Date this patch was last updated by Sun : Oct/28/05 This plugin has been deprecated and either replaced with individual 118844 patch-revision plugins, or deemed non-security related. last seen 2019-02-21 modified 2018-07-30 plugin id 19370 published 2005-08-02 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=19370 title Solaris 10 (x86) : 118844-20 (deprecated) NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_26076.NASL description s700_800 11.04 (VVOS) ndd(1M) cumulative patch : A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. last seen 2020-06-01 modified 2020-06-02 plugin id 18398 published 2005-05-30 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18398 title HP-UX PHNE_26076 : HP-UX TCP/IP Remote Denial of Service (DoS) (HPSBUX01164 SSRT4884 rev.9) NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL4583.NASL description The remote BIG-IP device is missing a patch required by a security advisory. last seen 2020-06-01 modified 2020-06-02 plugin id 86016 published 2015-09-18 reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/86016 title F5 Networks BIG-IP : Insufficient validation of ICMP error messages (SOL4583) NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_33427.NASL description s700_800 11.04 (VVOS) cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS). References: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060. (HPSBUX01164 SSRT4884) - A potential security vulnerability has been identified with HP-UX running TCP/IP. The potential vulnerability could be exploited remotely to cause a Denial of Service (DoS). (HPSBUX02087 SSRT4728) last seen 2020-06-01 modified 2020-06-02 plugin id 19486 published 2005-08-23 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19486 title HP-UX PHNE_33427 : s700_800 11.04 (VVOS) cumulative ARPA Transport patch NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-016.NASL description Updated kernel packages that fix several security issues in Red Hat Enterprise Linux 2.1 are now available. The Linux kernel handles the basic functions of the operating system. This advisory includes fixes for the following security issues : iSEC Security Research discovered a VMA handling flaw in the uselib(2) system call of the Linux kernel. A local user could make use of this flaw to gain elevated (root) privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1235 to this issue. iSEC Security Research discovered a flaw in the page fault handler code that could lead to local users gaining elevated (root) privileges on multiprocessor machines. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0001 to this issue. iSEC Security Research and Georgi Guninski independently discovered a flaw in the scm_send function in the auxiliary message layer. A local user could create a carefully crafted auxiliary message which could cause a denial of service (system hang). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1016 to this issue. Kirill Korotaev found a flaw in load_elf_binary affecting kernels prior to 2.4.26. A local user could create a carefully crafted binary in such a way that it would cause a denial of service (system crash). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1234 to this issue. These packages also fix issues in the io_edgeport driver (CVE-2004-1017), a memory leak in ip_options_get (CVE-2004-1335), and missing VM_IO flags in some drivers (CVE-2004-1057). A recent Internet Draft by Fernando Gont recommended that ICMP Source Quench messages be ignored by hosts. A patch to ignore these messages is included. All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. last seen 2020-06-01 modified 2020-06-02 plugin id 16244 published 2005-01-25 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/16244 title RHEL 2.1 : kernel (RHSA-2005:016) NASL family Solaris Local Security Checks NASL id SOLARIS9_118305.NASL description SunOS 5.9: tcp Patch. Date this patch was last updated by Sun : Jul/09/07 last seen 2016-09-26 modified 2011-09-18 plugin id 18075 published 2005-04-17 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=18075 title Solaris 9 (sparc) : 118305-10
Oval
accepted 2013-04-29T04:03:45.256-04:00 class vulnerability contributors name Aharon Chernin organization SCAP.com, LLC name Dragos Prisaca organization G2, Inc.
definition_extensions comment The operating system installed on the system is Red Hat Enterprise Linux 3 oval oval:org.mitre.oval:def:11782 comment CentOS Linux 3.x oval oval:org.mitre.oval:def:16651
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:10228 status accepted submitted 2010-07-09T03:56:16-04:00 title Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. version 26 accepted 2011-05-09T04:00:04.824-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Nabil Ouchn organization Security-Database name Matthew Wojcik organization The MITRE Corporation name Todd Dolinsky organization Opsware, Inc. name Shane Shaffer organization G2, Inc.
