Lucene search

K

Windows Messenger is installed

🗓️ 26 Mar 2006 00:00:00Reported by This script is Copyright (C) 2003 Xue Yong ZhiType 
openvas
 openvas
🔗 plugins.openvas.org👁 15 Views

Windows Messenger installed, prone to multiple vulnerabilitie

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Microsoft Windows Messenger Multiple Vulnerabilities
26 Mar 200600:00
openvas
CERT
Adobe Acrobat ActiveX Control buffer overflow in setview method
2 Nov 200000:00
cert
CVE
CVE-1999-1484
12 Sep 200104:00
cve
CVE
CVE-2002-0472
12 Aug 200204:00
cve
CVE
CVE-2002-0228
16 May 200204:00
cve
NVD
CVE-1999-1484
24 Sep 199904:00
nvd
NVD
CVE-2002-0472
12 Aug 200204:00
nvd
NVD
CVE-2002-0228
16 May 200204:00
nvd
Cvelist
CVE-2002-0472
11 Jun 200204:00
cvelist
Cvelist
CVE-1999-1484
12 Sep 200104:00
cvelist
Rows per page
#############################################################################
# OpenVAS Vulnerability Test
# $Id: winmessenger_installed.nasl 6053 2017-05-01 09:02:51Z teissa $
# Description: Windows Messenger is installed
#
# Authors:
# Xue Yong Zhi <[email protected]>
#
# Copyright:
# Copyright (C) 2003 Xue Yong Zhi
#
# Updated By: Antu Sanadi <[email protected]> on 2012-05-30
#  - Included the detect script.
#  - Checking for the versions affected.
#  - Modified the description.
#
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###################################################################################

tag_impact = "Successful exploitation could allow attackers to bypass certain
security restrictions,  execute arbitrary code in the context of the browser or
cause a denial of service.

Impact Level: Application";

tag_affected = "Microsoft MSN Messenger Service 1.x, 2.0.x, 2.2.x, 3.0.x, 3.6.x
Microsoft MSN Messenger Service 4.0.x to 4.6.x";

tag_insight = "The flaws are due to
- Buffer overflow in Setup ActiveX control (setupbbs.ocx), allows
attacker to execute commands via the methods vAddNewsServer or
bIsNewsServerConfigured.
- An error in 'ActiveX' object allows attacker to disclosure
information.
- An error in the authentication mechanisms, allows remote attacker
to spoof messages.
- An error in 'Font' tag and in 'Invite' request allows remote attacker
to cause denial of service.";

tag_solution = "No solution or patch was made available for at least one year
since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.";

tag_summary = "This host is installed with Microsoft Windows Messenger and
is prone to multiple vulnerabilities.";

if(description)
{
  script_id(11429);
  script_version("$Revision: 6053 $");
  script_bugtraq_id(4028, 4316, 4675, 4827, 668);
  script_cve_id("CVE-1999-1484", "CVE-2002-0228", "CVE-2002-0472");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"$Date: 2017-05-01 11:02:51 +0200 (Mon, 01 May 2017) $");
  script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
  script_name("Windows Messenger is installed");
  script_xref(name : "URL" , value : "http://xforce.iss.net/xforce/xfdb/8084");
  script_xref(name : "URL" , value : "http://xforce.iss.net/xforce/xfdb/8582");
  script_xref(name : "URL" , value : "http://versions.wikia.com/wiki/MSN_Messenger");
  script_xref(name : "URL" , value : "http://downloads.securityfocus.com/vulnerabilities/exploits/setupbbs.txt");

  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"registry");
  script_copyright("This script is Copyright (C) 2003 Xue Yong Zhi");
  script_family("Windows");
  script_dependencies("secpod_windows_messenger_detect.nasl");
  script_require_keys("Microsoft/MSN/Messenger/Ver");
  script_tag(name : "impact" , value : tag_impact);
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  exit(0);
}

include("version_func.inc");

## Variable Initialization
msnVer = "";

## Get the version from KB
msnVer = get_kb_item("Microsoft/MSN/Messenger/Ver");
if(!msnVer){
  exit(0);
}

if(version_in_range(version:msnVer, test_version:"1.0", test_version2:"2.0.0.085") ||
   version_in_range(version:msnVer, test_version:"2.2", test_version2:"3.0.0.286") ||
   version_in_range(version:msnVer, test_version:"3.6", test_version2:"3.6.0.039") ||
   version_in_range(version:msnVer, test_version:"4.0", test_version2:"4.6.0.083")){
  security_message(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo