Lucene search

K
nessusThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.SMB_NT_MS00-052.NASL
HistoryAug 03, 2000 - 12:00 a.m.

MS00-052: Relative Shell Path patch (269049)

2000-08-0300:00:00
This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
www.tenable.com
12

The hotfix for the ‘Relative Shell Path’ vulnerability has not been applied.

This vulnerability allows a malicious user who can write to the remote system root to cause the code of malicious user’s choice to be executed by the users who will interactively log into this host.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10486);
 script_version("1.54");
 script_cvs_date("Date: 2018/11/15 20:50:29");

 script_cve_id("CVE-2000-0663");
 script_bugtraq_id(1507);
 script_xref(name:"MSFT", value:"MS00-052");
 script_xref(name:"MSKB", value:"269049");

 script_name(english:"MS00-052: Relative Shell Path patch (269049)");
 script_summary(english:"Determines whether the hotfix Q269239 is installed");

 script_set_attribute(attribute:"synopsis", value:
"A local user can elevate his privileges.");
 script_set_attribute(attribute:"description", value:
"The hotfix for the 'Relative Shell Path' vulnerability has not been
applied.

This vulnerability allows a malicious user who can write to the remote
system root to cause the code of malicious user's choice to be
executed by the users who will interactively log into this host.");
 script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2000/ms00-052");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows NT and 2000.");
 script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/07/28");
 script_set_attribute(attribute:"patch_publication_date", value:"2000/07/28");
 script_set_attribute(attribute:"plugin_publication_date", value:"2000/08/03");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, "Host/patch_management_checks");

 exit(0);
}

include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");

get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");

bulletin = 'MS00-052';
kb = "269049";

kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit('SMB/Registry/Enumerated');
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);

if (hotfix_check_sp(nt:7, win2k:2) <= 0) exit(0, "The host is not affected based on its version / service pack.");


if (
  hotfix_missing(name:"Q299444") > 0 &&
  hotfix_missing(name:"Q269049") > 0
)
{
  if (
    defined_func("report_xml_tag") &&
    !isnull(bulletin) &&
    !isnull(kb)
  ) report_xml_tag(tag:bulletin, value:kb);

  hotfix_security_hole();
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  exit(0);
}
else exit(0, "The host is not affected.");


VendorProductVersionCPE
microsoftwindowscpe:/o:microsoft:windows
Related for SMB_NT_MS00-052.NASL