Lucene search

K
openvasThis script is Copyright (C) 2004 Noam RathausOPENVAS:12221
HistoryNov 03, 2005 - 12:00 a.m.

3Com NBX VoIP NetSet Detection

2005-11-0300:00:00
This script is Copyright (C) 2004 Noam Rathaus
plugins.openvas.org
8

0.015 Low

EPSS

Percentile

87.1%

We have discovered that 3Com NBX VOIP NetSet is running
on the remote host. 3Com NBX VoIP NetSet’s web server is powered by VxWorks.
The web server is known to contain vulnerabilities that would allow a remote
attacker to cause a denial of service against the product by simply running
a port scanning/vulnerability scanning engine against it.

Problems have been observed in Netset 4.2.7, bur previous 4.1 versions
seem to be ok.

See Also : http://www.secnap.com/security/20040420.html

# OpenVAS Vulnerability Test
# $Id: 3com_nbx_voip_netset_detection.nasl 8144 2017-12-15 13:19:55Z cfischer $
# Description: 3Com NBX VoIP NetSet Detection
#
# Authors:
# Noam Rathaus
# mods by Michael Scheidell:
# change to ACT_GATHER_INFO (this plugin doesn't really do any attacks)
# if safe_checks() enabled, set host to DEAD! so that other plugins don'k
# kill it.
#
# Copyright:
# Copyright (C) 2004 Noam Rathaus
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "We have discovered that 3Com NBX VOIP NetSet is running 
on the remote host.  3Com NBX VoIP NetSet's web server is powered by VxWorks.
The web server is known to contain vulnerabilities that would allow a remote
attacker to cause a denial of service against the product by simply running
a port scanning/vulnerability scanning engine against it.

Problems have been observed in Netset 4.2.7, bur previous 4.1 versions
seem to be ok.

See Also :  http://www.secnap.com/security/20040420.html";

# Subject: 3com NBX VOIP NetSet Denial of Service Attack
# Date: 2004-04-29 23:34
# From: Michael Scheidell SECNAP Network Security

if(description)
{
 script_id(12221);
 script_version("$Revision: 8144 $");
 script_tag(name:"last_modification", value:"$Date: 2017-12-15 14:19:55 +0100 (Fri, 15 Dec 2017) $");
 script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 script_cve_id("CVE-2004-1977");
 script_bugtraq_id(10240);
 script_tag(name:"cvss_base", value:"5.0");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
 name = "3Com NBX VoIP NetSet Detection";
 script_name(name);
 script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_banner");
 script_copyright("This script is Copyright (C) 2004 Noam Rathaus");
 family = "Web application abuses";
 script_family(family);
 script_dependencies("find_service.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");

 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port( default:80 );

 r   = http_get_cache(item:"/", port:port);
 if ( ! r ) exit(0);
 if("sysObjectID" >< r && "1.3.6.1.4.1.43.1.17" >< r)
 {
 	security_message(port);
	set_kb_item(name:"Services/www/" + port + "/embedded", value:TRUE);
 	if(safe_checks()) set_kb_item( name:"Host/dead", value:TRUE );
 }

0.015 Low

EPSS

Percentile

87.1%

Related for OPENVAS:12221