Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow
2011-01-12T00:00:00
ID ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL Type nessus Reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. Modified 2019-11-02T00:00:00
Description
According to its reported version, the Rocket Software UniVerse or
UniData install on the remote Windows host is affected by a buffer
overflow vulnerability. The application fails to properly validate a
size value in a RPC packet header before using it to determine the
number of bytes to receive.
An unauthenticated, remote attacker can exploit this to execute
arbitrary code on the remote host with SYSTEM level privileges.
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(51463);
script_version("1.10");
script_cvs_date("Date: 2018/11/15 20:50:28");
script_bugtraq_id(45569);
script_name(english:"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow");
script_summary(english:"Checks version of UniData/UniVerse");
script_set_attribute(attribute:"synopsis", value:
"A database application installed on the remote host is affected by a
buffer overflow vulnerability.");
script_set_attribute(attribute:"description", value:
"According to its reported version, the Rocket Software UniVerse or
UniData install on the remote Windows host is affected by a buffer
overflow vulnerability. The application fails to properly validate a
size value in a RPC packet header before using it to determine the
number of bytes to receive.
An unauthenticated, remote attacker can exploit this to execute
arbitrary code on the remote host with SYSTEM level privileges.");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-10-294/");
script_set_attribute(attribute:"solution", value:"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/12/23");
script_set_attribute(attribute:"patch_publication_date", value:"2010/12/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/12");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"x-cpe:/a:rocketsoftware:unidata");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
script_dependencies("rocketsoftware_universe_detect.nasl", "rocketsoftware_unidata_detect.nasl");
script_require_ports("SMB/RocketSoftware/UniVerse/Version", "SMB/RocketSoftware/UniData/installed");
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
# Determine which products are installed.
prod = make_list();
if (get_kb_item("SMB/RocketSoftware/UniVerse/Version"))
{
prod = make_list(prod, "UniVerse");
}
if (get_kb_item("SMB/RocketSoftware/UniData/installed"))
{
prod = make_list(prod, "UniData");
}
if (max_index(prod) == 0) exit(0, "Neither UniVerse nor UniData are installed on the remote host.");
# Check each installed product
info = '';
for (i=0; i<max_index(prod); i++)
{
if (prod[i] == 'UniVerse')
{
path = get_kb_item_or_exit("SMB/RocketSoftware/UniVerse/Path");
version = get_kb_item_or_exit("SMB/RocketSoftware/UniVerse/Version");
fix = '10.3.9';
if (ver_compare(ver:version, fix:fix) == -1)
{
info +=
'\n Product : UniVerse' +
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : ' + fix + '\n';
}
}
if (prod[i] == 'UniData')
{
installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');
if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');
else
{
foreach item (keys(installs))
{
ver = item - 'SMB/RocketSoftware/UniData/';
ver = ver - '/path';
ver = split(ver, sep:'.', keep:FALSE);
version = ver[0] + '.' + ver[1] + '.' + ver[2];
if (ver_compare(ver:version, fix:'7.2.8') == -1)
{
info +=
'\n Product : UniData' +
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : 7.2.8\n';
}
}
}
}
}
if (info)
{
if (report_verbosity > 0) security_hole(port:get_kb_item("SMB/transport"), extra:info);
else security_hole(port:get_kb_item("SMB/transport"));
}
else exit(0, "The host is not affected.");
{"id": "ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL", "bulletinFamily": "scanner", "title": "Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow", "description": "According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.", "published": "2011-01-12T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/51463", "reporter": "This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.", "references": ["https://www.zerodayinitiative.com/advisories/ZDI-10-294/"], "cvelist": [], "type": "nessus", "lastseen": "2019-11-01T03:29:32", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["x-cpe:/a:rocketsoftware:unidata"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "According to its reported version, the Rocket Software UniVerse or UniData install on the remote Windows host is affected by a buffer overflow vulnerability. The application fails to properly validate a size value