Lucene search

K
nessusThis script is Copyright (C) 2009-2023 and is owned by Tenable, Inc. or an Affiliate thereof.MACOSX_RDESKTOP.NASL
HistoryAug 11, 2009 - 12:00 a.m.

MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (Mac OS X)

2009-08-1100:00:00
This script is Copyright (C) 2009-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
6

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

Low

0.935 High

EPSS

Percentile

99.1%

The remote host contains a version of the Remote Desktop client that contains several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host.

To exploit these vulnerabilities, an attacker would need to trick a user of the remote host into connecting to a rogue RDP server.

#TRUSTED 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
#TRUST-RSA-SHA256 3b5e297e79a38b3cdae869c68499ec7e00407f2941826228006e305a43c72db594e5685a37400335f9fb4bf2b2a691c2bdf08bb45b3b18021af27b880eccbf0d4dc6a4448413bef458e4edcb8d58c8112c1be4b1831e25821d2baa39c092a66e8e39839f5d9e878a715c2006c902f6e938178dfd1971ec78f70da05c6cbbc4bdca6219a502ea866cbbb9b1356bceef40102fae14fc8744ec3fbed5946233f8dc4b0da6d13cbb85745aee51c0f562c6c54779ef3ef10ae07294b39fc6a8696a78e46479536f225ba27b49fc2768cde9b1e62239e05f6554fd7e206b769445f90cd46194a79633190d1d689debcc1cad95c6232df272f176983ceec8dd1b49f52a34d458552aeffdc17a690a48184ba2ba2496f4a7177147f1363ff593203143440596d63eaec1c8e055f9cfe96ad3bc0218e2c0e527ce2b6ee430e59fb470cb69f4352031c4060f86d82afba6c165b57f060c72e9ab1783a6bc7292d35688733d8caff3360d49edb1a35ed41535e1568ac602638fff7d6a0607f74bcb70491ffc8977b53e180da93b87fcf9017301bc59badc4dc365e7de824ca3a94f408648fc83d31918313d2225590d17a1a0234bd109b1debc638d9aad6e801f1ef49e31bda2a2b02e45e62b2ba45ee0fc8e708d87230f910e727249f37d4e0db91f64539d309e6ac4573a8dbec2d8e8405e01fde2317191474f7313ec6c939254ab2ff224
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(40563);
 script_version("1.24");
 script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/27");

  script_cve_id("CVE-2009-1133", "CVE-2009-1929");
 script_bugtraq_id(35971, 35973);
 script_xref(name:"IAVA", value:"2009-A-0071-S");
 script_xref(name:"MSFT", value:"MS09-044");
 script_xref(name:"MSKB", value:"974283");

 script_name(english:"MS09-044: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (Mac OS X)");
 script_summary(english:"Check for Remote Desktop Connection for Mac OS X");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host through Microsoft
Remote Desktop Connection.");
 script_set_attribute(attribute:"description", value:
"The remote host contains a version of the Remote Desktop client that
contains several vulnerabilities that may allow an attacker to execute
arbitrary code on the remote host.

To exploit these vulnerabilities, an attacker would need to trick a
user of the remote host into connecting to a rogue RDP server.");
  script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms09-044");
 script_set_attribute(attribute:"solution", value:"Microsoft has released a patch for Remote Desktop Client for Mac OS X.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-1929");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(119);

 script_set_attribute(attribute:"patch_publication_date", value:"2009/08/11");
 script_set_attribute(attribute:"plugin_publication_date", value:"2009/08/11");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:remote_desktop_client");
 script_set_attribute(attribute:"stig_severity", value:"II");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2009-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/MacOSX/packages");

 exit(0);
}


include("misc_func.inc");
include("ssh_func.inc");
include("macosx_func.inc");



enable_ssh_wrappers();

uname = get_kb_item("Host/uname");
if ( egrep(pattern:"Darwin.*", string:uname) )
{
  file    = GetBundleVersionCmd(file:"Remote Desktop Connection.app", path:"/Applications");
  file    = ereg_replace(pattern:"version\.plist", replace:"Info.plist", string:file);
  if ( ! islocalhost() )
  {
   ret = ssh_open_connection();
   if ( ! ret ) exit(0);
   buf = ssh_cmd(cmd:file);
   ssh_close_connection();
  }
  else
  {
  buf = pread_wrapper(cmd:"/bin/bash", argv:make_list("bash", "-c", file));
  }

 if ( buf =~ "^2" )
 {
  v = split(buf, sep:'.', keep:FALSE);
  if ( int(v[0]) == 2 && int(v[1]) == 0 && int(v[2]) == 0 )
	security_hole(port:0);
 }
}
VendorProductVersionCPE
microsoftremote_desktop_clientcpe:/a:microsoft:remote_desktop_client

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

Low

0.935 High

EPSS

Percentile

99.1%