Lucene search

K
openvasChristian Eric Edjenguele <[email protected]>OPENVAS:101006
HistoryMar 15, 2009 - 12:00 a.m.

Microsoft Security Bulletin MS06-056

2009-03-1500:00:00
Christian Eric Edjenguele <[email protected]>
plugins.openvas.org
8

0.919 High

EPSS

Percentile

98.7%

A cross-site scripting vulnerability exists in a server running a vulnerable version of the .Net Framework 2.0
that could inject a client side script in the user’s browser. The script could spoof content,
disclose information, or take any action that the user could take on the affected web site.

# OpenVAS Vulnerability Test
# $Id: remote-MS06-056.nasl 8022 2017-12-07 08:23:28Z teissa $
# Description: 
# Microsoft Security Bulletin MS06-056
# .NET Framework 2.0 Cross-Site Scripting Vulnerability - CVE-2006-3436 
#
#
# Affected Software: 
#
# .NET Framework 2.0 for the following operating system versions: 
# Microsoft Windows 2000 Service Pack 4
# Microsoft Windows XP Service Pack 1 or Windows XP Service Pack 2
# Microsoft Windows XP Professional x64 Edition
# Microsoft Windows XP Tablet PC Edition
# Microsoft Windows XP Media Center Edition
# Microsoft Windows Server 2003 or Windows Server 2003 Service Pack 1
# Microsoft Windows Server with SP1 for Itanium-based Systems
# Microsoft Windows Server 2003 x64 Edition
# 
# Non-Affected Software:
#
# Microsoft Windows Server 2003 for Itanium-based Systems
# 
# Tested Microsoft Windows Components:
#
# Affected Components:
#
# Microsoft .NET Framework 2.0
#
# Non-Affected Components:
#
# Microsoft .NET Framework 1.0
# Microsoft .NET Framework 1.1 
#
# remote-MS06-056.nasl
#
# Author:
# Christian Eric Edjenguele <[email protected]>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 and later,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

include("revisions-lib.inc");
tag_summary = "A cross-site scripting vulnerability exists in a server running a vulnerable version of the .Net Framework 2.0 
that could inject a client side script in the user's browser. The script could spoof content, 
disclose information, or take any action that the user could take on the affected web site.";

tag_solution = "Microsoft has released a patch to correct this issue,
you can download it from the following web site:
http://www.microsoft.com/technet/security/Bulletin/MS06-056.mspx";



if(description)
{
script_id(101006);
script_version("$Revision: 8022 $");
script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:23:28 +0100 (Thu, 07 Dec 2017) $");
script_tag(name:"creation_date", value:"2009-03-15 21:21:09 +0100 (Sun, 15 Mar 2009)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_bugtraq_id(20337);
script_cve_id("CVE-2006-3436");
name = "Microsoft Security Bulletin MS06-056";
script_name(name);
 
script_tag(name:"qod_type", value:"remote_banner"); 


script_category(ACT_ATTACK);

script_copyright("Christian Eric Edjenguele <[email protected]>");
family = "Windows : Microsoft Bulletins";
script_family(family);
script_dependencies("find_service.nasl", "remote-detect-MSdotNET-version.nasl");
script_mandatory_keys("dotNET/version");

  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);

exit(0);

}


#
# The script code starts here
#


dotnet = get_kb_item("dotNET/version"); 
port = get_kb_item("dotNET/port");

if(!dotnet)
	exit(0);

else
{
	# Microsoft .NET Framework version 2.0
    	if(revcomp(a:dotnet, b:"2.0.50727.210") == -1){

		# Report 'Microsoft .NET Framework 2.0 Cross-Site Scripting Vulnerability (MS06-056)'
    		report = 'Missing MS06-056 patch, detected Microsoft .Net Framework version: ' + dotnet;
		security_message(port:port, data:report);
	}
}

0.919 High

EPSS

Percentile

98.7%

Related for OPENVAS:101006