Lucene search

K
nessusThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.DWHTTP_FORMAT_STRING.NASL
HistoryAug 14, 2002 - 12:00 a.m.

Sun AnswerBook2 Web Server dwhttpd GET Request Remote Format String

2002-08-1400:00:00
This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
www.tenable.com
28

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.006

Percentile

77.8%

The remote web server is vulnerable to a format string attack.

An attacker may exploit this vulnerability to cause the web server to crash continually or even execute arbitrary code on the system.

#
# (C) Tenable Network Security, Inc.
#

# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]> (nb: this domain no longer exists)
#      Added BugtraqID
#      This script could also cover BID:1556 and CVE-2000-0697
#
# *untested*
#
# References:
#
# Date:  Thu, 1 Aug 2002 16:31:40 -0600 (MDT)		      
# From: "ghandi" <[email protected]>			      
# To: [email protected]				      
# Subject: Sun AnswerBook2 format string and other vulnerabilities
#
# Affected:
# dwhttp/4.0.2a7a, dwhttpd/4.1a6
# And others?


include("compat.inc");

if(description)
{
 script_id(11075);
 script_version ("1.32");
 script_bugtraq_id(5384);

 script_name(english:"Sun AnswerBook2 Web Server dwhttpd GET Request Remote Format String");
 
 script_set_attribute(attribute:"synopsis", value:
"It is possible to execute code on the remote host." );
 script_set_attribute(attribute:"description", value:
"The remote web server is vulnerable to a format string attack.

An attacker may exploit this vulnerability to cause the web server
to crash continually or even execute arbitrary code on the system." );
 script_set_attribute(attribute:"solution", value:
"Upgrade your software or protect it with a filtering reverse proxy." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2002/08/14");
 script_cvs_date("Date: 2018/08/08 12:52:14");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"DynaWeb server vulnerable to format string");
 script_category(ACT_DESTRUCTIVE_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");
 script_require_ports("Services/www", 8888);
 script_dependencie("find_service1.nasl", "httpver.nasl", "http_version.nasl");
 exit(0);
}

########

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

function check(port)
{
 local_var	banner, i, r;

 banner = get_http_banner(port: port);
 if ( "dwhttp/" >!< banner ) return 0;

 if(http_is_dead(port: port)) { return(0); }

 i = string("/", crap(data:"%n", length: 100));
 r = http_send_recv3(method:"GET", port: port, item: i, exit_on_fail: 0);
 if(http_is_dead(port: port, retry:2)) { security_hole(port); }
}

ports = add_port_in_list(list:get_kb_list("Services/www"), port:8888);
foreach port (ports)
{
 check(port:port);
}

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.006

Percentile

77.8%

Related for DWHTTP_FORMAT_STRING.NASL