Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.WEBSPHERE_PORTAL_CVE-2013-5791.NASL
HistoryApr 14, 2014 - 12:00 a.m.

IBM WebSphere Portal Outside In Technology Multiple Overflows (PI07290)

2014-04-1400:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
22

The version of IBM WebSphere Portal on the remote host is affected by multiple remote code execution vulnerabilities in the Outside In Technology component :

  • A stack overflow in the Filters subcomponent of the OS/2 Metafile Parser. (CVE-2013-5763)

  • A stack overflow in the Microsoft Access database file format parser. (CVE-2013-5791)

A remote attacker can use specially crafted files to cause a buffer overflow and execute arbitrary code.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(73499);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2013-5763", "CVE-2013-5791");
  script_bugtraq_id(63076, 63741);
  script_xref(name:"EDB-ID", value:"31222");
  script_xref(name:"CERT", value:"953241");

  script_name(english:"IBM WebSphere Portal Outside In Technology Multiple Overflows (PI07290)");
  script_summary(english:"Checks for installed patches.");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has web portal software installed that is
affected by multiple remote code execution vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of IBM WebSphere Portal on the remote host is affected by
multiple remote code execution vulnerabilities in the Outside In
Technology component :

  - A stack overflow in the Filters subcomponent of the
    OS/2 Metafile Parser. (CVE-2013-5763)

  - A stack overflow in the Microsoft Access database
    file format parser. (CVE-2013-5791)

A remote attacker can use specially crafted files to cause a buffer
overflow and execute arbitrary code.");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21660640");
  script_set_attribute(attribute:"see_also", value:"http://xforce.iss.net/xforce/xfdb/87925");
  script_set_attribute(attribute:"see_also", value:"http://xforce.iss.net/xforce/xfdb/88557");
  script_set_attribute(attribute:"solution", value:
"IBM has published Interim Fix PI07290. This fix is a part of 7.0.0.2
CF27 and 8.0.0.1 CF10. Refer to IBM's advisory for more information.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:S/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-5791");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/15");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/10/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/14");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_portal");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("websphere_portal_installed.nbin");
  script_require_keys("installed_sw/IBM WebSphere Portal", "Settings/ParanoidReport");

  exit(0);
}

include("websphere_portal_version.inc");

# A workaround is available
if (report_paranoia < 2) audit(AUDIT_PARANOID);

websphere_portal_check_version(
  ranges:make_list(
    "6.0.0.0, 6.0.0.1",
    "6.1.0.0, 6.1.0.6, CF27",
    "6.1.5.0, 6.1.5.3, CF27",
    "7.0.0.0, 7.0.0.2, CF25",
    "8.0.0.0, 8.0.0.1, CF08"
  ),
  fix:"PI07290",
  severity:SECURITY_NOTE
);
VendorProductVersionCPE
ibmwebsphere_portalcpe:/a:ibm:websphere_portal