Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310802964
HistorySep 25, 2012 - 12:00 a.m.

Apple Remote Desktop Information Disclosure Vulnerability

2012-09-2500:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
12

5.9 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

59.4%

Apple Remote Desktop is prone to an information disclosure vulnerability.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802964");
  script_version("2023-07-25T05:05:58+0000");
  script_cve_id("CVE-2012-0681");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
  script_tag(name:"creation_date", value:"2012-09-25 18:02:57 +0530 (Tue, 25 Sep 2012)");
  script_name("Apple Remote Desktop Information Disclosure Vulnerability");
  script_xref(name:"URL", value:"http://support.apple.com/kb/HT5462");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/55100");
  script_xref(name:"URL", value:"http://secunia.com/advisories/50352");
  script_xref(name:"URL", value:"http://lists.apple.com/archives/security-announce/2012/Sep/msg00002.html");

  script_tag(name:"qod_type", value:"executable_version");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("General");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/osx_name", "ssh/login/osx_version");

  script_tag(name:"impact", value:"Successful exploitation will allow attackers to gain sensitive information.");

  script_tag(name:"affected", value:"Apple Remote Desktop version 3.5.2.");

  script_tag(name:"insight", value:"The flaw is due to an error in application, when connecting to a
  third-party VNC server with 'Encrypt all network data' set, data is not
  encrypted and no warning is produced.");

  script_tag(name:"solution", value:"Upgrade to Apple Remote Desktop version 3.5.3 or later.");

  script_tag(name:"summary", value:"Apple Remote Desktop is prone to an information disclosure vulnerability.");

  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("ssh_func.inc");
include("version_func.inc");

sock = ssh_login_or_reuse_connection();
if(!sock)
  exit(0);

if(!get_kb_item("ssh/login/osx_name")) {
  close(sock);
  exit(0);
}

path = "/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Info CFBundleShortVersionString";
vers = chomp(ssh_cmd(socket:sock, cmd:"defaults read " + path));
close(sock);

if(!vers || vers !~ "^[0-3]\." || "does not exist" >< vers)
  exit(0);

if(version_is_less_equal(version:vers, test_version:"3.5.2")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"3.5.3", install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

5.9 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

59.4%

Related for OPENVAS:1361412562310802964