in a RPC packet header before using it to determine the number of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute arbitrary code on the remote host with SYSTEM level privileges.", "edition": 3, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "060bdef23f9694280ee6ca7f587513cfc26371aff38373461c8afe925677ff6c", "hashmap": [{"hash": "aea23489ce3aa9b6406ebb28e0cda430", "key": "naslFamily"}, {"hash": "0e81155ef2a5bb0e15d3365024426ad4", "key": "published"}, {"hash": "b1898c0d433315b23de2b7d7cc33a440", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "f2a4309400b8bfb6816f838a5729815b", "key": "pluginID"}, {"hash": "a55113ed7d4491db1cee332fe01b0199", "key": "cpe"}, {"hash": "f6c3b96c4a90e46bc370953a52e3e360", "key": "title"}, {"hash": "63329048f010c87d85370bb01ea70b93", "key": "modified"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "85540f6397013cce1bbd40d9ab4d47e2", "key": "sourceData"}, {"hash": "6c2d1452f213f086c0297b6bbc98a1b2", "key": "href"}, {"hash": "847dac21354ff0d3e58c220690b158e3", "key": "description"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=51463", "id": "ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL", "lastseen": "2018-08-10T17:19:58", "modified": "2018-08-08T00:00:00", "naslFamily": "Windows", "objectVersion": "1.3", "pluginID": "51463", "published": "2011-01-12T00:00:00", "references": ["http://www.zerodayinitiative.com/advisories/ZDI-10-294/"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51463);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/08/08 12:52:15\");\n\n script_bugtraq_id(45569);\n\n script_name(english:\"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow\");\n script_summary(english:\"Checks version of UniData/UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A database application installed on the remote host is affected by a\nbuffer overflow vulnerability.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-10-294/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:unidata\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"rocketsoftware_universe_detect.nasl\", \"rocketsoftware_unidata_detect.nasl\");\n script_require_ports(\"SMB/RocketSoftware/UniVerse/Version\", \"SMB/RocketSoftware/UniData/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Determine which products are installed.\nprod = make_list();\n\nif (get_kb_item(\"SMB/RocketSoftware/UniVerse/Version\"))\n{\n prod = make_list(prod, \"UniVerse\");\n}\nif (get_kb_item(\"SMB/RocketSoftware/UniData/installed\"))\n{\n prod = make_list(prod, \"UniData\");\n}\n\nif (max_index(prod) == 0) exit(0, \"Neither UniVerse nor UniData are installed on the remote host.\");\n\n# Check each installed product\ninfo = '';\n\nfor (i=0; i<max_index(prod); i++)\n{\n if (prod[i] == 'UniVerse')\n {\n path = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Path\");\n version = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Version\");\n fix = '10.3.9';\n if (ver_compare(ver:version, fix:fix) == -1)\n {\n info += \n '\\n Product : UniVerse' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n }\n }\n if (prod[i] == 'UniData')\n {\n installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');\n if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');\n else\n {\n foreach item (keys(installs))\n {\n ver = item - 'SMB/RocketSoftware/UniData/';\n ver = ver - '/path';\n ver = split(ver, sep:'.', keep:FALSE);\n\n version = ver[0] + '.' + ver[1] + '.' + ver[2];\n if (ver_compare(ver:version, fix:'7.2.8') == -1)\n {\n info +=\n '\\n Product : UniData' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 7.2.8\\n';\n }\n }\n }\n }\n}\n\nif (info)\n{\n if (report_verbosity > 0) security_hole(port:get_kb_item(\"SMB/transport\"), extra:info);\n else security_hole(port:get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected.\");\n", "title": "Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow", "type": "nessus", "viewCount": 7}, "differentElements": ["references", "modified", "sourceData"], "edition": 3, "lastseen": "2018-08-10T17:19:58"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "According to its reported version, the Rocket Software UniVerse or UniData install on the remote Windows host is affected by a buffer overflow vulnerability. The application fails to properly validate a size value in a RPC packet header before using it to determine the number of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute arbitrary code on the remote host with SYSTEM level privileges.", "edition": 