script_family(english: "Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/Debian/dpkg-l");
script_summary(english: "DSA-435-1 mpg123");
exit(0);
}
include("debian_package.inc");
w = 0;
if (deb_check(prefix: 'mpg123', release: '3.0', reference: '0.59r-13woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123 is vulnerable in Debian 3.0.\nUpgrade to mpg123_0.59r-13woody2\n');
}
if (deb_check(prefix: 'mpg123-esd', release: '3.0', reference: '0.59r-13woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123-esd is vulnerable in Debian 3.0.\nUpgrade to mpg123-esd_0.59r-13woody2\n');
}
if (deb_check(prefix: 'mpg123-nas', release: '3.0', reference: '0.59r-13woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123-nas is vulnerable in Debian 3.0.\nUpgrade to mpg123-nas_0.59r-13woody2\n');
}
if (deb_check(prefix: 'mpg123-oss-3dnow', release: '3.0', reference: '0.59r-13woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123-oss-3dnow is vulnerable in Debian 3.0.\nUpgrade to mpg123-oss-3dnow_0.59r-13woody2\n');
}
if (deb_check(prefix: 'mpg123-oss-i486', release: '3.0', reference: '0.59r-13woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123-oss-i486 is vulnerable in Debian 3.0.\nUpgrade to mpg123-oss-i486_0.59r-13woody2\n');
}
if (deb_check(prefix: 'mpg123', release: '3.2', reference: '0.59r-15')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123 is vulnerable in Debian sid.\nUpgrade to mpg123_0.59r-15\n');
}
if (deb_check(prefix: 'mpg123', release: '3.0', reference: '0.59r-13woody2')) {
w ++;
if (report_verbosity > 0) desc = strcat(desc, '\nThe package mpg123 is vulnerable in Debian woody.\nUpgrade to mpg123_0.59r-13woody2\n');