Search...


BlackBerry Link < 1.2.3.53 Codec Demux Arbitrary Code Execution

2015-07-24T00:00:00
ID BLACKBERRY_LINK_1_2_3_53.NASL
Type nessus
Reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2021-01-02T00:00:00

Description

The remote host has a version of BlackBerry Link installed that is prior to version 1.2.3.53. Therefore, it is affected by an arbitrary code execution vulnerability in the codec demux. A remote attacker can exploit this, via crafted MP4 file, to execute arbitrary code.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(84987);
  script_version("1.5");
  script_cvs_date("Date: 2019/11/22");

  script_cve_id("CVE-2015-4111");
  script_bugtraq_id(75950);

  script_name(english:"BlackBerry Link < 1.2.3.53 Codec Demux Arbitrary Code Execution");
  script_summary(english:"Checks version of BlackBerry Link.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has software installed that is affected by an
arbitrary code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host has a version of BlackBerry Link installed that is
prior to version 1.2.3.53. Therefore, it is affected by an arbitrary
code execution vulnerability in the codec demux. A remote attacker can
exploit this, via crafted MP4 file, to execute arbitrary code.");
  script_set_attribute(attribute:"see_also", value:"https://salesforce.services.blackberry.com/kbredirect/KB37207");
  script_set_attribute(attribute:"see_also", value:"https://us.blackberry.com/software/desktop/blackberry-link");
  script_set_attribute(attribute:"solution", value:
"Upgrade to BlackBerry Link 1.2.3.53.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-4111");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2015/07/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/07/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/24");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:blackberry:blackberry_link");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("blackberry_link_installed.nbin");
  script_require_keys("SMB/blackberry_link/Installed");
  script_require_ports(139, 445);

  exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("global_settings.inc");
include("misc_func.inc");
include("smb_hotfixes_fcheck.inc");

kb_base = "SMB/blackberry_link/";
appname = "BlackBerry Link";

path = get_kb_item_or_exit(kb_base + "Path");
version  = get_kb_item_or_exit(kb_base + "Version");

fix = "1.2.3.53";
report = NULL;

# Paranoid report is a straight version check, normal mode needs to check for the
# affected file as well to see if the workaround has been applied.

if (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
{

  port = get_kb_item('SMB/transport');
  if (!port) port = 445;

  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix +
    '\n';
}
else
  audit(AUDIT_INST_PATH_NOT_VULN, appname, version, path);

port = get_kb_item('SMB/transport');
if (!port) port = 445;

# Paranoid - don't check for the workaround
if (report_paranoia > 1)
{
  if (report_verbosity > 0)
  {
    report += '\nNessus has not checked to see if the vendor-supplied' +
              '\nworkaround is in place.';

    security_warning(port:port, extra:report);
  }
  else
    security_warning(port:port);

  exit(0);
}

paths = make_list("BlackBerry Desktop", "BlackBerry Link");
parent_dir = path - "\BlackBerry Link";

foreach path(paths)
{
    if(hotfix_file_exists(path:parent_dir + path + "\Codecs\mc_demux_mp4_ds.ax"))
    {
      vuln = TRUE;
      break;
    }
  else
    continue;
}

if(vuln)
{
  if (report_verbosity > 0)
    security_warning(port:port, extra:report);
  else
    security_warning(port:port);

  exit(0);
}
else
{
  audit(AUDIT_INST_PATH_NOT_VULN, appname, version, path);
}

                                        
                                    
