Lucene search

K
nessusThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.HP_PERFORMANCE_CENTER_MMS_BUFFER_OVERFLOW.NASL
HistoryJan 03, 2017 - 12:00 a.m.

HP Performance Center MMS Protocol Buffer Overflow RCE

2017-01-0300:00:00
This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.018 Low

EPSS

Percentile

88.4%

The version of HP Performance Center installed on the remote Windows host is affected by an unspecified buffer overflow condition in the MMS protocol due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(96271);
  script_version("1.6");
  script_cvs_date("Date: 2019/11/13");

  script_cve_id("CVE-2016-8512");
  script_xref(name:"HP", value:"emr_na-c05354136");
  script_xref(name:"HP", value:"HPSBGN03679");

  script_name(english:"HP Performance Center MMS Protocol Buffer Overflow RCE");
  script_summary(english:"Checks if MMSEngine.dll or MM1Client.dll are present.");

  script_set_attribute(attribute:"synopsis", value:
"An application installed on the remote Windows host is affected by a
remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of HP Performance Center installed on the remote Windows
host is affected by an unspecified buffer overflow condition in the
MMS protocol due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this to cause a denial of
service condition or the execution of arbitrary code.");
  # https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05354136
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3078d514");
  script_set_attribute(attribute:"solution", value:
"Remove the files MMSEngine.dll and MM1Client.dll as directed by HP.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-8512");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/12/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/12/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/01/03");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:performance_center");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("hp_performance_center_installed.nbin");
  script_require_keys("installed_sw/HP Performance Center");
  script_require_ports(139, 445);

  exit(0);
}

include('global_settings.inc');
include('audit.inc');
include('misc_func.inc');
include("install_func.inc");
include("smb_func.inc");
include("smb_hotfixes_fcheck.inc");

app_name = "HP Performance Center";

install = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);
version = install['version'];
path    = install['path'];

files   = make_list("bin\MMSEngine.dll", "bin\MM1Client.dll");

# MMS protocol deprecated in 12.53, so prevent from flagging on this and above
if (ver_compare(ver:version,fix:"12.53", strict:FALSE) >= 0)
  audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);

foreach file (files)
{
  dllpath = path + file;

  res = hotfix_file_exists(path:dllpath);

  if(isnull(res)) audit(AUDIT_FN_FAIL, 'hotfix_file_exists');
  else if (res)
  {
    file = ereg_replace(pattern:"^bin\\", string:file, replace:"");
    report +=
        '\n  Path              : ' + dllpath +
        '\n  File              : ' + file  +
        '\n';
  }
}
hotfix_check_fversion_end();

# Both DLLs removed
if(isnull(report))
  audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);

port   = port = get_kb_item('SMB/transport');
if (!port) port = 445;

report =
    '\n  Product Root path : ' + path +
    '\n  Product version   : ' + version +
    '\n' + report;

security_report_v4(severity:SECURITY_HOLE, port:port, extra:report);
exit(0);
VendorProductVersionCPE
hpperformance_centercpe:/a:hp:performance_center

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.018 Low

EPSS

Percentile

88.4%

Related for HP_PERFORMANCE_CENTER_MMS_BUFFER_OVERFLOW.NASL