Lucene search

K
nessusThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.ALTIRIS_DEPLOYMENT_SOLUTION_SERVER_6_9_430.NASL
HistoryJan 08, 2010 - 12:00 a.m.

Altiris Deployment Solution Server < 6.9.430 Multiple Vulnerabilities (SYM09-011)

2010-01-0800:00:00
This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
www.tenable.com
10

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

54.4%

The version of Altiris Deployment Solution installed on the remote host is reportedly affected by the following vulnerabilities :

  • DBManager authentication can by bypassed. A remote attacker could exploit this to execute arbitrary database queries. (CVE-2009-3107)

  • The Aclient GUI has a privilege escalation vulnerability.
    This could allow an unprivileged user to compromise the client. (CVE-2009-3108)

  • When key-based authentication is being used, it is possible to issue commands to an agent before the handshake is completed. A malicious server could exploit this to execute arbitrary commands as SYSTEM. (CVE-2009-3109)

  • Due to a race condition, a malicious user could intercept a file transfer meant for a legitimate client. This could result in the disclosure of sensitive information, or a denial of service. (CVE-2009-3110)

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(43828);
  script_version("1.8");

  script_cve_id(
    "CVE-2009-3107",
    "CVE-2009-3108",
    "CVE-2009-3109",
    "CVE-2009-3110"
  );
  script_bugtraq_id(36110, 36111, 36112, 36113);
  script_xref(name:"Secunia", value:"36502");

  script_name(english:"Altiris Deployment Solution Server < 6.9.430 Multiple Vulnerabilities (SYM09-011)");
  script_summary(english:"Checks deployment server version");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote Windows host has a deployment server that is affected by
multiple vulnerabilities."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The version of Altiris Deployment Solution installed on the remote
host is reportedly affected by the following vulnerabilities :

  - DBManager authentication can by bypassed.  A remote
    attacker could exploit this to execute arbitrary database
    queries. (CVE-2009-3107)

  - The Aclient GUI has a privilege escalation vulnerability.
    This could allow an unprivileged user to compromise the
    client. (CVE-2009-3108)

  - When key-based authentication is being used, it is possible
    to issue commands to an agent before the handshake is
    completed.  A malicious server could exploit this to execute
    arbitrary commands as SYSTEM. (CVE-2009-3109)

  - Due to a race condition, a malicious user could intercept
    a file transfer meant for a legitimate client.  This could
    result in the disclosure of sensitive information, or a denial
    of service. (CVE-2009-3110)"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?0282e94e"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?0282e94e"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?0282e94e"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?0282e94e"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?4f922c58"
  );
  script_set_attribute(
    attribute:"solution",
    value:"Upgrade to Altiris Deployment Solution Server 6.9.430 or later."
  );
  script_set_cvss_base_vector("CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(264, 362);
  script_set_attribute(
    attribute:"vuln_publication_date",
    value:"2009/08/26"
  );
  script_set_attribute(
    attribute:"patch_publication_date",
    value:"2009/08/26"
  );
  script_set_attribute(
    attribute:"plugin_publication_date",
    value:"2010/01/08"
  );
 script_cvs_date("Date: 2018/11/15 20:50:26");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("altiris_deployment_server_detect.nasl");
  script_require_ports("Services/axengine");

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");


port = get_kb_item("Services/axengine");
if (!port)
  exit(1, "The 'Services/axengine' KB item is missing.");
if (!get_port_state(port))
  exit(0, "Port "+port+" is not open.");

# Check the version.
fixed_version = '6.9.430';
version = get_kb_item("Altiris/DSVersion/" + port);
if (isnull(version))
  exit(1, "The 'Altiris/DSVersion/"+port+"' KB item is missing.");

ver = split(version, sep:'.', keep:FALSE);
fix = split(fixed_version, sep:'.', keep:FALSE);
vuln = FALSE;

for (i = 0; i < max_index(ver) && !vuln; i++)
{
  if (int(ver[i]) < int(fix[i])) vuln = TRUE;
  else if (int(ver[i]) > int(fix[i])) break;
}

if (vuln)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Installed version  : '+version+
      '\n  Fixed version      : '+fixed_version+'\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else exit(0, "Altiris Deployment Solution Server version "+version+" is listening on port "+port+" and thus not affected.");

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

54.4%

Related for ALTIRIS_DEPLOYMENT_SOLUTION_SERVER_6_9_430.NASL