Lucene search

K
nessusThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.CFENGINE_FORMAT_STRING_VULN.NASL
HistoryAug 20, 2004 - 12:00 a.m.

Cfengine CAUTH Command Remote Format String

2004-08-2000:00:00
This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
8

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

69.8%

Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a remote-configuration client to cfengine. This version of cfd contains several flaws in the way that it calls syslog(). As a result, trusted hosts and valid users (if access controls are not in place) can cause the vulnerable host to log malicious data which, when logged, can either crash the server or execute arbitrary code on the stack. In the latter case, the code would be executed as the ‘root’ user.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(14316);
 script_version("1.17");
 script_cvs_date("Date: 2018/07/03 15:35:24");

 script_cve_id("CVE-2000-0947");
 script_bugtraq_id(1757);

 script_name(english:"Cfengine CAUTH Command Remote Format String");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a remote command execution 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a 
remote-configuration client to cfengine.  This version of cfd contains 
several flaws in the way that it calls syslog().  As a result, trusted
hosts and valid users (if access controls are not in place) can cause
the vulnerable host to log malicious data which, when logged, can 
either crash the server or execute arbitrary code on the stack.  In 
the latter case, the code would be executed as the 'root' user." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2328dff9" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to 1.6.0a11 or newer" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/08/20");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/10/01");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_end_attributes();
 
 script_summary(english:"check for cfengine flaw based on its version");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Gain a shell remotely");
 script_require_ports(5308);

 script_dependencies("cfengine_detect.nasl");
 exit(0);
}

port = 5308;
if ( ! get_kb_item("cfengine/running") ) exit(0);

version = get_kb_item("cfengine/version");

if (version)
{
 	if (egrep(pattern:"^1\.([0-5]\..*|6\.0a([0-9]|10)[^0-9])", string:version))
  		security_hole(port);
}

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

69.8%

Related for CFENGINE_FORMAT_STRING_VULN.NASL