Microsoft Windows Messenger Service Social Engineering Weakness

2000-07-03T00:00:00
ID SMB_SVC_MESSENGER.NASL
Type nessus
Reporter This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
Modified 2020-02-02T00:00:00

Description

The messenger service is running. This service allows NT users to send pop-up messages to each other.

This service can be abused by anyone who can trick valid users into doing some actions that may harm their accounts or your network (social engineering attack).

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
  script_id(10458);
  script_version ("1.17");
  script_cvs_date("Date: 2018/08/13 14:32:39");
  script_cve_id("CVE-1999-0630");

  script_name(english:"Microsoft Windows Messenger Service Social Engineering Weakness");
  script_summary(english:"Checks for the presence of the messenger service");

  script_set_attribute(
    attribute:'synopsis',
    value:'The remote service allows users to send pop-up messages to each other.'
  );

  script_set_attribute(
    attribute:'description',
    value:"The messenger service is running. This service allows
NT users to send pop-up messages to each other.

This service can be abused by anyone who can
trick valid users into doing some actions that may
harm their accounts or your network (social
engineering attack)."
  );

  script_set_attribute(
    attribute:'solution',
    value:"Disable this service.

How to disable this service under NT 4 :
    - open the 'Services' control panel
    - select the 'messenger' service, and click 'Stop'
    - click on 'Startup...' and change to radio button of the
      field 'Startup Type' from 'Automatic' to 'Disabled'

Under Windows 2000 :
    - open the 'Administration tools' control panel
    - open the 'Services' item in it
    - double click on the 'messenger' service
    - click on 'stop'
    - change the drop-down menu value from the field 'Startup Type'
      from 'Automatic' to 'Disabled'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");


 script_set_attribute(attribute:"plugin_publication_date", value: "2000/07/03");
 script_set_attribute(attribute:"vuln_publication_date", value: "1998/01/01");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);

  script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc." );
  script_family(english:"Windows");
  script_dependencie("smb_enum_services.nasl");
  script_require_keys("SMB/svcs");
  exit(0);
}

#
# The script code starts here
#
port = get_kb_item("SMB/transport");
if(!port)port = 139;


services = get_kb_item("SMB/svcs");
if(services)
{
 if("[Messenger]" >< services)security_hole(port);
}