Lucene search

K
nessusThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.SMB_SVC_SCRIPTLOGIC.NASL
HistoryMay 04, 2003 - 12:00 a.m.

ScriptLogic Multiple Service Remote Privilege Escalation

2003-05-0400:00:00
This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
www.tenable.com
8

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.019 Low

EPSS

Percentile

88.5%

The ScriptLogic service is running on this port.

There is a flaw in versions up to 4.05 of this service which may allow an attacker to write arbitrary values in the remote registry with administrator privileges, which can be used to gain a shell on this host.

*** Since Nessus was unable to determine the version of ScriptLogic*** running on this host, this might be a false positive.

#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if (description)
{
  script_id(11562);
  script_version("1.15");
  script_cvs_date("Date: 2018/07/30 15:31:32");

  script_cve_id("CVE-2003-1121");
  script_bugtraq_id(7475, 7477);
  script_xref(name:"CERT", value:"231705");

  script_name(english:"ScriptLogic Multiple Service Remote Privilege Escalation");
  script_summary(english:"Checks for the presence of the ScriptLogic service");

  script_set_attribute(
    attribute:'synopsis',
    value:'The remote service may be vulnerable to an access control breach.'
  );
  script_set_attribute(
    attribute:'description',
    value:
'The ScriptLogic service is running on this port. 

There is a flaw in versions up to 4.05 of this service which may allow
an attacker to write arbitrary values in the remote registry with
administrator privileges, which can be used to gain a shell on this
host. 

*** Since Nessus was unable to determine the version of ScriptLogic
*** running on this host, this might be a false positive.'
  );
  script_set_attribute(attribute:'solution', value:'Upgrade to ScriptLogic 4.15 or later.');
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2003/05/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"2003/05/04");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);

  script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc." );
  script_family(english:"Windows");
  script_dependencie("smb_enum_services.nasl");
  script_require_keys("SMB/svcs");
  exit(0);
}

#
# The script code starts here
#
port = get_kb_item("SMB/transport");
if(!port)port = 139;


services = get_kb_item("SMB/svcs");
if(services)
{
 if("[SLServer]" >< services)security_hole(port);
}

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.019 Low

EPSS

Percentile

88.5%

Related for SMB_SVC_SCRIPTLOGIC.NASL