1, "enchantments": {}, "hash": "df606a25a1a387b571740fb677b5440ff8b30edc3ed707273e655560a03b3d5b", "hashmap": [{"hash": "98ae4c6e84cb11bcd0321e861a7b309b", "key": "sourceData"}, {"hash": "d4d064cfe0e4042b38911306aeefc42e", "key": "modified"}, {"hash": "aea23489ce3aa9b6406ebb28e0cda430", "key": "naslFamily"}, {"hash": "0e81155ef2a5bb0e15d3365024426ad4", "key": "published"}, {"hash": "b1898c0d433315b23de2b7d7cc33a440", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "f2a4309400b8bfb6816f838a5729815b", "key": "pluginID"}, {"hash": "f6c3b96c4a90e46bc370953a52e3e360", "key": "title"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "6c2d1452f213f086c0297b6bbc98a1b2", "key": "href"}, {"hash": "847dac21354ff0d3e58c220690b158e3", "key": "description"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=51463", "id": "ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL", "lastseen": "2016-09-26T17:25:26", "modified": "2016-05-13T00:00:00", "naslFamily": "Windows", "objectVersion": "1.2", "pluginID": "51463", "published": "2011-01-12T00:00:00", "references": ["http://www.zerodayinitiative.com/advisories/ZDI-10-294/"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51463);\n script_version(\"$Revision: 1.6 $\");\n script_cvs_date(\"$Date: 2016/05/13 15:33:29 $\");\n\n script_bugtraq_id(45569);\n script_osvdb_id(70181);\n\n script_name(english:\"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow\");\n script_summary(english:\"Checks version of UniData/UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A database application installed on the remote host is affected by a\nbuffer overflow vulnerability.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-10-294/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.\");\n\n script_dependencies(\"rocketsoftware_universe_detect.nasl\", \"rocketsoftware_unidata_detect.nasl\");\n script_require_ports(\"SMB/RocketSoftware/UniVerse/Version\", \"SMB/RocketSoftware/UniData/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Determine which products are installed.\nprod = make_list();\n\nif (get_kb_item(\"SMB/RocketSoftware/UniVerse/Version\"))\n{\n prod = make_list(prod, \"UniVerse\");\n}\nif (get_kb_item(\"SMB/RocketSoftware/UniData/installed\"))\n{\n prod = make_list(prod, \"UniData\");\n}\n\nif (max_index(prod) == 0) exit(0, \"Neither UniVerse nor UniData are installed on the remote host.\");\n\n# Check each installed product\ninfo = '';\n\nfor (i=0; i<max_index(prod); i++)\n{\n if (prod[i] == 'UniVerse')\n {\n path = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Path\");\n version = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Version\");\n fix = '10.3.9';\n if (ver_compare(ver:version, fix:fix) == -1)\n {\n info += \n '\\n Product : UniVerse' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n }\n }\n if (prod[i] == 'UniData')\n {\n installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');\n if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');\n else\n {\n foreach item (keys(installs))\n {\n ver = item - 'SMB/RocketSoftware/UniData/';\n ver = ver - '/path';\n ver = split(ver, sep:'.', keep:FALSE);\n\n version = ver[0] + '.' + ver[1] + '.' + ver[2];\n if (ver_compare(ver:version, fix:'7.2.8') == -1)\n {\n info +=\n '\\n Product : UniData' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 7.2.8\\n';\n }\n }\n }\n }\n}\n\nif (info)\n{\n if (report_verbosity > 0) security_hole(port:get_kb_item(\"SMB/transport\"), extra:info);\n else security_hole(port:get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected.\");\n", "title": "Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow", "type": "nessus", "viewCount": 3}, "differentElements": ["modified", "cpe", "sourceData"], "edition": 1, "lastseen": "2016-09-26T17:25:26"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["x-cpe:/a:rocketsoftware:unidata"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.", "edition": 7, "enchantments": {"dependencies": {"modified": "2019-10-28T21:16:39", "references": [{"idList": ["ROCKETSOFTWARE_UNIDATA_DETECT.NASL", "ROCKETSOFTWARE_UNIVERSE_DETECT.NASL"], "type": "nessus"}]}, "score": {"modified": "2019-10-28T21:16:39", "value": 1.5, "vector": "NONE"}}, "hash": "219ef380b5b1959e01d1e40ff9405063b21a3cb16b6b61ea0da3fb1be4050eae", "hashmap": [{"hash": "36192b4e4bdf96416b4a970f5e7f58e4", "key": "href"}, {"hash": "aea23489ce3aa9b6406ebb28e0cda430", "key": "naslFamily"}, {"hash": "0e81155ef2a5bb0e15d3365024426ad4", "key": "published"}, {"hash": "b7c3e84811d0ea533cb3ed58a2f3ff9c", "key": "references"}, {"hash": "f2a4309400b8bfb6816f838a5729815b", "key": "pluginID"}, {"hash": "a55113ed7d4491db1cee332fe01b0199", "key": "cpe"}, {"hash": "f6c3b96c4a90e46bc370953a52e3e360", "key": "title"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "04f040089e66c108a96521a8783ba2e1", "key": "sourceData"}, {"hash": "33343e1ae53d3b18311f8f7cae2b7529", "key": "reporter"}, {"hash": "a9ae254aefec324e7cad3e9b40cdb8f7", "key": "description"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/51463", "id": "ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL", "lastseen": "2019-10-28T21:16:39", "modified": "2019-10-02T00:00:00", "naslFamily": "Windows", "objectVersion": "1.3", "pluginID": "51463", "published": "2011-01-12T00:00:00", "references": ["https://www.zerodayinitiative.com/advisories/ZDI-10-294/"], "reporter": "This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51463);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/11/15 