Author: jan
Date: 2007-11-02 14:58:06 +0100 (Fri, 02 Nov 2007)
New Revision: 508

Removed:
   trunk/openvas-plugins/scripts/sasser_virus.nasl
   trunk/openvas-plugins/scripts/ssh_settings.nasl
   trunk/openvas-plugins/scripts/zope_multiple_flaws.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/netstat_portscan.nasl
Log:
* scripts/sasser_virus.nasl, scripts/ssh_settings.nasl,
scripts/zope_multiple_flaws.nasl: Removed.
It was identified as non-free
by the audit script.

* scripts/netstat_portscan.nasl: Replaced dependency ssh_settings.nasl
to ssh_authorization.nasl.



Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog     2007-11-01 22:55:52 UTC (rev 507)
+++ trunk/openvas-plugins/ChangeLog     2007-11-02 13:58:06 UTC (rev 508)
@@ -1,3 +1,13 @@
+2007-11-02  Jan-Oliver Wagner <[EMAIL PROTECTED]>
+
+       * scripts/sasser_virus.nasl, scripts/ssh_settings.nasl,
+       scripts/zope_multiple_flaws.nasl: Removed.
+       It was identified as non-free
+       by the audit script.
+
+       * scripts/netstat_portscan.nasl: Replaced dependency ssh_settings.nasl
+       to ssh_authorization.nasl.
+
 2007-11-01  Jan-Oliver Wagner <[EMAIL PROTECTED]>
 
        * scripts/ssh_authorization.nasl: New. Set information for

Modified: trunk/openvas-plugins/scripts/netstat_portscan.nasl
===================================================================
--- trunk/openvas-plugins/scripts/netstat_portscan.nasl 2007-11-01 22:55:52 UTC 
(rev 507)
+++ trunk/openvas-plugins/scripts/netstat_portscan.nasl 2007-11-02 13:58:06 UTC 
(rev 508)
@@ -34,7 +34,7 @@
  family["francais"] = "Scanners de ports";
  script_family(english:family["english"], francais:family["francais"]);
 
- script_dependencies("ping_host.nasl", "ssh_settings.nasl");
+ script_dependencies("ping_host.nasl", "ssh_authorization.nasl");
  exit(0);
 }
 

Deleted: trunk/openvas-plugins/scripts/sasser_virus.nasl
===================================================================
--- trunk/openvas-plugins/scripts/sasser_virus.nasl     2007-11-01 22:55:52 UTC 
(rev 507)
+++ trunk/openvas-plugins/scripts/sasser_virus.nasl     2007-11-02 13:58:06 UTC 
(rev 508)
@@ -1,84 +0,0 @@
-#
-# Copyright (C) 2004 Tenable Network Security
-#
-
-if(description)
-{
- script_id(12219);
- script_version ("$Revision$");
- name["english"] = "Sasser Virus Detection";
-
- script_name(english:name["english"]);
- 
- desc["english"] = "
-Synopsis :
-
-The remote hos is infected by a virus.
-
-Description :
-
-The Sasser worm is infecting this host.  Specifically,
-a backdoored command server may be listening on port 9995 or 9996
-and an ftp server (used to load malicious code) is listening on port 
-5554 or 1023.  There is every indication that the host is currently 
-scanning and infecting other systems.  
-
-See also : 
-
-http://www.lurhq.com/sasser.html
-
-Solution: 
-
-- Use an Anti-Virus package to remove it.
-- See http://www.microsoft.com/technet/security/bulletin/ms04-011.asp
-
-Risk factor :
-
-Critical / CVSS Base Score : 10 
-(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)";
-
-
- script_description(english:desc["english"]);
- 
- summary["english"] = "Sasser Virus Detection";
- script_summary(english:summary["english"]);
- 
- script_category(ACT_GATHER_INFO);
- 
- script_copyright(
-  english:"This script is Copyright (C) 2004 Tenable Network Security",
-  francais:"Ce script est copyright (C) 2004 Tenable Network Security");
- family["english"] = "Backdoors";
- family["francais"] = "Backdoors";
- script_family(english:family["english"], francais:family["francais"]);
- script_require_ports(5554);
- exit(0);
-}
-
-# start script
-
-include("ftp_func.inc");
-login = "anonymous";
-pass  = "bin";
-
-# there really is no telling how many Sasser variants there will be :<
-ports[0] =  5554;           
-ports[1] =  1023;
-
-foreach port ( ports)
-{
- if ( get_port_state(port) )
-   {
-        soc = open_sock_tcp(port);
-        if (soc) 
-        {
-            if(ftp_authenticate(socket:soc, user:login, pass:pass)) 
security_hole(port);
-           close(soc);
-        }
-    }
-}
-
-
-
-
-

