script_copyright(english: "This script is (C) 2005 Michel Arboi");
script_name(english: "[DSA196] DSA-196-1 bind");
script_category(ACT_GATHER_INFO);
script_family(english: "Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/Debian/dpkg-l");
script_summary(english: "DSA-196-1 bind");
exit(0);
}
include("debian_package.inc");
w = 0;
if (deb_check(prefix: 'bind', release: '2.2', reference: '8.2.3-0.potato.3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package bind is vulnerable in Debian 2.2.\nUpgrade to bind_8.2.3-0.potato.3\n');
}
if (deb_check(prefix: 'bind-dev', release: '2.2', reference: '8.2.3-0.potato.3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package bind-dev is vulnerable in Debian 2.2.\nUpgrade to bind-dev_8.2.3-0.potato.3\n');
}
if (deb_check(prefix: 'bind-doc', release: '2.2', reference: '8.2.3-0.potato.3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package bind-doc is vulnerable in Debian 2.2.\nUpgrade to bind-doc_8.2.3-0.potato.3\n');
}
if (deb_check(prefix: 'dnsutils', release: '2.2', reference: '8.2.3-0.potato.3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package dnsutils is vulnerable in Debian 2.2.\nUpgrade to dnsutils_8.2.3-0.potato.3\n');
}
if (deb_check(prefix: 'task-dns-server', release: '2.2', reference: '8.2.3-0.potato.3')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package task-dns-server is vulnerable in Debian 2.2.\nUpgrade to task-dns-server_8.2.3-0.potato.3\n');
}
if (deb_check(prefix: 'bind', release: '3.0', reference: '8.3.3-2.0woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package bind is vulnerable in Debian 3.0.\nUpgrade to bind_8.3.3-2.0woody1\n');
}
if (deb_check(prefix: 'bind-dev', release: '3.0', reference: '8.3.3-2.0woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package bind-dev is vulnerable in Debian 3.0.\nUpgrade to bind-dev_8.3.3-2.0woody1\n');
}
if (deb_check(prefix: 'bind-doc', release: '3.0', reference: '8.3.3-2.0woody1')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package bind-doc is vulnerable in Debian 3.0.\nUpgrade to bind-doc_8.3.3-2.0woody1\n');