Lucene search

K
nessusThis script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.ERICOM_ACCESSNOW_3_3_1_4095.NASL
HistoryJun 30, 2014 - 12:00 a.m.

Ericom AccessNow Server < 3.3.1.4095 Stack-Based Buffer Overflow

2014-06-3000:00:00
This script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
19

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.7

Confidence

High

EPSS

0.877

Percentile

98.7%

The remote web server has an Ericom AccessNow server product prior to version 3.3.1.4095. It is, therefore, affected by a stack-based buffer overflow vulnerability that can be triggered by requesting a non-existent file. Successful exploitation can result in remote code execution or a denial of service condition.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(76311);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/04");

  script_cve_id("CVE-2014-3913");
  script_bugtraq_id(67777);

  script_name(english:"Ericom AccessNow Server < 3.3.1.4095 Stack-Based Buffer Overflow");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a buffer overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote web server has an Ericom AccessNow server product prior to
version 3.3.1.4095. It is, therefore, affected by a stack-based buffer
overflow vulnerability that can be triggered by requesting a
non-existent file. Successful exploitation can result in remote code
execution or a denial of service condition.");
  script_set_attribute(attribute:"see_also", value:"https://www.ericom.com/security-ERM-2014-610.asp");
  script_set_attribute(attribute:"solution", value:
"Upgrade to AccessNow version 3.3.1.4095 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Ericom AccessNow Server Buffer Overflow');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/06/02");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/06/02");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/30");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ericom:accessnow_server");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ericom_accessnow_detect.nbin");
  script_require_keys("www/ericomaccessnow");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 8080);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:8080);

appname = "Ericom AccessNow";

install = get_install_from_kb(
  appname      : 'ericomaccessnow',
  port         : port,
  exit_on_fail : TRUE
);

dir = install["dir"];
version = install["ver"];

install_loc = build_url(port:port, qs:dir + "/");

if (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_WEB_APP_VER, appname, install_loc);

fixed = '3.3.1.4095';

if (ver_compare(ver:version, fix:fixed, strict:FALSE) == -1)
{

  if (report_verbosity > 0)
  {
    report =
      '\n  URL               : ' +install_loc+
      '\n  Installed version : ' +version+
      '\n  Fixed version     : ' + fixed + '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, appname,  install_loc, version);

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.7

Confidence

High

EPSS

0.877

Percentile

98.7%