CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:S/C:N/I:N/A:C
EPSS
Percentile
9.5%
A vulnerability in Cisco Unified Computing System (UCS) Manager could allow an authenticated, local attacker to trigger a denial of service (DoS) condition.
The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by configuring an invalid contact address for the Smart Call Home functionality. Successful exploitation could allow the attacker to trigger a DoS condition.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text in this plugin was extracted from Cisco
# Security Notice CVE-2012-4093. The text itself is
# copyright (C) Cisco.
#
include("compat.inc");
if (description)
{
script_id(72559);
script_version("1.3");
script_cvs_date("Date: 2018/11/15 20:50:20");
script_cve_id("CVE-2012-4093");
script_bugtraq_id(62456);
script_xref(name:"CISCO-BUG-ID", value:"CSCtl00186");
script_name(english:"Cisco Unified Computing System Smart Call Home Input Validation Vulnerability (CSCtl00186)");
script_summary(english:"Checks the UCS version");
script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(
attribute:"description",
value:
"A vulnerability in Cisco Unified Computing System (UCS) Manager could
allow an authenticated, local attacker to trigger a denial of service
(DoS) condition.
The vulnerability is due to improper input validation. An attacker
could exploit this vulnerability by configuring an invalid contact
address for the Smart Call Home functionality. Successful exploitation
could allow the attacker to trigger a DoS condition."
);
# https://tools.cisco.com/security/center/viewAlert.x?alertId=30859
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4a1adaec");
script_set_attribute(attribute:"solution", value:"Apply the relevant patch referenced in Cisco Bug Id CSCtl00186.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:unified_computing_system");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/09/17");
script_set_attribute(attribute:"patch_publication_date", value:"2013/09/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/18");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
script_family(english:"CISCO");
script_dependencies("cisco_ucs_manager_version.nasl");
script_require_keys("www/cisco_ucs_manager");
script_require_ports("Services/www", 80);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");
port = get_http_port(default:80);
install = get_install_from_kb(appname:'cisco_ucs_manager', port:port, exit_on_fail:TRUE);
url = build_url(qs:install['dir'] + '/', port:port);
version = install['ver'];
if (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_WEB_SERVER_VER, 'Cisco UCS Manager', port);
match = eregmatch(pattern:"^([0-9.]+)\(([^)]+)\)", string:version);
if (isnull(match)) exit(1, "Failed to parse the version of Cisco UCS Manager installed at <"+url+">.");
major = match[1];
build = match[2];
fix = "";
if (
(major == '1.0' && build =~ '^(|Base|2k)$') ||
(major == '1.1' && build =~ '^(|Base|1m)$') ||
(major == '1.2' && build =~ '^(|Base|1d)$') ||
(major == '1.3' && build =~ '^(|Base|1c|1m|1n|1o|1p|1q|1t|1w|1y|0.100)$') ||
(major == '1.4' && build =~ '^(|Base|1i|1j|1m|3i|3l|3m|3q|3s|3u|3y|4f|4g|4i|4j|4k|0.1)$') ||
(major == '2.0' && build =~ '^(|Base)$')
)
{
if (report_verbosity > 0)
{
report =
'\n URL : ' + url +
'\n Installed version : ' + version +
'\n Fixed version : 2.0(1m)' +
'\n';
security_warning(port:port, extra:report);
}
else security_warning(port);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, 'Cisco UCS Manager', url, version);