Lucene search

K
nessusThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.SIDVAULT_20F.NASL
HistoryAug 28, 2007 - 12:00 a.m.

SIDVault < 2.0f LDAP Server Malformed Search Request Buffer Overflow

2007-08-2800:00:00
This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
www.tenable.com
24

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.273 Low

EPSS

Percentile

96.8%

The remote host is running SIDVault, an LDAP v3 server for Windows and Linux.

According to its banner, the version of SIDVault on the remote host fails to handle certain malformed search requests. A user reportedly can leverage this issue to crash the affected service or execute arbitrary code on the affected system with root or SYSTEM-level privileges.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(25935);
  script_version("1.16");

  script_cve_id("CVE-2007-4566");
  script_bugtraq_id(25460);
  script_xref(name:"EDB-ID", value:"4315");

  script_name(english:"SIDVault < 2.0f LDAP Server Malformed Search Request Buffer Overflow");
  script_summary(english:"Checks version of SIDVault in web interface");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote LDAP server is vulnerable to a buffer overflow attack." );
 script_set_attribute(attribute:"description", value:
"The remote host is running SIDVault, an LDAP v3 server for Windows and
Linux. 

According to its banner, the version of SIDVault on the remote host
fails to handle certain malformed search requests.  A user reportedly
can leverage this issue to crash the affected service or execute
arbitrary code on the affected system with root or SYSTEM-level
privileges." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/477821/30/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to SIDVault version 2.0f or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(119);
 script_set_attribute(attribute:"plugin_publication_date", value: "2007/08/28");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Gain a shell remotely");
  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
  script_dependencies("ldap_detect.nasl", "http_version.nasl");
  script_require_ports("Services/ldap", 389, 636, "Services/www", 6680);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("kerberos_func.inc");
include("ldap_func.inc");


ldap_port = get_kb_item("Services/ldap");
if (!ldap_port)
{
  port = 389;
  soc = open_sock_tcp(port);
  if (soc)
  {
    ldap_init(socket:soc);
    bind = ldap_bind_request();
    ret = ldap_request_sendrecv(data:bind);
    if (!isnull(ret) && ret[0] == LDAP_BIND_RESPONSE) ldap_port = port;
  }
}
if (!get_port_state(ldap_port)) exit(0);


# Pull up the app's web interface.
http_port = get_http_port(default:6680);

res = http_get_cache(item:"/", port:http_port, exit_on_fail: 1);


# If it looks like SIDVault...
if (
  '<title>SIDVault ' >< res &&
  '<img src="/img/-cached-sidvault' >< res
)
{
  # Extract the version number.
  ver = NULL;

  pat = "> SIDVault v([0-9]\.[0-9a-z]+) Copyright";
  matches = egrep(pattern:pat, string:res);
  if (matches)
  {
    foreach match (split(matches))
    {
      match = chomp(match);
      ver = eregmatch(pattern:pat, string:match);
      if (!isnull(ver))
      {
        ver = ver[1];
        break;
      }
    }
  }

  # Versions before 2.0f are affected.
  if (!isnull(ver) && ver =~ "^([01]\.|2\.0[a-e]?$)")
  {
    report = string(
      "SIDVault version ", ver, " appears to be running on the remote host.\n"
    );
    security_hole(port:ldap_port, extra:report);
  }
}

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.273 Low

EPSS

Percentile

96.8%

Related for SIDVAULT_20F.NASL