20:50:28\");\n\n script_bugtraq_id(45569);\n\n script_name(english:\"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow\");\n script_summary(english:\"Checks version of UniData/UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A database application installed on the remote host is affected by a\nbuffer overflow vulnerability.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-10-294/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:unidata\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"rocketsoftware_universe_detect.nasl\", \"rocketsoftware_unidata_detect.nasl\");\n script_require_ports(\"SMB/RocketSoftware/UniVerse/Version\", \"SMB/RocketSoftware/UniData/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Determine which products are installed.\nprod = make_list();\n\nif (get_kb_item(\"SMB/RocketSoftware/UniVerse/Version\"))\n{\n prod = make_list(prod, \"UniVerse\");\n}\nif (get_kb_item(\"SMB/RocketSoftware/UniData/installed\"))\n{\n prod = make_list(prod, \"UniData\");\n}\n\nif (max_index(prod) == 0) exit(0, \"Neither UniVerse nor UniData are installed on the remote host.\");\n\n# Check each installed product\ninfo = '';\n\nfor (i=0; i<max_index(prod); i++)\n{\n if (prod[i] == 'UniVerse')\n {\n path = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Path\");\n version = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Version\");\n fix = '10.3.9';\n if (ver_compare(ver:version, fix:fix) == -1)\n {\n info += \n '\\n Product : UniVerse' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n }\n }\n if (prod[i] == 'UniData')\n {\n installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');\n if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');\n else\n {\n foreach item (keys(installs))\n {\n ver = item - 'SMB/RocketSoftware/UniData/';\n ver = ver - '/path';\n ver = split(ver, sep:'.', keep:FALSE);\n\n version = ver[0] + '.' + ver[1] + '.' + ver[2];\n if (ver_compare(ver:version, fix:'7.2.8') == -1)\n {\n info +=\n '\\n Product : UniData' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 7.2.8\\n';\n }\n }\n }\n }\n}\n\nif (info)\n{\n if (report_verbosity > 0) security_hole(port:get_kb_item(\"SMB/transport\"), extra:info);\n else security_hole(port:get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected.\");\n", "title": "Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow", "type": "nessus", "viewCount": 10}, "differentElements": ["modified"], "edition": 7, "lastseen": "2019-10-28T21:16:39"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["x-cpe:/a:rocketsoftware:unidata"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "According to its reported version, the Rocket Software UniVerse or UniData install on the remote Windows host is affected by a buffer overflow vulnerability. The application fails to properly validate a size value in a RPC packet header before using it to determine the number of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute arbitrary code on the remote host with SYSTEM level privileges.", "edition": 2, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "5860b64e001fe9fd94e53a6cfb3b5fd0847ddb5ff7929b9c1769d9b09d990b58", "hashmap": [{"hash": "aea23489ce3aa9b6406ebb28e0cda430", "key": "naslFamily"}, {"hash": "0e81155ef2a5bb0e15d3365024426ad4", "key": "published"}, {"hash": "b1898c0d433315b23de2b7d7cc33a440", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "f2a4309400b8bfb6816f838a5729815b", "key": "pluginID"}, {"hash": "a55113ed7d4491db1cee332fe01b0199", "key": "cpe"}, {"hash": "f6c3b96c4a90e46bc370953a52e3e360", "key": "title"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "db71a6c38728f99790b02ede675c9a8a", "key": "sourceData"}, {"hash": "4177cfab30bf9f48767b3f5f7a715513", "key": "modified"}, {"hash": "6c2d1452f213f086c0297b6bbc98a1b2", "key": "href"}, {"hash": "847dac21354ff0d3e58c220690b158e3", "key": "description"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=51463", "id": "ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL", "lastseen": "2017-12-03T11:16:24", "modified": "2017-12-01T00:00:00", "naslFamily": "Windows", "objectVersion": "1.3", "pluginID": "51463", "published": "2011-01-12T00:00:00", "references": ["http://www.zerodayinitiative.com/advisories/ZDI-10-294/"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51463);\n