Lucene search

K
nessusThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.BADBLUE_MAX_CONNECTIONS_DOS.NASL
HistoryAug 23, 2004 - 12:00 a.m.

BadBlue Connection Saturation Remote DoS

2004-08-2300:00:00
This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
www.tenable.com
7

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.074

Percentile

94.1%

According to its banner, the remote BadBlue web server has a bug which may allow attackers to prevent it from serving pages properly. It is possible to disable the remote BadBlue server by issuing approximately 24 concurrent connections to the remote host. An attacker may exploit this flaw by issuing over 24 connections to the remote server and waiting indefinitely, thus preventing legitimate users from being able to connect to this service at all.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(14350);
 script_version ("1.14");
 script_cve_id("CVE-2004-1727");
 script_bugtraq_id(10983);

 script_name(english:"BadBlue Connection Saturation Remote DoS"); 
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a denial of service vulnerability." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the remote BadBlue web server has a bug which 
may allow attackers to prevent it from serving pages properly. It is 
possible to disable the remote BadBlue server by issuing approximately
24 concurrent connections to the remote host. An attacker may exploit 
this flaw by issuing over 24 connections to the remote server and 
waiting indefinitely, thus preventing legitimate users from being able 
to connect to this service at all." );
 script_set_attribute(attribute:"solution", value:
"There is no known solution at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:U/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/08/23");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/08/20");
 script_cvs_date("Date: 2018/06/27 18:42:26");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
 
 script_summary(english:"Get the version of the remote badblue server");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");
 script_require_ports("Services/www", 80);
 script_dependencies("find_service1.nasl", "http_version.nasl");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if(!banner)exit(0);

vulnerable = egrep(pattern:"^Server: BadBlue/(1\.|2\.[0-5])", string:banner);
if(vulnerable)security_warning(port);


CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.074

Percentile

94.1%

Related for BADBLUE_MAX_CONNECTIONS_DOS.NASL