Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.NGIRCD_FMT_STRING.NASL
HistoryFeb 03, 2005 - 12:00 a.m.

ngIRCd < 0.8.3 Log_Resolver() Format String

2005-02-0300:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
10

According to its banner, the version of the ngIRCd chat service running on the remote host contains a format string vulnerability. If it was compiled with IDENT, DEBUG is enabled, and it’s logging to SYSLOG, a remote attacker can leverage this issue to execute arbitrary code on the remote host subject to the privileges under which the service operates, which is ‘root’ by default.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(16310);
 script_version ("1.12");
 script_cve_id("CVE-2005-0226");
 script_bugtraq_id(12434);
 
 script_name(english:"ngIRCd < 0.8.3 Log_Resolver() Format String");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote chat server is affected by a format string vulnerability." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the version of the ngIRCd chat service
running on the remote host contains a format string vulnerability.  If
it was compiled with IDENT, DEBUG is enabled, and it's logging to
SYSLOG, a remote attacker can leverage this issue to execute arbitrary
code on the remote host subject to the privileges under which the
service operates, which is 'root' by default." );
 script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=110746413108183&w=2" );
 script_set_attribute(attribute:"see_also", value:"http://ngircd.barton.de/doc/ChangeLog" );
 script_set_attribute(attribute:"see_also", value:"https://arthur.barton.de/pipermail/ngircd-ml/2005-February/000234.html" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to ngIRCd 0.8.3 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/02/03");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/02/02");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"checks the version of the remote ircd");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");
 script_dependencie("ircd.nasl");
 script_require_ports("Services/irc", 6667);
 exit(0);
}

#

port = get_kb_item("Services/irc");
if (!port) port = 6667;
if(! get_port_state(port)) exit(0);

key = string("irc/banner/", port);
banner = get_kb_item(key);
if(!banner)exit(0);

if(egrep(pattern:".*ngircd-0\.([0-7]\.|8\.[0-2][^0-9]).*", string:banner)) 
{
 security_hole(port);
 exit(0);
}
Related for NGIRCD_FMT_STRING.NASL