script_version(\"$Revision: 1.7 $\");\n script_cvs_date(\"$Date: 2017/12/01 16:28:36 $\");\n\n script_bugtraq_id(45569);\n script_osvdb_id(70181);\n\n script_name(english:\"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow\");\n script_summary(english:\"Checks version of UniData/UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A database application installed on the remote host is affected by a\nbuffer overflow vulnerability.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"http://www.zerodayinitiative.com/advisories/ZDI-10-294/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:unidata\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.\");\n\n script_dependencies(\"rocketsoftware_universe_detect.nasl\", \"rocketsoftware_unidata_detect.nasl\");\n script_require_ports(\"SMB/RocketSoftware/UniVerse/Version\", \"SMB/RocketSoftware/UniData/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Determine which products are installed.\nprod = make_list();\n\nif (get_kb_item(\"SMB/RocketSoftware/UniVerse/Version\"))\n{\n prod = make_list(prod, \"UniVerse\");\n}\nif (get_kb_item(\"SMB/RocketSoftware/UniData/installed\"))\n{\n prod = make_list(prod, \"UniData\");\n}\n\nif (max_index(prod) == 0) exit(0, \"Neither UniVerse nor UniData are installed on the remote host.\");\n\n# Check each installed product\ninfo = '';\n\nfor (i=0; i<max_index(prod); i++)\n{\n if (prod[i] == 'UniVerse')\n {\n path = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Path\");\n version = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Version\");\n fix = '10.3.9';\n if (ver_compare(ver:version, fix:fix) == -1)\n {\n info += \n '\\n Product : UniVerse' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n }\n }\n if (prod[i] == 'UniData')\n {\n installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');\n if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');\n else\n {\n foreach item (keys(installs))\n {\n ver = item - 'SMB/RocketSoftware/UniData/';\n ver = ver - '/path';\n ver = split(ver, sep:'.', keep:FALSE);\n\n version = ver[0] + '.' + ver[1] + '.' + ver[2];\n if (ver_compare(ver:version, fix:'7.2.8') == -1)\n {\n info +=\n '\\n Product : UniData' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 7.2.8\\n';\n }\n }\n }\n }\n}\n\nif (info)\n{\n if (report_verbosity > 0) security_hole(port:get_kb_item(\"SMB/transport\"), extra:info);\n else security_hole(port:get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected.\");\n", "title": "Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow", "type": "nessus", "viewCount": 5}, "differentElements": ["modified", "sourceData"], "edition": 2, "lastseen": "2017-12-03T11:16:24"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["x-cpe:/a:rocketsoftware:unidata"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-01-16T20:11:35", "references": [{"idList": ["ROCKETSOFTWARE_UNIDATA_DETECT.NASL"], "type": "nessus"}]}, "score": {"value": 7.5, "vector": "NONE"}}, "hash": "f337d44a785323597cb6b77943116e5d582e0c7f2d513d462c7c6e191346c275", "hashmap": [{"hash": "aea23489ce3aa9b6406ebb28e0cda430", "key": "naslFamily"}, {"hash": "0e81155ef2a5bb0e15d3365024426ad4", "key": "published"}, {"hash": "b7c3e84811d0ea533cb3ed58a2f3ff9c", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "015cb78ce50d3bd4e2fbe18f25603329", "key": "modified"}, {"hash": "f2a4309400b8bfb6816f838a5729815b", "key": "pluginID"}, {"hash": "a55113ed7d4491db1cee332fe01b0199", "key": "cpe"}, {"hash": "f6c3b96c4a90e46bc370953a52e3e360", "key": "title"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "04f040089e66c108a96521a8783ba2e1", "key": "sourceData"}, {"hash": "6c2d1452f213f086c0297b6bbc98a1b2", "key": "href"}, {"hash": "a9ae254aefec324e7cad3e9b40cdb8f7", "key": "description"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=51463", "id": "ROCKETSOFTWARE_UNIVERSE_UNIDATA_CODE_EXEC.NASL", "lastseen": "2019-01-16T20:11:35", "modified": "2018-11-15T00:00:00", "naslFamily": "Windows", "objectVersion": "1.3", "pluginID": "51463", "published": "2011-01-12T00:00:00", "references": ["https://www.zerodayinitiative.com/advisories/ZDI-10-294/"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51463);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/11/15 20:50:28\");\n\n script_bugtraq_id(45569);\n\n script_name(english:\"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow\");\n script_summary(english:\"Checks version of UniData/UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A database application installed on the remote host is affected by a\nbuffer overflow vulnerability.