Lucene search

K
nessusThis script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.PRINTERLOGIC_CLIENT_MAY_3_2019.NASL
HistoryJul 27, 2021 - 12:00 a.m.

PrinterLogic Client Multiple Vulnerabilities (May 3, 2019)

2021-07-2700:00:00
This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14
printerlogic
vulnerabilities
ssl certificate
code execution
remote changes
unvalidated certificate
dns spoofing
arbitrary code
nessus
version number
security document

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

65.3%

The version of PrinterLogic Client installed on the remote host is affected by the following vulnerabilities:

  • The PrinterLogic Print Management software does not validate, or incorrectly validates, the PrinterLogic management portal’s SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. (CVE-2018-5408)

  • The PrinterLogic Print Management software updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit. (CVE-2018-5409)

  • The PrinterLogic Print Management software does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges. (CVE-2019-9505)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');

include('compat.inc');

if (description)
{
  script_id(152101);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/07/28");

  script_cve_id("CVE-2018-5408", "CVE-2018-5409", "CVE-2019-9505");

  script_name(english:"PrinterLogic Client Multiple Vulnerabilities (May 3, 2019)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an application installed that is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of PrinterLogic Client installed on the remote host is affected by the following vulnerabilities:

  - The PrinterLogic Print Management software does not validate, or incorrectly validates, the PrinterLogic
    management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an
    attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect
    to a malicious host while believing it is a trusted host, or the software might be deceived into accepting
    spoofed data that appears to originate from a trusted host. (CVE-2018-5408)

  - The PrinterLogic Print Management software updates and executes the code without sufficiently verifying
    the origin and integrity of the code. An attacker can execute malicious code by compromising the host
    server, performing DNS spoofing, or modifying the code in transit. (CVE-2018-5409)

  - The PrinterLogic Print Management software does not sanitize special characters allowing for remote
    unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute
    arbitrary code with SYSTEM privileges. (CVE-2019-9505)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://www.printerlogic.com/security-bulletin/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to PrinterLogic software for Windows version 25.0.0.49 or later, or PrinterLogic software for Mac and
Linux version 25.1.0.274 or later, and apply the configuration mentioned in the vendor advisory.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-9505");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/03");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/05/03");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/07/27");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:printerlogic:print_management");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("printerlogic_printer_installer_client_mac_installed.nbin", "printerlogic_printer_installer_client_nix_installed.nbin", "printerlogic_printer_installer_client_win_installed.nbin", "os_fingerprint.nasl");
  script_require_ports("installed_sw/PrinterLogic Printer Installer Client");

  exit(0);
}

include('vcf.inc');

var os = get_kb_item_or_exit('Host/OS');
var app_info;
var win_local = FALSE;
var constraints;
var app_name = 'PrinterLogic Printer Installer Client';

if (tolower(os) =~ 'windows')
{
  get_kb_item_or_exit('SMB/Registry/Enumerated');
  win_local = TRUE;
  app_info = vcf::get_app_info(app:app_name, win_local:TRUE);
  constraints = [
    { 'fixed_version' : '25.0.0.49' }
  ];

}
else if (tolower(os) =~ 'linux|mac os')
{
  get_kb_item_or_exit('Host/local_checks_enabled');
  app_info = vcf::get_app_info(app:app_name);
  constraints = [
    { 'fixed_version' : '25.1.0.274' }
  ];
}
else
{
  audit(AUDIT_OS_NOT,'affected');
}

# Require paranoia to flag on package manager install
if ('via package manager' >< app_info.path && report_paranoia < 2)
  audit(AUDIT_MANAGED_INSTALL, app_name);

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

65.3%

Related for PRINTERLOGIC_CLIENT_MAY_3_2019.NASL