On 2013-01-29 14:58, Hani Benhabiles wrote:
On 2013-01-29 11:07, Jan-Oliver Wagner wrote:
On Montag, 28. Januar 2013, Hani Benhabiles wrote:
On 2013-01-25 7:35, Jan-Oliver Wagner wrote:
I am attaching a diff on 2013/* refactoring the References and
Fix/Solution data from the NVT description. Python script (and
shell
wrapper) generating the diff are attached.
nice!
So, the next one to separate would be "Affected" which we agreed
pretty well :-)
Attached is an updated diff for "Affected Software/OS", "Impact" and
"Vulnerability Insight" sections (+ References and Fix/Solution). I
am
attaching the updated script which is in a way better shape than the
last one as I have refactored the code to easily add new sections and
fixed a couple of corner cases bugs.
Example diff:
---
2013/gb_opera_truncation_dialog_code_exec_vuln_macosx.nasl 2013-01-27
16:27:58.532283604 +0100
+++
2013/gb_opera_truncation_dialog_code_exec_vuln_macosx.nasl.new 2013-01-29
15:33:30.475315657 +0100
@@ -24,6 +24,15 @@
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
02110-1301 USA.
###############################################################################
+ tag_affected = "Opera version before 11.67 and 12.x before 12.02
on Mac OS X";
+ tag_insight = "An error in handling of truncated dialogs, can be
used to cause the user
+ to download and run executables unexpectedly or perform other
unwanted
+ actions.";
+ tag_impact = "Successful exploitation will let the attacker
execute the code and perform
+ other unwanted actions.";
+ tag_solution = "Upgrade to Opera version 11.67 or 12.02
+ For updates refer to http://www.opera.com/";
+
if(description)
{
script_id(803149);
@@ -41,25 +50,26 @@
vulnerability.
Vulnerability Insight:
- An error in handling of truncated dialogs, can be used to cause
the user
- to download and run executables unexpectedly or perform other
unwanted
- actions.
+ " + tag_insight + "
Impact:
- Successful exploitation will let the attacker execute the code and
perform
- other unwanted actions.
+ " + tag_impact + "
Impact Level: System/Application
Affected Software/OS:
- Opera version before 11.67 and 12.x before 12.02 on Mac OS X
+ " + tag_affected + "
+
+ Solution:
+ " + tag_solution;
+ script_tag(name : "affected" , value : tag_affected);
+ script_tag(name : "insight" , value : tag_insight);
+ script_tag(name : "impact" , value : tag_impact);
- Fix: Upgrade to Opera version 11.67 or 12.02
- For updates refer to http://www.opera.com/
+ script_tag(name : "solution" , value : tag_solution);
- References:
- http://www.opera.com/support/kb/view/1028/
- http://www.opera.com/docs/changelogs/unified/1202/ ";
+ script_xref(name : "URL" , value :
"http://www.opera.com/support/kb/view/1028/");
+ script_xref(name : "URL" , value :
"http://www.opera.com/docs/changelogs/unified/1202/");
script_description(desc);
script_summary("Check for the version of Opera for Mac OS X");
**********************************************************************
Regards,
Hani.
List,
I have updated both 2013/gb_nero_mediahome_server_mult_dos_vuln.nasl
and secpod_xpdf_mult_vuln.nasl on trunk to showcase the latest changes.
Feedback is welcome.
Regards,
Hani.
_______________________________________________
Openvas-plugins mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins