Lucene search

K
nessusThis script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.SMB_KB956695.NASL
HistoryOct 15, 2008 - 12:00 a.m.

MS08-059: Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow (956695) (uncredentialed check)

2008-10-1500:00:00
This script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
57

The remote host has HIS (Host Integration Server) installed. The remote version of this product is affected by a code execution vulnerability in its RPC interface.

An attacker could exploit this flaw to execute arbitrary code on the remote host by making rogue RPC queries.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(34412);
 script_version("1.25");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/08/05");

  script_cve_id("CVE-2008-3466");
 script_bugtraq_id(31620);
 script_xref(name:"MSFT", value:"MS08-059");
 script_xref(name:"IAVB", value:"2008-B-0074-S");
 script_xref(name:"MSKB", value:"956695");

 script_name(english:"MS08-059: Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow (956695) (uncredentialed check)");
 script_summary(english:"Determines the presence of update 956695");

 script_set_attribute( attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Host
Integration Server (HIS).");
 script_set_attribute(attribute:"description", value:
"The remote host has HIS (Host Integration Server) installed.  The
remote version of this product is affected by a code execution
vulnerability in its RPC interface.

An attacker could exploit this flaw to execute arbitrary code on the
remote host by making rogue RPC queries.");
  # https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-059
  script_set_attribute(attribute:"see_also", value:"https://www.nessus.org/u?2883f931");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for HIS 2000, 2003 and 2006.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2008-3466");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'CANVAS');
 script_cwe_id(287);

 script_set_attribute(attribute:"plugin_publication_date", value:"2008/10/15");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"stig_severity", value:"I");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:host_integration_server");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

 script_dependencies("dcetest.nasl");
 script_require_keys("Services/DCE/ed6ee250-e0d1-11cf-925a-00aa00c006c1");
 exit(0);
}

#

include ('smb_func.inc');

port = get_kb_item ("Services/DCE/ed6ee250-e0d1-11cf-925a-00aa00c006c1");
if (!port)
  exit (0);

if ( ! get_port_state(port) ) exit(0);
soc = open_sock_tcp (port);
if (!soc) exit (0);

ret = dce_rpc_bind(cid:session_get_cid(), uuid:"ed6ee250-e0d1-11cf-925a-00aa00c006c1", vers:1);
send (socket:soc, data:ret);
resp = recv (socket:soc, length:4096);

if (!resp)
{
 close (soc);
 exit (0);
}

ret = dce_rpc_parse_bind_ack (data:resp);
if (isnull (ret) || (ret != 0))
{
 close (soc);
 exit (0);
}

session_set_unicode (unicode:0);

data =
       class_name (name:"cmd") +
       class_name (name:"/C ver");

# SnaRpcServer_RunExecutable
ret = dce_rpc_request (code:0x01, data:data);
send (socket:soc, data:ret);
resp = recv (socket:soc, length:4096);

resp = dce_rpc_parse_response (data:resp);
if (strlen(resp) == 1 && ord(resp[0]) != 0)
  security_hole(port);


VendorProductVersionCPE
microsoftwindowscpe:/o:microsoft:windows
microsofthost_integration_servercpe:/a:microsoft:host_integration_server