Lucene search

K
openvasCopyright (C) 2003 Renaud DeraisonOPENVAS:136141256231080014
HistoryOct 24, 2008 - 12:00 a.m.

apcupsd < 3.8.6 / 3.10.x < 3.10.5 Multiple Vulnerabilities

2008-10-2400:00:00
Copyright (C) 2003 Renaud Deraison
plugins.openvas.org
16

6.4 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

83.1%

apcupsd is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2003 Renaud Deraison
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:apc:apcupsd";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.80014");
  script_version("2023-12-13T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-12-13 05:05:23 +0000 (Wed, 13 Dec 2023)");
  script_tag(name:"creation_date", value:"2008-10-24 19:51:47 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");

  script_cve_id("CVE-2001-0040", "CVE-2003-0098", "CVE-2003-0099");
  script_xref(name:"OSVDB", value:"1683");
  script_xref(name:"SuSE", value:"SUSE-SA:2003:022");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("apcupsd < 3.8.6 / 3.10.x < 3.10.5 Multiple Vulnerabilities");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2003 Renaud Deraison");
  script_family("Gain a shell remotely");
  script_dependencies("gb_apcnisd_detect.nasl");
  script_mandatory_keys("apcupsd/detected");

  script_tag(name:"summary", value:"apcupsd is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2001-0040: APC UPS daemon, apcupsd, saves its process ID in a world-writable file.

  - CVE-2003-0098: Unknown vulnerability possibly via format strings in a request to a slave server.

  - CVE-2003-0099: Multiple buffer overflows related to usage of the vsprintf function.");

  script_tag(name:"impact", value:"- CVE-2001-0040: allows local users to kill an arbitrary process
  by specifying the target process ID in the apcupsd.pid file.

  - CVE-2003-0098: allows remote attackers to gain root privileges.

  - CVE-2003-0099: may allow attackers to cause a denial of service or execute arbitrary code.");

  script_tag(name:"affected", value:"apcupsd versions prior to 3.8.6, and 3.10.x prior to 3.10.5.");

  script_tag(name:"solution", value:"Update to version 3.8.6, 3.10.5 or later.");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2070");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/6828");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7200");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe:CPE ) )
  exit( 0 );

if( ! vers = get_app_version( port:port, cpe:CPE ) )
  exit( 0 );

if( version_is_less( version:vers, test_version:"3.8.6" ) )
  fix = "3.8.6";
else if( vers =~ "^3\.10\." && version_is_less( version:vers, test_version:"3.10.5" ) )
  fix = "3.10.5";

if( fix ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:fix );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

6.4 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

83.1%