CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
99.9%
Sun Java Web Server is prone to multiple vulnerabilities.
# Copyright (C) 2010 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
CPE = "cpe:/a:sun:java_system_web_server";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.100567");
script_version("2022-05-02T09:35:37+0000");
script_cve_id("CVE-2010-0272", "CVE-2010-0273", "CVE-2010-0360",
"CVE-2010-0361", "CVE-2010-0388", "CVE-2010-0389");
script_tag(name:"last_modification", value:"2022-05-02 09:35:37 +0000 (Mon, 02 May 2022)");
script_tag(name:"creation_date", value:"2010-04-12 18:40:45 +0200 (Mon, 12 Apr 2010)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_name("Sun Java System Web Server <= 7.0 Update 7 Multiple Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_family("Web Servers");
script_copyright("Copyright (C) 2010 Greenbone Networks GmbH");
script_dependencies("gb_sun_oracle_web_server_http_detect.nasl");
script_mandatory_keys("sun/java_system_web_server/detected");
script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/55812");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/37874");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/37910");
script_xref(name:"URL", value:"http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70-admin.html");
script_xref(name:"URL", value:"http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70-webdav.html");
script_xref(name:"URL", value:"http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-trace.html");
script_xref(name:"URL", value:"http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html");
script_tag(name:"summary", value:"Sun Java Web Server is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"- An error exists in WebDAV implementation in webservd and can
be exploited to cause Stack-based buffer overflow via long URI in an HTTP OPTIONS request.
- An unspecified error that can be exploited to cause a heap-based buffer overflow which allows
remote attackers to discover process memory locations and execute arbitrary code by sending a
process memory address via crafted data.
- Format string vulnerability in the WebDAV implementation in webservd that can be exploited to
cause denial of service via format string specifiers in the encoding attribute of the XML
declaration in a PROPFIND request.
- An unspecified error in admin server that can be exploited to cause denial of service via an
HTTP request that lacks a method token.");
script_tag(name:"impact", value:"Successful exploitation lets the attackers to discover process
memory locations or execute arbitrary code in the context of an affected system or cause the
application to crash via a long URI in an HTTP OPTIONS request.");
script_tag(name:"affected", value:"Sun Java System Web Server 7.0 Update 7 and prior.");
script_tag(name:"solution", value:"No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore. General solution
options are to upgrade to a newer release, disable respective features, remove the product or
replace the product by another one.");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"WillNotFix");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if(!port = get_app_port(cpe:CPE))
exit(0);
if(!vers = get_app_version(cpe:CPE, port:port))
exit(0);
vers = str_replace(find:"U", string:vers, replace:".");
if(version_is_less_equal(version:vers, test_version:"7.0.7")) {
report = report_fixed_ver(installed_version:vers, fixed_version:"WillNotFix");
security_message(port:port, data:report);
exit(0);
}
exit(99);
intevydis.blogspot.com/2010/01/sun-java-system-web-server-70-admin.html
intevydis.blogspot.com/2010/01/sun-java-system-web-server-70-webdav.html
intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-trace.html
intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html
www.securityfocus.com/bid/37874
www.securityfocus.com/bid/37910
xforce.iss.net/xforce/xfdb/55812