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:1112 status accepted submitted 2006-09-22T05:48:00.000-04:00 title HP-UX 11.04 ICMP Source Quench Attack Vulnerability version 40 accepted 2014-03-24T04:00:40.393-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Matthew Wojcik organization The MITRE Corporation name Todd Dolinsky organization Opsware, Inc. name Shane Shaffer organization G2, Inc. name Sushant Kumar Singh organization Hewlett-Packard
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:184 status accepted submitted 2006-09-22T05:48:00.000-04:00 title HP-UX 11.11 ICMP Source Quench Attack Vulnerability version 43 accepted 2011-05-09T04:01:34.130-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Nabil Ouchn organization Security-Database name Matthew Wojcik organization The MITRE Corporation name Pai Peng organization Opsware, Inc. name Shane Shaffer organization G2, Inc.
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:464 status accepted submitted 2006-09-22T05:52:00.000-04:00 title Solaris 8, 9, 10 ICMP Source Quench Attack Vulnerability version 40 accepted 2014-03-24T04:01:49.234-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Matthew Wojcik organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sushant Kumar Singh organization Hewlett-Packard name Sushant Kumar Singh organization Hewlett-Packard
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:596 status accepted submitted 2006-09-22T05:48:00.000-04:00 title HP-UX 11.11 or 11.23 ICMP Source Quench Attack Vulnerability version 43 accepted 2014-03-10T04:00:51.815-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Matthew Wojcik organization The MITRE Corporation name Todd Dolinsky organization Opsware, Inc. name Shane Shaffer organization G2, Inc. name Sushant Kumar Singh organization Hewlett-Packard
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:688 status accepted submitted 2006-09-22T05:48:00.000-04:00 title HP-UX 11.23 ICMP Source Quench Attack Vulnerability version 44 accepted 2011-05-09T04:01:45.820-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Matthew Wojcik organization The MITRE Corporation name Todd Dolinsky organization Opsware, Inc. name Shane Shaffer organization G2, Inc.
description Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. family unix id oval:org.mitre.oval:def:726 status accepted submitted 2006-09-22T05:48:00.000-04:00 title HP-UX 11.00 ICMP Source Quench Attack Vulnerability version 40
Redhat
advisories |
| ||||||||||||
rpms |
|
Seebug
bulletinFamily exploit description No description provided by source. id SSV:63076 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-63076 title Multiple OS (Win32/Aix/Cisco) - Crafted ICMP Messages DoS Exploit bulletinFamily exploit description No description provided by source. id SSV:79052 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-79052 title Multiple Vendor ICMP Message Handling DoS bulletinFamily exploit description No description provided by source. id SSV:79051 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-79051 title Multiple Vendor ICMP Implementation Malformed Path MTU DoS bulletinFamily exploit description No description provided by source. id SSV:79050 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-79050 title Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS bulletinFamily exploit description No description provided by source. id SSV:15543 last seen 2017-11-19 modified 2005-04-20 published 2005-04-20 reporter Root source https://www.seebug.org/vuldb/ssvid-15543 title Multiple OS (win32/aix/cisco) Crafted ICMP Messages DoS Exploit
References
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt
- http://marc.info/?l=bugtraq&m=112861397904255&w=2
- http://secunia.com/advisories/18317
- http://securityreason.com/securityalert/19
- http://securityreason.com/securityalert/57
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1
- http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
- http://www.redhat.com/support/errata/RHSA-2005-016.html
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- http://www.securityfocus.com/archive/1/418882/100/0/threaded
- http://www.securityfocus.com/archive/1/428028/100/0/threaded
- http://www.securityfocus.com/archive/1/428058/100/0/threaded
- http://www.securityfocus.com/bid/13124
- http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en
- http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726