Lucene search

K
nessusThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.SUN_DIRECTORY_REMOTE_ADMIN_UNAUTH_ACCESS.NASL
HistoryMay 01, 2008 - 12:00 a.m.

Sun Java System Directory Server bind-dn Remote Privilege Escalation

2008-05-0100:00:00
This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
www.tenable.com
16

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.01

Percentile

83.7%

The version of Sun Java System Directory Proxy Server running on the remote host is affected by an unauthorized access vulnerability. Specifically, the server fails to properly classify connections in relation to ‘bind_dn’ parameter. Successful exploitation of this issue might allow an unprivileged user to gain remote administrative access to the system.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(32121);
  script_version("1.16");

  script_cve_id("CVE-2008-1995");
  script_bugtraq_id(28941);

  script_name(english:"Sun Java System Directory Server bind-dn Remote Privilege Escalation");
  script_summary(english:"Checks the version of Sun Java Directory Server");

 script_set_attribute(attribute:"synopsis", value:
"The remote LDAP proxy server is prone to an unauthorized access
attack." );
 script_set_attribute(attribute:"description", value:
"The version of Sun Java System Directory Proxy Server running on the
remote host is affected by an unauthorized access vulnerability. 
Specifically, the server fails to properly classify connections in
relation to 'bind_dn' parameter.  Successful exploitation of this
issue might allow an unprivileged user to gain remote administrative
access to the system." );
 script_set_attribute(attribute:"see_also", value:"https://download.oracle.com/sunalerts/1019128.1.html" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Sun Java System Directory Server 6.3 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(264);
 
 script_set_attribute(attribute:"patch_publication_date", value: "2008/04/25");
 script_set_attribute(attribute:"plugin_publication_date", value: "2008/05/01");
 script_cvs_date("Date: 2018/11/15 20:50:24");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");
  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
  script_dependencies("ldap_search.nasl");
  script_require_ports("Services/ldap", 389);

  exit(0);
}

include("global_settings.inc");

port = get_kb_item("Services/ldap");
if (!port) port = 389;
if (!get_port_state(port)) exit(1, "Port "+port+" is not open.");

vendor = get_kb_item("LDAP/" +port+"/vendorName");
if(!vendor)exit(1,"The 'LDAP/"+port+ "/vendorName' KB is missing.");
if("Sun Microsystems, Inc" >!< vendor) exit(0, "The remote directory server on port "+ port +" does not appear to be from Sun Microsystems.");

ver = get_kb_item("LDAP/" + port + "/vendorVersion");
if (!ver) exit(1,"The 'LDAP/"+port+ "/vendorVersion' KB is missing.");

if("Directory Proxy Server" >!< ver) exit(0, "The remote version "+ ver + " on port "+ port + " does not appear to be from Directory Proxy Server.");

if (ereg(pattern:"^Directory Proxy Server 6\.[0-2]($|[^0-9])", string:ver))
{
  if (report_verbosity)
  {
    report = string(
      "\n",
      "  ",ver , " is installed on the remote host.\n"
    );
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
}
else
  exit(0, "'" +ver+ "' on port " + port +" from " + vendor + " is installed and not vulnerable.");

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.01

Percentile

83.7%

Related for SUN_DIRECTORY_REMOTE_ADMIN_UNAUTH_ACCESS.NASL