Deleted: trunk/openvas-plugins/scripts/ssh_settings.nasl
===================================================================
--- trunk/openvas-plugins/scripts/ssh_settings.nasl     2007-11-01 22:55:52 UTC 
(rev 507)
+++ trunk/openvas-plugins/scripts/ssh_settings.nasl     2007-11-02 13:58:06 UTC 
(rev 508)
@@ -1,60 +0,0 @@
-#TRUSTED 
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
-#
-# This script was extract by Michel Arboi from 
-# ssh_get_info which is (C) Tenable Network Security
-#
-
-if ( ! defined_func("bn_random") ) exit(0);
-
-if(description)
-{
- script_id(14273);
- script_version ("1.9");
- name["english"] = "SSH settings";
- desc["english"] = "
-This script just sets global variables (SSH keys, user name, passphrase)
-and does not perform any security check
-
-Risk factor: None";
- script_description(english:name["english"]);
- script_name(english:name["english"]);
- family["english"] = "Settings";
- script_family(english:family["english"]);
- 
- summary["english"] = "set SSH keys & user name to perform local security 
checks";
- script_summary(english:summary["english"]);
- script_copyright(english:"Copyright (C) 2004 Michel Arboi");
- script_category(ACT_INIT);
- if (defined_func("bn_random"))
- {
-   script_add_preference(name:"SSH user name : ",
-                       type:"entry",
-                       value:"root");
-   script_add_preference(name:"SSH password (unsafe!) : ",
-                       type:"password",
-                       value:"");
-   script_add_preference(name:"SSH public key to use : ",
-                       type:"file",
-                       value:"");
-  script_add_preference(name:"SSH private key to use : ",
-                       type:"file",
-                       value:"");
-  script_add_preference(name:"Passphrase for SSH key : ",
-                       type:"password",
-                       value:"");
- }
-
- exit(0);
-}
-
-account     = script_get_preference("SSH user name : ");
-password    = script_get_preference("SSH password (unsafe!) : ");
-public_key  = script_get_preference_file_content("SSH public key to use : ");
-private_key = script_get_preference_file_content("SSH private key to use : ");
-passphrase  = script_get_preference("Passphrase for SSH key : ");
-
-set_kb_item(name:"Secret/SSH/login", value:account);
-if (password) set_kb_item(name:"Secret/SSH/password", value:password);
-if (public_key) set_kb_item(name:"Secret/SSH/publickey", value:public_key);
-if (private_key) set_kb_item(name:"Secret/SSH/privatekey", value:private_key);
-if (passphrase) set_kb_item(name:"Secret/SSH/passphrase", value:passphrase);

Deleted: trunk/openvas-plugins/scripts/zope_multiple_flaws.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zope_multiple_flaws.nasl      2007-11-01 
22:55:52 UTC (rev 507)
+++ trunk/openvas-plugins/scripts/zope_multiple_flaws.nasl      2007-11-02 
13:58:06 UTC (rev 508)
@@ -1,77 +0,0 @@
-#
-# (C) Tenable Network Security
-#
-
-if(description)
-{
- script_id(11985);
- script_bugtraq_id(9400);
- script_version ("$Revision$");
- 
- name["english"] = "Zope Multiple Vulnerabilities";
- script_name(english:name["english"]);
- 
- desc["english"] = "
-Synopsis :
-
-The remote web server contains an application server that is prone to
-multiple vulnerabilities. 
-
-Description :
-
-The remote web server is a version of Zope which is older than version
-2.6.3. 
-
-There are multiple security issues in all releases prior to version 
-2.6.3 or 2.7 BETA4 which can be exploited by an attacker to perform cross
-site scripting attacks, obtain information about the remote host, or
-disable this service remotely.
-
-*** OpenVAS solely relied on the version number of your server, so if 
-*** the hotfix has already been applied, this might be a false positive
-
-See also : 
-
-http://mail.zope.org/pipermail/zope-announce/2004-January/001325.html
-
-Solution : 
-
-Upgrade to Zope 2.6.3 or later.
-
-Risk factor : 
-
-Medium / CVSS Base Score : 4 
-(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)";
-
-
- script_description(english:desc["english"]);
- summary["english"] = "Checks Zope version"; 
- script_summary(english:summary["english"]);
- script_category(ACT_GATHER_INFO);
-
- script_copyright(english:"This script is Copyright (C) 2001 Alert4Web.com");
- family["english"] = "Web Servers";
- script_family(english:family["english"]);
- script_dependencie("find_service.nes", "http_version.nasl");
- script_require_ports("Services/www", 80);
- script_require_keys("www/zope");
- exit(0);
-}
-
-#
-# The script code starts here
-#
-
-include("http_func.inc");
-
-
-port = get_http_port(default:80);
-
-banner = get_http_banner(port:port);
-
-if(banner)
-{
-  if(egrep(pattern:"Server: .*Zope 2\.(([0-5]\..*)|(6\.[0-2][^0-9])|(7\..*BETA 
*[0-3]))", 
-               string:banner))
-     security_warning(port);
-}

_______________________________________________
Openvas-commits mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-commits

Reply via email to