ID OPENVAS:800131 Type openvas Reporter Copyright (C) 2008 Greenbone Networks GmbH Modified 2017-02-20T00:00:00
Description
This host is installed with UltraVNC VNCViewer and is prone to
Buffer Overflow Vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ultravnc_cpp_file_mult_bof_vuln.nasl 5370 2017-02-20 15:24:26Z cfi $
#
# UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08
#
# Authors:
# Veerendra GG <veerendragg@secpod.com>
#
# Copyright:
# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_impact = "Successful exploitation allows attackers to execute arbitrary code
by tricking a user into connecting to a malicious VNC server or by sending
specially crafted data to a vncviewer in LISTENING mode and can even cause
denial of service condition.
Impact Level: Application";
tag_affected = "UltraVNC VNCViewer Version 1.0.2 and 1.0.4 before RC11 on Windows (Any).";
tag_insight = "The flaw is due to multiple boundary errors within the
vncviewer/FileTransfer.cpp file, while processing malformed data.";
tag_solution = "Upgrade to latest Version or
Apply the available patch from below link,
http://downloads.sourceforge.net/ultravnc/UltraVNC-Viewer-104-Security-Update-2---Feb-8-2008.zip";
tag_summary = "This host is installed with UltraVNC VNCViewer and is prone to
Buffer Overflow Vulnerability.";
if(description)
{
script_xref(name : "URL" , value : "http://secunia.com/advisories/28804");
script_xref(name : "URL" , value : "http://forum.ultravnc.info/viewtopic.php?p=45150");
script_xref(name : "URL" , value : "http://www.frsirt.com/english/advisories/2008/0486/products");
script_xref(name : "URL" , value : "http://sourceforge.net/project/shownotes.php?release_id=571174;group_id=63887");
script_id(800131);
script_version("$Revision: 5370 $");
script_tag(name:"last_modification", value:"$Date: 2017-02-20 16:24:26 +0100 (Mon, 20 Feb 2017) $");
script_tag(name:"creation_date", value:"2008-11-14 10:43:16 +0100 (Fri, 14 Nov 2008)");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2008-5001");
script_bugtraq_id(27687);
script_name("UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"executable_version");
script_copyright("Copyright (C) 2008 Greenbone Networks GmbH");
script_family("Denial of Service");
script_dependencies("secpod_reg_enum.nasl");
script_mandatory_keys("SMB/WindowsVersion");
script_require_ports(139, 445);
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
exit(0);
}
include("smb_nt.inc");
include("secpod_smb_func.inc");
if(!get_kb_item("SMB/WindowsVersion")){
exit(0);
}
key = "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\";
if(!registry_key_exists(key:key)){
exit(0);
}
foreach item (registry_enum_keys(key:key))
{
vncName = registry_get_sz(item:"DisplayName", key:key +item);
if("UltraVNC" >!< vncName){
continue;
}
vncComp = registry_get_sz(item:"Inno Setup: Selected Components",
key:key + item);
if("viewer" >< vncComp)
{
vncPath = registry_get_sz(item:"InstallLocation", key:key +item);
if(!vncPath){
exit(0);
}
vncPath += "vncviewer.exe";
share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:vncPath);
file = ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:vncPath);
vncVer = GetVer(file:file, share:share);
if(!vncVer){
exit(0);
}
if(vncVer == "1.1.0.2"){
security_message(0);
}
else if ("1.0.4" >< vncVer)
{
report = string("NOTE: Ignore this report if above " +
"mentioned patch is already applied.\n ***** \n");
security_message(data:report);
}
exit(0);
}
}
{"id": "OPENVAS:800131", "type": "openvas", "bulletinFamily": "scanner", "title": "UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08", "description": "This host is installed with UltraVNC VNCViewer and is prone to\n Buffer Overflow Vulnerability.", "published": "2008-11-14T00:00:00", "modified": "2017-02-20T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=800131", "reporter": "Copyright (C) 2008 Greenbone Networks GmbH", "references": ["http://secunia.com/advisories/28804", "http://sourceforge.net/project/shownotes.php?release_id=571174;group_id=63887", "http://forum.ultravnc.info/viewtopic.php?p=45150", "http://www.frsirt.com/english/advisories/2008/0486/products"], "cvelist": ["CVE-2008-5001"], "lastseen": "2017-07-02T21:10:16", "viewCount": 2, "enchantments": {"score": {"value": 7.9, "vector": "NONE", "modified": "2017-07-02T21:10:16", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-5001"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310800131"]}], "modified": "2017-07-02T21:10:16", "rev": 2}, "vulnersScore": 7.9}, "pluginID": "800131", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ultravnc_cpp_file_mult_bof_vuln.nasl 5370 2017-02-20 15:24:26Z cfi $\n#\n# UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation allows attackers to execute arbitrary code\n by tricking a user into connecting to a malicious VNC server or by sending\n specially crafted data to a vncviewer in LISTENING mode and can even cause\n denial of service condition.\n Impact Level: Application\";\ntag_affected = \"UltraVNC VNCViewer Version 1.0.2 and 1.0.4 before RC11 on Windows (Any).\";\ntag_insight = \"The flaw is due to multiple boundary errors within the\n vncviewer/FileTransfer.cpp file, while processing malformed data.\";\ntag_solution = \"Upgrade to latest Version or\n Apply the available patch from below link,\n http://downloads.sourceforge.net/ultravnc/UltraVNC-Viewer-104-Security-Update-2---Feb-8-2008.zip\";\ntag_summary = \"This host is installed with UltraVNC VNCViewer and is prone to\n Buffer Overflow Vulnerability.