Lucene search

K
nessusThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.EDIRECTORY_DS_INTEGER_OVERFLOW.NASL
HistoryJul 07, 2008 - 12:00 a.m.

Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows

2008-07-0700:00:00
This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
www.tenable.com
14

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.822 High

EPSS

Percentile

98.4%

The remote host is running eDirectory, a directory service software from Novell.

The installed version of eDirectory is affected by an integer overflow issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well as a heap-based buffer overflow that can be triggered by passing NULL search parameters to the LDAP service. An unauthenticated attacker may be able to leverage either issue to execute code on the remote host with SYSTEM privileges.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(33397);
  script_version("1.20");
  script_cvs_date("Date: 2018/11/15 20:50:22");

  script_cve_id("CVE-2008-1809", "CVE-2008-3159");
  script_bugtraq_id(30085, 30175);

  script_name(english:"Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows");
  script_summary(english:"Checks version from an ldap search");

  script_set_attribute(attribute:"synopsis", value:
"The remote directory service is affected by multiple buffer overflows.");
  script_set_attribute(attribute:"description", value:
"The remote host is running eDirectory, a directory service software
from Novell.

The installed version of eDirectory is affected by an integer overflow
issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well
as a heap-based buffer overflow that can be triggered by passing NULL
search parameters to the LDAP service.  An unauthenticated attacker
may be able to leverage either issue to execute code on the remote
host with SYSTEM privileges.");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-08-041/");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Jul/145");
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0f5cb3d8");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Jul/146");
  script_set_attribute(attribute:"see_also", value:"https://support.microfocus.com/kb/doc.php?id=3694858");
  script_set_attribute(attribute:"see_also", value:"https://support.microfocus.com/kb/doc.php?id=3843876");
  script_set_attribute(attribute:"solution", value:
"Upgrade to eDirectory 8.8.2 FTF2 / 8.7.3 SP10b or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119, 189);

  script_set_attribute(attribute:"plugin_publication_date", value: "2008/07/07");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:novell:edirectory");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Gain a shell remotely");
  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");

  script_dependencies("ldap_search.nasl");
  script_require_keys("Services/ldap");
  script_require_ports("Services/ldap", 389);

  exit(0);
}

include("global_settings.inc");

port = get_kb_item("Services/ldap");
if (isnull(port)) exit(0);

banner = get_kb_item(string("LDAP/",port,"/vendorVersion"));
if ( "Novell eDirectory" >!< banner ) exit(0);

if (!egrep(pattern:"^LDAP Agent for Novell eDirectory [0-9]+\.[0-9]+.* \([0-9]+\.[0-9]+\)$", string:banner))
  exit(0);

main = ereg_replace(pattern:"^LDAP Agent for Novell eDirectory ([0-9]+\.[0-9]+).* \([0-9]+\.[0-9]+\)$", string:banner, replace:"\1");
version = ereg_replace(pattern:"^LDAP Agent for Novell eDirectory [0-9]+\.[0-9]+.* \(([0-9]+\.[0-9]+)\)$", string:banner, replace:"\1");

version = split(version, sep:".", keep:FALSE);
build = int(version[0]);
rev = int(version[1]);

if ( ( ("8.7" >< main) && ( (build < 10555) || ( build == 10555 && rev < 98 ) ) ) ||
     ( ("8.8" >< main) && ( (build < 20216) || ( build == 20216 && rev < 51 ) ) ) )
{
 if(report_verbosity > 0)
 {
  report = string(
          "\n", banner," is installed on the remote host.\n"
        );
  security_hole(port:port, extra:report);
 }	
 else	
   security_hole(port); 
}
VendorProductVersionCPE
novelledirectorycpe:/a:novell:edirectory

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.822 High

EPSS

Percentile

98.4%

Related for EDIRECTORY_DS_INTEGER_OVERFLOW.NASL