Vulnerabilities > CVE-2004-2758 - Denial-Of-Service vulnerability in Sunforum 3.2/3D1.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sun
nessus

Summary

Multiple unspecified vulnerabilities in the H.323 protocol implementation for Sun SunForum 3.2 and 3D 1.0 allow remote attackers to cause a denial of service (segmentation fault and process crash), as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.

Vulnerable Configurations

Part Description Count
Application
Sun
2

Nessus

  • NASL familySolaris Local Security Checks
    NASL idSOLARIS26_111526.NASL
    descriptionSunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05
    last seen2017-10-29
    modified2011-09-18
    plugin id23153
    published2006-11-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=23153
    titleSolaris 5.6 (sparc) : 111526-16
    code
    #%NASL_MIN_LEVEL 999999
    
    # @DEPRECATED@
    #
    # This script has been deprecated as the associated patch is not
    # currently a recommended security fix.
    #
    # Disabled on 2011/09/17.
    
    #
    # (C) Tenable Network Security, Inc.
    #
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    include("compat.inc");
    
    if(description)
    {
     script_id(23153);
     script_version("1.13");
    
     script_name(english: "Solaris 5.6 (sparc) : 111526-16");
     script_cve_id("CVE-2004-2758");
     script_set_attribute(attribute: "synopsis", value:
    "The remote host is missing Sun Security Patch number 111526-16");
     script_set_attribute(attribute: "description", value:
    'SunForum 3.2: fixes and enhancements.
    Date this patch was last updated by Sun : Nov/30/05');
     script_set_attribute(attribute: "solution", value:
    "You should install this patch for your system to be up-to-date.");
     script_set_attribute(attribute: "see_also", value:
    "https://getupdates.oracle.com/readme/111526-16");
     script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30");
     script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris");
     script_set_attribute(attribute: "plugin_type", value: "local");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06");
     script_cvs_date("Date: 2018/07/20  0:18:53");
     script_end_attributes();
    
     script_summary(english: "Check for patch 111526-16");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
     family["english"] = "Solaris Local Security Checks";
     script_family(english:family["english"]);
     
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/Solaris/showrev");
     exit(0);
    }
    
    
    
    # Deprecated.
    exit(0, "The associated patch is not currently a recommended security fix.");
    
    include("solaris.inc");
    
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26");
    e +=  solaris_check_patch(release:"5.6", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29");
    if ( e < 0 ) { 
    	if ( NASL_LEVEL < 3000 ) 
    	   security_hole(0);
    	else  
    	   security_hole(port:0, extra:solaris_get_report());
    	exit(0); 
    } 
    exit(0, "Host is not affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-448.NASL
    descriptionMultiple vulnerabilities were discovered in pwlib, a library used to aid in writing portable applications, whereby a remote attacker could cause a denial of service or potentially execute arbitrary code. This library is most notably used in several applications implementing the H.323 teleconferencing protocol, including the OpenH323 suite, gnomemeeting and asterisk.
    last seen2020-06-01
    modified2020-06-02
    plugin id15285
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15285
    titleDebian DSA-448-1 : pwlib - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-448. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15285);
      script_version("1.22");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2004-0054", "CVE-2004-0056", "CVE-2004-0097", "CVE-2004-2629", "CVE-2004-2758");
      script_bugtraq_id(9406);
      script_xref(name:"DSA", value:"448");
    
      script_name(english:"Debian DSA-448-1 : pwlib - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple vulnerabilities were discovered in pwlib, a library used to
    aid in writing portable applications, whereby a remote attacker could
    cause a denial of service or potentially execute arbitrary code. This
    library is most notably used in several applications implementing the
    H.323 teleconferencing protocol, including the OpenH323 suite,
    gnomemeeting and asterisk."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/233888"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2004/dsa-448"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "For the current stable distribution (woody) this problem has been
    fixed in version 1.2.5-5woody1.
    
    We recommend that you update your pwlib package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:pwlib");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2004/02/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_set_attribute(attribute:"vuln_publication_date", value:"2004/01/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.0", prefix:"asnparser", reference:"1.2.5-5woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"libpt-1.2.0", reference:"1.2.5-5woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"libpt-dbg", reference:"1.2.5-5woody1")) flag++;
    if (deb_check(release:"3.0", prefix:"libpt-dev", reference:"1.2.5-5woody1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS7_111526.NASL
    descriptionSunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05
    last seen2017-10-29
    modified2011-09-18
    plugin id23242
    published2006-11-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=23242
    titleSolaris 5.7 (sparc) : 111526-16
    code
    #%NASL_MIN_LEVEL 999999
    
    # @DEPRECATED@
    #
    # This script has been deprecated as the associated patch is not
    # currently a recommended security fix.
    #
    # Disabled on 2011/09/17.
    
    #
    # (C) Tenable Network Security, Inc.
    #
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    include("compat.inc");
    
    if(description)
    {
     script_id(23242);
     script_version("1.13");
    
     script_name(english: "Solaris 5.7 (sparc) : 111526-16");
     script_cve_id("CVE-2004-2758");
     script_set_attribute(attribute: "synopsis", value:
    "The remote host is missing Sun Security Patch number 111526-16");
     script_set_attribute(attribute: "description", value:
    'SunForum 3.2: fixes and enhancements.
    Date this patch was last updated by Sun : Nov/30/05');
     script_set_attribute(attribute: "solution", value:
    "You should install this patch for your system to be up-to-date.");
     script_set_attribute(attribute: "see_also", value:
    "https://getupdates.oracle.com/readme/111526-16");
     script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30");
     script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris");
     script_set_attribute(attribute: "plugin_type", value: "local");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06");
     script_cvs_date("Date: 2018/07/20  0:18:53");
     script_end_attributes();
    
     script_summary(english: "Check for patch 111526-16");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
     family["english"] = "Solaris Local Security Checks";
     script_family(english:family["english"]);
     