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-10-294/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:unidata\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"rocketsoftware_universe_detect.nasl\", \"rocketsoftware_unidata_detect.nasl\");\n script_require_ports(\"SMB/RocketSoftware/UniVerse/Version\", \"SMB/RocketSoftware/UniData/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Determine which products are installed.\nprod = make_list();\n\nif (get_kb_item(\"SMB/RocketSoftware/UniVerse/Version\"))\n{\n prod = make_list(prod, \"UniVerse\");\n}\nif (get_kb_item(\"SMB/RocketSoftware/UniData/installed\"))\n{\n prod = make_list(prod, \"UniData\");\n}\n\nif (max_index(prod) == 0) exit(0, \"Neither UniVerse nor UniData are installed on the remote host.\");\n\n# Check each installed product\ninfo = '';\n\nfor (i=0; i<max_index(prod); i++)\n{\n if (prod[i] == 'UniVerse')\n {\n path = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Path\");\n version = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Version\");\n fix = '10.3.9';\n if (ver_compare(ver:version, fix:fix) == -1)\n {\n info += \n '\\n Product : UniVerse' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n }\n }\n if (prod[i] == 'UniData')\n {\n installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');\n if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');\n else\n {\n foreach item (keys(installs))\n {\n ver = item - 'SMB/RocketSoftware/UniData/';\n ver = ver - '/path';\n ver = split(ver, sep:'.', keep:FALSE);\n\n version = ver[0] + '.' + ver[1] + '.' + ver[2];\n if (ver_compare(ver:version, fix:'7.2.8') == -1)\n {\n info +=\n '\\n Product : UniData' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 7.2.8\\n';\n }\n }\n }\n }\n}\n\nif (info)\n{\n if (report_verbosity > 0) security_hole(port:get_kb_item(\"SMB/transport\"), extra:info);\n else security_hole(port:get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected.\");\n", "title": "Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow", "type": "nessus", "viewCount": 9}, "differentElements": ["description"], "edition": 5, "lastseen": "2019-01-16T20:11:35"}], "edition": 8, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "a55113ed7d4491db1cee332fe01b0199"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "a9ae254aefec324e7cad3e9b40cdb8f7"}, {"key": "href", "hash": "36192b4e4bdf96416b4a970f5e7f58e4"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "aea23489ce3aa9b6406ebb28e0cda430"}, {"key": "pluginID", "hash": "f2a4309400b8bfb6816f838a5729815b"}, {"key": "published", "hash": "0e81155ef2a5bb0e15d3365024426ad4"}, {"key": "references", "hash": "b7c3e84811d0ea533cb3ed58a2f3ff9c"}, {"key": "reporter", "hash": "33343e1ae53d3b18311f8f7cae2b7529"}, {"key": "sourceData", "hash": "04f040089e66c108a96521a8783ba2e1"}, {"key": "title", "hash": "f6c3b96c4a90e46bc370953a52e3e360"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "a943984f7bf652e7fff7ef792ccc14e2f40f456c369d7e117a1f987f3e45bf7b", "viewCount": 10, "enchantments": {"dependencies": {"references": [{"type": "nessus", "idList": ["ROCKETSOFTWARE_UNIVERSE_DETECT.NASL", "ROCKETSOFTWARE_UNIDATA_DETECT.NASL"]}], "modified": "2019-11-01T03:29:32"}, "score": {"value": 1.5, "vector": "NONE", "modified": "2019-11-01T03:29:32"}, "vulnersScore": 1.5}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51463);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/11/15 20:50:28\");\n\n script_bugtraq_id(45569);\n\n script_name(english:\"Rocket Software UniData/UniVerse unirpc32.dll Uni RPC Service Packet Header Remote Overflow\");\n script_summary(english:\"Checks version of UniData/UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A database application installed on the remote host is affected by a\nbuffer overflow vulnerability.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"According to its reported version, the Rocket Software UniVerse or\nUniData install on the remote Windows host is affected by a buffer\noverflow vulnerability. The application fails to properly validate a\nsize value in a RPC packet header before using it to determine the\nnumber of bytes to receive. \n\nAn unauthenticated, remote attacker can exploit this to execute\narbitrary code on the remote host with SYSTEM level privileges.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-10-294/\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to UniData 7.2.8 / UniVerse 10.3.