Vulnerabilities > CVE-2004-2758 - Denial-Of-Service vulnerability in Sunforum 3.2/3D1.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple unspecified vulnerabilities in the H.323 protocol implementation for Sun SunForum 3.2 and 3D 1.0 allow remote attackers to cause a denial of service (segmentation fault and process crash), as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS26_111526.NASL description SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05 last seen 2017-10-29 modified 2011-09-18 plugin id 23153 published 2006-11-06 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=23153 title Solaris 5.6 (sparc) : 111526-16 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/09/17. # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(23153); script_version("1.13"); script_name(english: "Solaris 5.6 (sparc) : 111526-16"); script_cve_id("CVE-2004-2758"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 111526-16"); script_set_attribute(attribute: "description", value: 'SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/111526-16"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30"); script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris"); script_set_attribute(attribute: "plugin_type", value: "local"); script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06"); script_cvs_date("Date: 2018/07/20 0:18:53"); script_end_attributes(); script_summary(english: "Check for patch 111526-16"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26"); e += solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_hole(0); else security_hole(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-448.NASL description Multiple vulnerabilities were discovered in pwlib, a library used to aid in writing portable applications, whereby a remote attacker could cause a denial of service or potentially execute arbitrary code. This library is most notably used in several applications implementing the H.323 teleconferencing protocol, including the OpenH323 suite, gnomemeeting and asterisk. last seen 2020-06-01 modified 2020-06-02 plugin id 15285 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15285 title Debian DSA-448-1 : pwlib - several vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-448. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(15285); script_version("1.22"); script_cvs_date("Date: 2019/08/02 13:32:17"); script_cve_id("CVE-2004-0054", "CVE-2004-0056", "CVE-2004-0097", "CVE-2004-2629", "CVE-2004-2758"); script_bugtraq_id(9406); script_xref(name:"DSA", value:"448"); script_name(english:"Debian DSA-448-1 : pwlib - several vulnerabilities"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Multiple vulnerabilities were discovered in pwlib, a library used to aid in writing portable applications, whereby a remote attacker could cause a denial of service or potentially execute arbitrary code. This library is most notably used in several applications implementing the H.323 teleconferencing protocol, including the OpenH323 suite, gnomemeeting and asterisk." ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/233888" ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2004/dsa-448" ); script_set_attribute( attribute:"solution", value: "For the current stable distribution (woody) this problem has been fixed in version 1.2.5-5woody1. We recommend that you update your pwlib package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pwlib"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0"); script_set_attribute(attribute:"patch_publication_date", value:"2004/02/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29"); script_set_attribute(attribute:"vuln_publication_date", value:"2004/01/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"3.0", prefix:"asnparser", reference:"1.2.5-5woody1")) flag++; if (deb_check(release:"3.0", prefix:"libpt-1.2.0", reference:"1.2.5-5woody1")) flag++; if (deb_check(release:"3.0", prefix:"libpt-dbg", reference:"1.2.5-5woody1")) flag++; if (deb_check(release:"3.0", prefix:"libpt-dev", reference:"1.2.5-5woody1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS7_111526.NASL description SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05 last seen 2017-10-29 modified 2011-09-18 plugin id 23242 published 2006-11-06 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=23242 title Solaris 5.7 (sparc) : 111526-16 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/09/17. # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(23242); script_version("1.13"); script_name(english: "Solaris 5.7 (sparc) : 111526-16"); script_cve_id("CVE-2004-2758"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 111526-16"); script_set_attribute(attribute: "description", value: 'SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/111526-16"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30"); script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris"); script_set_attribute(attribute: "plugin_type", value: "local"); script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06"); script_cvs_date("Date: 2018/07/20 0:18:53"); script_end_attributes(); script_summary(english: "Check for patch 111526-16"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26"); e += solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_hole(0); else security_hole(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_111526.NASL description SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05 last seen 2017-10-29 modified 2011-09-18 plugin id 23475 published 2006-11-06 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=23475 title Solaris 5.9 (sparc) : 111526-16 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/09/17. # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(23475); script_version("1.13"); script_name(english: "Solaris 5.9 (sparc) : 111526-16"); script_cve_id("CVE-2004-2758"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 111526-16"); script_set_attribute(attribute: "description", value: 'SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/111526-16"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30"); script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris"); script_set_attribute(attribute: "plugin_type", value: "local"); script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06"); script_cvs_date("Date: 2018/07/20 0:18:53"); script_end_attributes(); script_summary(english: "Check for patch 111526-16"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26"); e += solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_hole(0); else security_hole(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
NASL family Solaris Local Security Checks NASL id SOLARIS8_111526.NASL description SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05 last seen 2017-10-29 modified 2011-09-18 plugin id 23332 published 2006-11-06 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=23332 title Solaris 5.8 (sparc) : 111526-16 code #%NASL_MIN_LEVEL 999999 # @DEPRECATED@ # # This script has been deprecated as the associated patch is not # currently a recommended security fix. # # Disabled on 2011/09/17. # # (C) Tenable Network Security, Inc. # # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(23332); script_version("1.13"); script_name(english: "Solaris 5.8 (sparc) : 111526-16"); script_cve_id("CVE-2004-2758"); script_set_attribute(attribute: "synopsis", value: "The remote host is missing Sun Security Patch number 111526-16"); script_set_attribute(attribute: "description", value: 'SunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05'); script_set_attribute(attribute: "solution", value: "You should install this patch for your system to be up-to-date."); script_set_attribute(attribute: "see_also", value: "https://getupdates.oracle.com/readme/111526-16"); script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30"); script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris"); script_set_attribute(attribute: "plugin_type", value: "local"); script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06"); script_cvs_date("Date: 2018/07/20 0:18:53"); script_end_attributes(); script_summary(english: "Check for patch 111526-16"); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); family["english"] = "Solaris Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/Solaris/showrev"); exit(0); } # Deprecated. exit(0, "The associated patch is not currently a recommended security fix."); include("solaris.inc"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26"); e += solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29"); if ( e < 0 ) { if ( NASL_LEVEL < 3000 ) security_hole(0); else security_hole(port:0, extra:solaris_get_report()); exit(0); } exit(0, "Host is not affected");
References
- http://secunia.com/advisories/10665
- http://securitytracker.com/id?1008749
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101429-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-57476-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200181-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000135.1-1
- http://www.cert.org/advisories/CA-2004-01.html
- http://www.kb.cert.org/vuls/id/749342
- http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14173