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/Solaris/showrev");
     exit(0);
    }
    
    
    
    # Deprecated.
    exit(0, "The associated patch is not currently a recommended security fix.");
    
    include("solaris.inc");
    
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26");
    e +=  solaris_check_patch(release:"5.7", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29");
    if ( e < 0 ) { 
    	if ( NASL_LEVEL < 3000 ) 
    	   security_hole(0);
    	else  
    	   security_hole(port:0, extra:solaris_get_report());
    	exit(0); 
    } 
    exit(0, "Host is not affected");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_111526.NASL
    descriptionSunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05
    last seen2017-10-29
    modified2011-09-18
    plugin id23475
    published2006-11-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=23475
    titleSolaris 5.9 (sparc) : 111526-16
    code
    #%NASL_MIN_LEVEL 999999
    
    # @DEPRECATED@
    #
    # This script has been deprecated as the associated patch is not
    # currently a recommended security fix.
    #
    # Disabled on 2011/09/17.
    
    #
    # (C) Tenable Network Security, Inc.
    #
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    include("compat.inc");
    
    if(description)
    {
     script_id(23475);
     script_version("1.13");
    
     script_name(english: "Solaris 5.9 (sparc) : 111526-16");
     script_cve_id("CVE-2004-2758");
     script_set_attribute(attribute: "synopsis", value:
    "The remote host is missing Sun Security Patch number 111526-16");
     script_set_attribute(attribute: "description", value:
    'SunForum 3.2: fixes and enhancements.
    Date this patch was last updated by Sun : Nov/30/05');
     script_set_attribute(attribute: "solution", value:
    "You should install this patch for your system to be up-to-date.");
     script_set_attribute(attribute: "see_also", value:
    "https://getupdates.oracle.com/readme/111526-16");
     script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30");
     script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris");
     script_set_attribute(attribute: "plugin_type", value: "local");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06");
     script_cvs_date("Date: 2018/07/20  0:18:53");
     script_end_attributes();
    
     script_summary(english: "Check for patch 111526-16");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
     family["english"] = "Solaris Local Security Checks";
     script_family(english:family["english"]);
     
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/Solaris/showrev");
     exit(0);
    }
    
    
    
    # Deprecated.
    exit(0, "The associated patch is not currently a recommended security fix.");
    
    include("solaris.inc");
    
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26");
    e +=  solaris_check_patch(release:"5.9", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29");
    if ( e < 0 ) { 
    	if ( NASL_LEVEL < 3000 ) 
    	   security_hole(0);
    	else  
    	   security_hole(port:0, extra:solaris_get_report());
    	exit(0); 
    } 
    exit(0, "Host is not affected");
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS8_111526.NASL
    descriptionSunForum 3.2: fixes and enhancements. Date this patch was last updated by Sun : Nov/30/05
    last seen2017-10-29
    modified2011-09-18
    plugin id23332
    published2006-11-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=23332
    titleSolaris 5.8 (sparc) : 111526-16
    code
    #%NASL_MIN_LEVEL 999999
    
    # @DEPRECATED@
    #
    # This script has been deprecated as the associated patch is not
    # currently a recommended security fix.
    #
    # Disabled on 2011/09/17.
    
    #
    # (C) Tenable Network Security, Inc.
    #
    #
    
    if ( ! defined_func("bn_random") ) exit(0);
    include("compat.inc");
    
    if(description)
    {
     script_id(23332);
     script_version("1.13");
    
     script_name(english: "Solaris 5.8 (sparc) : 111526-16");
     script_cve_id("CVE-2004-2758");
     script_set_attribute(attribute: "synopsis", value:
    "The remote host is missing Sun Security Patch number 111526-16");
     script_set_attribute(attribute: "description", value:
    'SunForum 3.2: fixes and enhancements.
    Date this patch was last updated by Sun : Nov/30/05');
     script_set_attribute(attribute: "solution", value:
    "You should install this patch for your system to be up-to-date.");
     script_set_attribute(attribute: "see_also", value:
    "https://getupdates.oracle.com/readme/111526-16");
     script_set_attribute(attribute: "cvss_vector", value: "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_attribute(attribute: "patch_publication_date", value: "2005/11/30");
     script_set_attribute(attribute: "cpe", value: "cpe:/o:sun:solaris");
     script_set_attribute(attribute: "plugin_type", value: "local");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/11/06");
     script_cvs_date("Date: 2018/07/20  0:18:53");
     script_end_attributes();
    
     script_summary(english: "Check for patch 111526-16");
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
     family["english"] = "Solaris Local Security Checks";
     script_family(english:family["english"]);
     
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/Solaris/showrev");
     exit(0);
    }
    
    
    
    # Deprecated.
    exit(0, "The associated patch is not currently a recommended security fix.");
    
    include("solaris.inc");
    
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNW5dat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWcdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdat", version:"3.2.0,REV=2001.05.02");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdatu", version:"3.2.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWdedat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWesdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWfrdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWhdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWitdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjadat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWjpdat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkeep", version:"1.0.0,REV=2001.04.24");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWkodat", version:"3.2.0,REV=2002.01.29");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWphone", version:"3.2.0,REV=2001.04.26");
    e +=  solaris_check_patch(release:"5.8", arch:"sparc", patch:"111526-16", obsoleted_by:"", package:"SUNWsvdat", version:"3.2.0,REV=2002.01.29");
    if ( e < 0 ) { 
    	if ( NASL_LEVEL < 3000 ) 
    	   security_hole(0);
    	else  
    	   security_hole(port:0, extra:solaris_get_report());
    	exit(0); 
    } 
    exit(0, "Host is not affected");