\";\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/28804\");\n script_xref(name : \"URL\" , value : \"http://forum.ultravnc.info/viewtopic.php?p=45150\");\n script_xref(name : \"URL\" , value : \"http://www.frsirt.com/english/advisories/2008/0486/products\");\n script_xref(name : \"URL\" , value : \"http://sourceforge.net/project/shownotes.php?release_id=571174;group_id=63887\");\n script_id(800131);\n script_version(\"$Revision: 5370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 16:24:26 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-11-14 10:43:16 +0100 (Fri, 14 Nov 2008)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-5001\");\n script_bugtraq_id(27687);\n script_name(\"UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\";\n\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n vncName = registry_get_sz(item:\"DisplayName\", key:key +item);\n if(\"UltraVNC\" >!< vncName){\n continue;\n }\n\n vncComp = registry_get_sz(item:\"Inno Setup: Selected Components\",\n key:key + item);\n if(\"viewer\" >< vncComp)\n {\n vncPath = registry_get_sz(item:\"InstallLocation\", key:key +item);\n if(!vncPath){\n exit(0);\n }\n\n vncPath += \"vncviewer.exe\";\n share = ereg_replace(pattern:\"([A-Z]):.*\", replace:\"\\1$\", string:vncPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\", replace:\"\\1\", string:vncPath);\n\n vncVer = GetVer(file:file, share:share);\n if(!vncVer){\n exit(0);\n }\n\n if(vncVer == \"1.1.0.2\"){\n security_message(0);\n }\n else if (\"1.0.4\" >< vncVer)\n {\n report = string(\"NOTE: Ignore this report if above \" +\n \"mentioned patch is already applied.\\n ***** \\n\");\n security_message(data:report);\n }\n exit(0);\n }\n}\n", "naslFamily": "Denial of Service"}
{"cve": [{"lastseen": "2020-10-03T11:51:03", "description": "Multiple stack-based buffer overflows in multiple functions in vncviewer/FileTransfer.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified parameters, a different issue than CVE-2008-0610.", "edition": 3, "cvss3": {}, "published": "2008-11-10T14:12:00", "title": "CVE-2008-5001", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-5001"], "modified": "2011-03-08T03:13:00", "cpe": ["cpe:/a:ultravnc:ultravnc:1.0.2", "cpe:/a:ultravnc:ultravnc:1.0.4"], "id": "CVE-2008-5001", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5001", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-12-19T16:11:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5001"], "description": "This host is installed with UltraVNC VNCViewer and is prone to\n Buffer Overflow Vulnerability.", "modified": "2019-12-18T00:00:00", "published": "2008-11-14T00:00:00", "id": "OPENVAS:1361412562310800131", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800131", "type": "openvas", "title": "UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800131\");\n script_version(\"2019-12-18T15:04:04+0000\");\n script_tag(name:\"last_modification\", value:\"2019-12-18 15:04:04 +0000 (Wed, 18 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2008-11-14 10:43:16 +0100 (Fri, 14 Nov 2008)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-5001\");\n script_bugtraq_id(27687);\n script_name(\"UltraVNC VNCViewer Multiple Buffer Overflow Vulnerabilities - Nov08\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n\n script_xref(name:\"URL\", value:\"http://downloads.sourceforge.net/ultravnc/UltraVNC-Viewer-104-Security-Update-2---Feb-8-2008.zip\");\n script_xref(name:\"URL\", value:\"http://forum.ultravnc.info/viewtopic.php?p=45150\");\n script_xref(name:\"URL\", value:\"http://www.frsirt.com/english/advisories/2008/0486/products\");\n script_xref(name:\"URL\", value:\"http://sourceforge.net/project/shownotes.php?release_id=571174;group_id=63887\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation allows attackers to execute arbitrary code\n by tricking a user into connecting to a malicious VNC server or by sending specially crafted data to\n a vncviewer in LISTENING mode and can even cause denial of service condition.\");\n\n script_tag(name:\"affected\", value:\"UltraVNC VNCViewer Version 1.0.2 and 1.0.4 before RC11 on Windows (Any).\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to multiple boundary errors within the\n vncviewer/FileTransfer.cpp file, while processing malformed data.\");\n\n script_tag(name:\"solution\", value:\"Update to version 1.0.4 RC11 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with UltraVNC VNCViewer and is prone to\n Buffer Overflow Vulnerability.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\"); # Version check below is broken...\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\"))\n exit(0);\n\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\";\nif(!registry_key_exists(key:key))\n exit(0);\n\nforeach item(registry_enum_keys(key:key)) {\n vncName = registry_get_sz(item:\"DisplayName\", key:key +item);\n if(\"UltraVNC\" >!< vncName)\n continue;\n\n vncComp = registry_get_sz(item:\"Inno Setup: Selected Components\", key:key + item);\n if(\"viewer\" >< vncComp) {\n vncPath = registry_get_sz(item:\"InstallLocation\", key:key +item);\n if(!vncPath)\n continue;\n\n vncPath += \"vncviewer.exe\";\n share = ereg_replace(pattern:\"([A-Z]):.*\", replace:\"\\1$\", string:vncPath);\n file = ereg_replace(pattern:\"[A-Z]:(.*)\", replace:\"\\1\", string:vncPath);\n\n vncVer = GetVer(file:file, share:share);\n if(!vncVer)\n continue;\n\n if (vncVer == \"1.1.0.2\" || \"1.0.4\" >< vncVer) {\n report = report_fixed_ver(installed_version:vncVer, fixed_version:\"1.0.4RC11\");\n security_message(data:report, port:0);\n exit(0);\n }\n }\n}\n\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}