Lucene search

K
nessusThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.HP_PROCURVE_HPSBHF02912.NASL
HistoryDec 12, 2013 - 12:00 a.m.

HP Multiple Network Products Remote Information Disclosure and DoS (HPSBHF02912)

2013-12-1200:00:00
This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
www.tenable.com
23

CVSS2

7

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:P/I:N/A:C

EPSS

0.004

Percentile

72.4%

The remote HP router or switch could be missing a vendor-supplied update that corrects an issue that a malicious attacker could remotely exploit in order to cause a disclosure of information or denial of service (DoS).

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(71378);
  script_version("1.6");
  script_cvs_date("Date: 2018/11/15 20:50:23");

  script_cve_id("CVE-2013-4806");
  script_bugtraq_id(61691);
  script_xref(name:"HP", value:"HPSBHF02912");
  script_xref(name:"HP", value:"SSRT101224");
  script_xref(name:"HP", value:"emr_na-c03880910");
  script_xref(name:"CERT", value:"229804");

  script_name(english:"HP Multiple Network Products Remote Information Disclosure and DoS (HPSBHF02912)");
  script_summary(english:"Checks model number to determine presence of flaw");

  script_set_attribute(attribute: "synopsis", value:"The remote host is missing a vendor-supplied software update.");
  script_set_attribute(attribute: "description", value:
"The remote HP router or switch could be missing a vendor-supplied
update that corrects an issue that a malicious attacker could remotely
exploit in order to cause a disclosure of information or denial of
service (DoS).");
  script_set_attribute(attribute: "solution", value:"Apply the vendor-specified update.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c03880910
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?161f0c67");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/08/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/08/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/12");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:hp:procurve_switch");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:hp:3com_router");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:hp:h3c_ethernet_switch");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);

  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
  script_family(english:"Misc.");

  script_dependencies("ssh_get_info.nasl", "hp_procurve_version.nasl");
  script_require_keys("Host/HP_Switch", "Settings/ParanoidReport");
  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

if (!get_kb_item('Host/HP_Switch')) exit(0, "This is not an HP Switch.");

rev = get_kb_item_or_exit("Host/HP_Switch/SoftwareRevision");
if ( isnull(rev) || rev == "unknown" ) exit(0, "The software revision for the device could not be obtained.");

model = get_kb_item_or_exit("Host/HP_Switch/Model");
if ( isnull(model) || model == "unknown" ) exit(0, "The model number could not be obtained.");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

flag = 0;
fix_version = "";

# check the affected models
temp_fix_version="R5000_3.14p14";
products = make_list(
  "JD935A",
  "JD943A",
  "JD944A",
  "JD945A",
  "JD946A"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="R301X_1.40.23";
products = make_list(
  "JD916A",
  "JD919A"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="S5600_3.10.R1702P39";
products = make_list(
  "JD391A",
  "JD392A",
  "JD393A",
  "JD394A",
  "JD395A",
  "S5600-26C",
  "S5600-26C-PWR",
  "S5600-26F",
  "S5600-50C",
  "S5600-50C-PWR"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="E5500G_03.03.02p19";
products = make_list(
  "JE088A",
  "JE089A",
  "JE090A",
  "JE091A",
  "JE092A",
  "JE093A",
  "JE094A",
  "JE095A",
  "JE096A",
  "JE097A",
  "JF551A",
  "JF552A",
  "JF553A"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="E5500_03.03.02p19";
products = make_list(
  "JE099A",
  "JE100A",
  "JE101A",
  "JE102A",
  "JE103A",
  "JE104A",
  "JE105A",
  "JE106A",
  "JE107A",
  "JE108A",
  "JE109A",
  "JE110A"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="S3600.EI_3.10.R1702P34";
products = make_list(
  "JD326A",
  "JD328A",
  "JD331A",
  "JD333A",
  "JD334A",
  "S3600-28F-EI",
  "S3600-28P-EI",
  "S3600-28P-PWR-EI",
  "S3600-52P-EI",
  "S3600-52P-PWR-EI"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="E.11.38";
products = make_list(
  "J4819A",
  "J4848A",
  "J4848B",
  "J4849A",
  "J4849B",
  "J4850A",
  "J8166A",
  "J8167A"
);

foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="M.10.99";
products = make_list(
  "J4905A",
  "J4906A"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

temp_fix_version="M.08.140";
products = make_list(
  "J8433A",
  "J8474A"
);
foreach temp (products)
{
  if (temp == model && temp_fix_version != rev)
  {
    flag++;
    if (fix_version) fix_version += ", ";
    fix_version += temp_fix_version;
  }
}

# report as needed
if (flag)
{
  report = '\n' + 'The remote HP system is not patched :' +
           '\n' +
           '\n' + '  Model # : ' + model +
           '\n' +
           '\n' + '    Current software revision  : ' + rev +
           '\n' + '    Suggested software version : ' + fix_version +
           '\n';
  security_hole(port:0, extra:report);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

CVSS2

7

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:P/I:N/A:C

EPSS

0.004

Percentile

72.4%

Related for HP_PROCURVE_HPSBHF02912.NASL