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/12/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:unidata\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"rocketsoftware_universe_detect.nasl\", \"rocketsoftware_unidata_detect.nasl\");\n script_require_ports(\"SMB/RocketSoftware/UniVerse/Version\", \"SMB/RocketSoftware/UniData/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# Determine which products are installed.\nprod = make_list();\n\nif (get_kb_item(\"SMB/RocketSoftware/UniVerse/Version\"))\n{\n prod = make_list(prod, \"UniVerse\");\n}\nif (get_kb_item(\"SMB/RocketSoftware/UniData/installed\"))\n{\n prod = make_list(prod, \"UniData\");\n}\n\nif (max_index(prod) == 0) exit(0, \"Neither UniVerse nor UniData are installed on the remote host.\");\n\n# Check each installed product\ninfo = '';\n\nfor (i=0; i<max_index(prod); i++)\n{\n if (prod[i] == 'UniVerse')\n {\n path = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Path\");\n version = get_kb_item_or_exit(\"SMB/RocketSoftware/UniVerse/Version\");\n fix = '10.3.9';\n if (ver_compare(ver:version, fix:fix) == -1)\n {\n info += \n '\\n Product : UniVerse' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n }\n }\n if (prod[i] == 'UniData')\n {\n installs = get_kb_list('SMB/RocketSoftware/UniData/*/path');\n if (isnull(installs)) debug_print('The SMB/RocketSoftware/UniData/*/path KB list is missing.');\n else\n {\n foreach item (keys(installs))\n {\n ver = item - 'SMB/RocketSoftware/UniData/';\n ver = ver - '/path';\n ver = split(ver, sep:'.', keep:FALSE);\n\n version = ver[0] + '.' + ver[1] + '.' + ver[2];\n if (ver_compare(ver:version, fix:'7.2.8') == -1)\n {\n info +=\n '\\n Product : UniData' +\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 7.2.8\\n';\n }\n }\n }\n }\n}\n\nif (info)\n{\n if (report_verbosity > 0) security_hole(port:get_kb_item(\"SMB/transport\"), extra:info);\n else security_hole(port:get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"The host is not affected.\");\n", "naslFamily": "Windows", "pluginID": "51463", "cpe": ["x-cpe:/a:rocketsoftware:unidata"], "scheme": null}
{"nessus": [{"lastseen": "2019-11-23T12:31:02", "bulletinFamily": "scanner", "description": "The remote Windows host is running UniVerse, a relational database\napplication.", "modified": "2019-11-02T00:00:00", "id": "ROCKETSOFTWARE_UNIVERSE_DETECT.NASL", "href": "https://www.tenable.com/plugins/nessus/51462", "published": "2011-01-12T00:00:00", "title": "Rocket Software UniVerse Detection", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51462);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_name(english:\"Rocket Software UniVerse Detection\");\n script_summary(english:\"Checks for Rocket Software UniVerse\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote Windows host is running a relational database.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is running UniVerse, a relational database\napplication.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"https://www.rocketsoftware.com/products/rocket-universe-0/rocket-universe\");\n script_set_attribute(attribute:\"solution\", value:\"n/a\");\n script_set_attribute(attribute:\"risk_factor\", value:\"None\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:universe\");\n script_set_attribute(attribute:\"asset_inventory\", value:\"True\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('smb_func.inc');\ninclude(\"audit.inc\");\ninclude(\"install_func.inc\");\n\napp = \"Rocket Software UniVerse\";\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\n# Connect to the appropriate share.\nport = kb_smb_transport();\nlogin = kb_smb_login();\npass = kb_smb_password();\ndomain = kb_smb_domain();\n\nif(! smb_session_init()) audit(AUDIT_FN_FAIL, \"smb_session_init\");\n\nrc = NetUseAdd(login:login, password:pass, domain:domain, share:\"IPC$\");\nif (rc != 1)\n{\n NetUseDel();\n audit(AUDIT_SHARE_FAIL,\"IPC$\");\n}\n\n# Connect to remote registry\nhklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);\nif (isnull(hklm))\n{\n NetUseDel();\n audit(AUDIT_REG_FAIL);\n}\n\n# Get the install path\nkey = \"SOFTWARE\\IBM\\UniVerse\\CurrentVersion\";\nkey_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\nif (!isnull(key_h))\n{\n item = RegQueryValue(handle:key_h, item:\"UvHome\");\n if (!isnull(item)) path = item[1];\n\n RegCloseKey(handle:key_h);\n}\nRegCloseKey(handle:hklm);\n\nif (isnull(path))\n{\n NetUseDel();\n exit(0, \"Rocket Software UniVerse does not appear to be installed.\");\n}\n\nshare = ereg_replace(pattern:'^([A-Za-z]):.*', replace:\"\\1$\", string:path);\ndll = ereg_replace(pattern:'^[A-Za-z]:(.