code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(19295);
script_version("1.19");
script_set_attribute(attribute:"plugin_modification_date", value: "2018/07/14");
script_cve_id("CVE-2005-2196");
script_bugtraq_id(14321);
script_name(english:"Airport < 4.2");
script_summary(english:"Check for the version of Mac OS X");
script_set_attribute( attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes a security
issue.");
script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X which contains an
Airport driver with an automatic network association vulnerability, that
may cause a computer to connect to potentially malicious networks
without notifying the end-user.");
script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/TA23400");
script_set_attribute(attribute:"solution", value:"Upgrade to Airport 4.2 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2005/07/15");
script_set_attribute(attribute:"patch_publication_date", value:"2005/07/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/25");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/MacOSX/packages");
exit(0);
}
include("misc_func.inc");
include("ssh_func.inc");
include("macosx_func.inc");
if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)
enable_ssh_wrappers();
else disable_ssh_wrappers();
packages = get_kb_item("Host/MacOSX/packages");
if ( ! packages ) exit(0);
os = get_kb_item("Host/MacOSX/Version");
if ( ! os ) exit(0);
cmd = GetBundleVersionCmd(file:"AirPort Admin Utility.app", path:"/Applications/Utilities");
if ( !ereg(pattern:"Mac OS X 10\.(3|4\.[012]([^0-9]|$))", string:os) ) exit(0);
if ( islocalhost() )
{
buf = pread(cmd:"/bin/bash", argv:make_list("bash", "-c", cmd));
}
else
{
ret = ssh_open_connection();
if ( ! ret ) exit(0);
buf = ssh_cmd(cmd:cmd);
ssh_close_connection();
}
if ( buf && ereg(pattern:"^([0-3]\.|4\.[01](\..*)?)", string:buf) ) security_warning(0);
|