On 2013-01-29 14:58, Hani Benhabiles wrote:
On 2013-01-29 11:07, Jan-Oliver Wagner wrote:
On Montag, 28. Januar 2013, Hani Benhabiles wrote:
On 2013-01-25 7:35, Jan-Oliver Wagner wrote:
I am attaching a diff on 2013/* refactoring the References and
Fix/Solution data from the NVT description. Python script (and shell
wrapper) generating the diff are attached.

nice!

So, the next one to separate would be "Affected" which we agreed pretty well :-)

Attached is an updated diff for "Affected Software/OS", "Impact" and
"Vulnerability Insight" sections (+ References and Fix/Solution). I am
attaching the updated script which is in a way better shape than the
last one as I have refactored the code to easily add new sections and
fixed a couple of corner cases bugs.

Example diff:

---
2013/gb_opera_truncation_dialog_code_exec_vuln_macosx.nasl      2013-01-27
16:27:58.532283604 +0100
+++

2013/gb_opera_truncation_dialog_code_exec_vuln_macosx.nasl.new  2013-01-29
15:33:30.475315657 +0100
@@ -24,6 +24,15 @@
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. ###############################################################################

+  tag_affected = "Opera version before 11.67 and 12.x before 12.02
on Mac OS X";
+  tag_insight = "An error in handling of truncated dialogs, can be
used to cause the user
+ to download and run executables unexpectedly or perform other unwanted
+  actions.";
+  tag_impact = "Successful exploitation will let the attacker
execute the code and perform
+  other unwanted actions.";
+  tag_solution = "Upgrade to Opera version 11.67 or 12.02
+  For updates refer to http://www.opera.com/";;
+
 if(description)
 {
   script_id(803149);
@@ -41,25 +50,26 @@
   vulnerability.

   Vulnerability Insight:
- An error in handling of truncated dialogs, can be used to cause the user - to download and run executables unexpectedly or perform other unwanted
-  actions.
+  " + tag_insight + "

   Impact:
- Successful exploitation will let the attacker execute the code and perform
-  other unwanted actions.
+  " + tag_impact + "

   Impact Level: System/Application

   Affected Software/OS:
-  Opera version before 11.67 and 12.x before 12.02 on Mac OS X
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+  script_tag(name : "affected" , value : tag_affected);
+  script_tag(name : "insight" , value : tag_insight);
+  script_tag(name : "impact" , value : tag_impact);

-  Fix: Upgrade to Opera version 11.67 or 12.02
-  For updates refer to http://www.opera.com/
+  script_tag(name : "solution" , value : tag_solution);

-  References:
-  http://www.opera.com/support/kb/view/1028/
-  http://www.opera.com/docs/changelogs/unified/1202/ ";
+  script_xref(name : "URL" , value :
"http://www.opera.com/support/kb/view/1028/";);
+  script_xref(name : "URL" , value :
"http://www.opera.com/docs/changelogs/unified/1202/";);

   script_description(desc);
   script_summary("Check for the version of Opera for Mac OS X");


**********************************************************************

Regards,
Hani.

List,

I have updated both 2013/gb_nero_mediahome_server_mult_dos_vuln.nasl and secpod_xpdf_mult_vuln.nasl on trunk to showcase the latest changes.

Feedback is welcome.

Regards,
Hani.
_______________________________________________
Openvas-plugins mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to