*)', replace:\"\\1\\bin\\universe.dll\", string:path);\n\nNetUseDel(close:FALSE);\n\nrc = NetUseAdd(login:login, password:pass, domain:domain, share:share);\nif (rc != 1)\n{\n NetUseDel();\n audit(AUDIT_SHARE_FAIL,share);\n}\n\nfh = CreateFile(\n file:dll,\n desired_access:GENERIC_READ,\n file_attributes:FILE_ATTRIBUTE_NORMAL,\n share_mode:FILE_SHARE_READ,\n create_disposition:OPEN_EXISTING\n);\n\nif (isnull(fh))\n{\n NetUseDel();\n exit(1, \"Couldn't open '\"+path+\"\\bin\\universe.dll'.\");\n}\n\nver = GetFileVersion(handle:fh);\n\nCloseFile(handle:fh);\nNetUseDel();\n\nif (isnull(ver))\n{\n exit(1, \"Failed to find the version of '\"+path+\"\\bin\\universe.dll'.\");\n}\n\nversion = ver[0] + '.' + ver[1] + '.' + ver[2];\nbuild = ver[3];\n\nset_kb_item(name:\"SMB/RocketSoftware/UniVerse/Version\", value:version);\nset_kb_item(name:\"SMB/RocketSoftware/UniVerse/Build\", value:build);\nset_kb_item(name:\"SMB/RocketSoftware/UniVerse/Path\", value:path);\n\nregister_install(\n app_name:app,\n path:path,\n version:version,\n extra:make_array(\"Build\", build),\n cpe:\"x-cpe:/a:rocketsoftware:universe\"\n);\n\nreport_installs(app_name:app, port:port);\n\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2019-11-23T12:31:02", "bulletinFamily": "scanner", "description": "The remote Windows host is running UniData, a relational database\napplication.", "modified": "2019-11-02T00:00:00", "id": "ROCKETSOFTWARE_UNIDATA_DETECT.NASL", "href": "https://www.tenable.com/plugins/nessus/51461", "published": "2011-01-12T00:00:00", "title": "Rocket Software UniData Detection", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51461);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_name(english:\"Rocket Software UniData Detection\");\n script_summary(english:\"Checks for Rocket Software UniData\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote Windows host is running a relational database.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is running UniData, a relational database\napplication.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"https://www.rocketsoftware.com/products/rocket-unidata-0/rocket-unidata\");\n script_set_attribute(attribute:\"solution\", value:\"n/a\");\n script_set_attribute(attribute:\"risk_factor\", value:\"None\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/a:rocketsoftware:unidata\");\n script_set_attribute(attribute:\"asset_inventory\", value:\"True\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('misc_func.inc');\ninclude(\"install_func.inc\");\n\napp = 'Rocket Software UniData';\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\n# Connect to the appropriate share.\nname = kb_smb_name();\nport = kb_smb_transport();\nlogin = kb_smb_login();\npass = kb_smb_password();\ndomain = kb_smb_domain();\n\nregistry_init();\nhive = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);\nkey = 'SOFTWARE\\\\IBM\\\\UniData';\nsubkeys = get_registry_subkeys(handle:hive, key:key);\n\n# Get the install path\npaths = make_list();\nforeach subkey (subkeys)\n{\n if (subkey =~ '^[0-9\\\\.]+$')\n {\n entry = key + '\\\\' + subkey + '\\\\UDTHOME';\n path = get_registry_value(handle:hive, item:entry);\n if (!isnull(path)) paths = make_list(paths, path);\n }\n}\n\n# Newer versions of the software create a different registry key\nkey = 'SOFTWARE\\\\Rocket Software\\\\UniData';\nsubkeys = get_registry_subkeys(handle:hive, key:key);\nforeach subkey (subkeys)\n{\n if (subkey =~ '^[0-9\\\\.]+$')\n {\n entry = key + '\\\\' + subkey + '\\\\UDTHOME';\n path = get_registry_value(handle:hive, item:entry);\n if (!isnull(path)) paths = make_list(paths, path);\n }\n}\nRegCloseKey(handle:hive);\n\nif (max_index(paths) < 1)\n{\n close_registry();\n audit(AUDIT_NOT_INST, app);\n}\nclose_registry(close:FALSE);\n\ninstall_count = 0;\nforeach path (paths)\n{\n dll = path + \"\\bin\\unidata.dll\";\n ver = hotfix_get_fversion(path:dll);\n\n if (isnull(ver['value']))\n {\n version = 'Unknown';\n debug_print('Couldn\\'t get the version of '+path+\"\\bin\\unidata.dll\");\n }\n else\n {\n verarr = ver['value'];\n version = verarr[0] + '.' + verarr[1] + '.' + verarr[2];\n build = verarr[3];\n }\n version += '.' + build;\n\n set_kb_item(name:'SMB/RocketSoftware/UniData/'+version+'/path', value:path);\n\n register_install(\n app_name:app,\n path:path,\n version:version,\n extra:make_array('Build', build),\n cpe:\"x-cpe:/a:rocketsoftware:unidata\"\n );\n\n install_count += 1;\n}\nhotfix_check_fversion_end();\n\nif (install_count)\n{\n set_kb_item(name:'SMB/RocketSoftware/UniData/installed', value:TRUE);\n report_installs(app_name:app, port:port);\n exit(0);\n}\nelse exit(0, 'No Rocket Software UniData installs were detected on the remote host.');\n", "cvss": {"score": 0.0, "vector": "NONE"}}]}