JSON Vulners Source
Initial Source


All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.If you are an owner of some content and want it to be removed, please mail to content@vulners.com Vulners, 2018
Protected by
{"id": "BLACKBERRY_LINK_1_2_3_53.NASL", "bulletinFamily": "scanner", "title": "BlackBerry Link < 1.2.3.53 Codec Demux Arbitrary Code Execution", "description": "The remote host has a version of BlackBerry Link installed that is\nprior to version 1.2.3.53. Therefore, it is affected by an arbitrary\ncode execution vulnerability in the codec demux. A remote attacker can\nexploit this, via crafted MP4 file, to execute arbitrary code.", "published": "2015-07-24T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/84987", "reporter": "This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://us.blackberry.com/software/desktop/blackberry-link", "https://salesforce.services.blackberry.com/kbredirect/KB37207"], "cvelist": ["CVE-2015-4111"], "type": "nessus", "lastseen": "2021-01-01T01:21:58", "edition": 25, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2015-4111"]}], "modified": "2021-01-01T01:21:58", "rev": 2}, "score": {"value": 7.5, "vector": "NONE", "modified": "2021-01-01T01:21:58", "rev": 2}, "vulnersScore": 7.5}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84987);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\"CVE-2015-4111\");\n script_bugtraq_id(75950);\n\n script_name(english:\"BlackBerry Link < 1.2.3.53 Codec Demux Arbitrary Code Execution\");\n script_summary(english:\"Checks version of BlackBerry Link.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has software installed that is affected by an\narbitrary code execution vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host has a version of BlackBerry Link installed that is\nprior to version 1.2.3.53. Therefore, it is affected by an arbitrary\ncode execution vulnerability in the codec demux. A remote attacker can\nexploit this, via crafted MP4 file, to execute arbitrary code.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://salesforce.services.blackberry.com/kbredirect/KB37207\");\n script_set_attribute(attribute:\"see_also\", value:\"https://us.blackberry.com/software/desktop/blackberry-link\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to BlackBerry Link 1.2.3.53.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-4111\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:blackberry:blackberry_link\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"blackberry_link_installed.nbin\");\n script_require_keys(\"SMB/blackberry_link/Installed\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\n\nkb_base = \"SMB/blackberry_link/\";\nappname = \"BlackBerry Link\";\n\npath = get_kb_item_or_exit(kb_base + \"Path\");\nversion = get_kb_item_or_exit(kb_base + \"Version\");\n\nfix = \"1.2.3.53\";\nreport = NULL;\n\n# Paranoid report is a straight version check, normal mode needs to check for the\n# affected file as well to see if the workaround has been applied.\n\nif (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)\n{\n\n port = get_kb_item('SMB/transport');\n if (!port) port = 445;\n\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n}\nelse\n audit(AUDIT_INST_PATH_NOT_VULN, appname, version, path);\n\nport = get_kb_item('SMB/transport');\nif (!port) port = 445;\n\n# Paranoid - don't check for the workaround\nif (report_paranoia > 1)\n{\n if (report_verbosity > 0)\n {\n report += '\\nNessus has not checked to see if the vendor-supplied' +\n '\\nworkaround is in place.';\n\n security_warning(port:port, extra:report);\n }\n else\n security_warning(port:port);\n\n exit(0);\n}\n\npaths = make_list(\"BlackBerry Desktop\", \"BlackBerry Link\");\nparent_dir = path - \"\\BlackBerry Link\";\n\nforeach path(paths)\n{\n if(hotfix_file_exists(path:parent_dir + path + \"\\Codecs\\mc_demux_mp4_ds.ax\"))\n {\n vuln = TRUE;\n break;\n }\n else\n continue;\n}\n\nif(vuln)\n{\n if (report_verbosity > 0)\n security_warning(port:port, extra:report);\n else\n security_warning(port:port);\n\n exit(0);\n}\nelse\n{\n audit(AUDIT_INST_PATH_NOT_VULN, appname, version, path);\n}\n", "naslFamily": "Windows", "pluginID": "84987", "cpe": ["cpe:/a:blackberry:blackberry_link"], "scheme": null}
{"cve": [{"lastseen": "2020-12-09T20:03:04", "description": "mc_demux_mp4_ds.ax in an unspecified third-party codec demux in BlackBerry Link before 1.2.3.53 with installer before 1.1.0.22 allows remote attackers to execute arbitrary code via a crafted MP4 file.", "edition": 5, "cvss3": {}, "published": "2015-07-20T01:59:00", "title": "CVE-2015-4111", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-4111"], "modified": "2017-09-22T01:29:00", "cpe": ["cpe:/a:blackberry:blackberry_link:1.2.3.52"], "id": "CVE-2015-4111", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4111", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:blackberry:blackberry_link:1.2.3.52:*:*:*:*:*:*:*"]}]}