The remote host is running IBM Tivoli Provisioning Manager for OS Deployment. The version of this software contains multiple unspecified memory corruption vulnerabilities in the HTTP server.
A remote attacker may exploit these flaws to crash the service or execute code on the remote host with the privileges of the TPM server.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(25005);
script_version("1.15");
script_cve_id("CVE-2007-1868");
script_bugtraq_id(23264);
script_name(english:"IBM Tivoli Provisioning Manager OS Deployment Multiple Unspecified Input Validation Vulnerabilities");
script_summary(english:"Gets IBM TPM for OS Deployment Server version");
script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple vulnerabilities." );
script_set_attribute(attribute:"description", value:
"The remote host is running IBM Tivoli Provisioning Manager for OS
Deployment. The version of this software contains multiple
unspecified memory corruption vulnerabilities in the HTTP server.
A remote attacker may exploit these flaws to crash the service or
execute code on the remote host with the privileges of the TPM server." );
# http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=498
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c482fc38" );
script_set_attribute(attribute:"solution", value:
"Install TPM for OS Deployment FIx Pack 2." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'IBM TPM for OS Deployment 5.1.0.x rembo.exe Buffer Overflow');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"plugin_publication_date", value: "2007/04/07");
script_set_attribute(attribute:"patch_publication_date", value: "2007/04/01");
script_set_attribute(attribute:"vuln_publication_date", value: "2007/04/01");
script_cvs_date("Date: 2018/07/12 19:01:16");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:ibm:tivoli_provisioning_manager_os_deployment");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
script_dependencies("http_version.nasl");
script_require_ports("Services/www", 8080, 443);
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:8080);
banner = get_http_banner(port:port);
if ("Server: Rembo" >!< banner)
exit (0);
w = http_send_recv3(method:"GET", item:"/builtin/index.html", port:port);
if (isnull(w)) exit(1, "the web server did not answer");
res = w[2];
pat = '<p style="font: 12px Verdana, Geneva, Arial, Helvetica, sans-serif;"><b>TPMfOSd ([0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+) \\(build [0-9]+\\.[0-9]+\\)</b>.*';
vers = egrep(pattern:pat, string:res);
if (!vers)
exit (0);
vers = ereg_replace(pattern:pat, string:vers, replace:"\1");
vers = split (vers, sep:".", keep:FALSE);
if ( (int(vers[0]) < 5) ||
(int(vers[0]) == 5 && int(vers[1]) < 1) ||
(int(vers[0]) == 5 && int(vers[1]) == 1 && int(vers[2]) == 0 && int(vers[3]) < 2) )
security_hole(port);
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | tivoli_provisioning_manager_os_deployment | cpe:/a:ibm:tivoli_provisioning_manager_os_deployment |