Lucene search

K
nessusThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.MALWAREBYTES_ANTI_EXPLOIT_1_04_1_1012.NASL
HistoryJun 03, 2015 - 12:00 a.m.

Malwarebytes Anti-Exploit < 1.04.1.1012 RCE

2015-06-0300:00:00
This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
15

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.012 Low

EPSS

Percentile

85.3%

The Malwarebytes Anti-Exploit installed on the remote Windows host is a version prior to 1.04.1.1012. It is, therefore, affected by a vulnerability that allows a man-in-the-middle attacker to spoof the update server in order to upload and execute arbitrary code on the remote host.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(83957);
  script_version("1.6");
  script_cvs_date("Date: 2019/11/22");

  script_cve_id("CVE-2014-4936");

  script_name(english:"Malwarebytes Anti-Exploit < 1.04.1.1012 RCE");
  script_summary(english:"Checks the Malwarebytes Anti-Exploit version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an anti-exploitation application installed that is
affected by a remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The Malwarebytes Anti-Exploit installed on the remote Windows host is
a version prior to 1.04.1.1012. It is, therefore, affected by a
vulnerability that allows a man-in-the-middle attacker to spoof the
update server in order to upload and execute arbitrary code on the
remote host.");
  script_set_attribute(attribute:"see_also", value:"https://www.malwarebytes.com/support/releasehistory/");
  # https://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and#_=_
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?28c4367f");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Malwarebytes Anti-Exploit 1.04.1.1012 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Malwarebytes Anti-Malware and Anti-Exploit Update Remote Code Execution');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/11");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/09/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/06/03");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:malwarebytes:malwarebytes_anti-exploit");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("malwarebytes_anti_exploit_installed.nbin");
  script_require_keys("installed_sw/Malwarebytes Anti-Exploit");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app = "Malwarebytes Anti-Exploit";

install = get_single_install(
  app_name : app,
  exit_if_unknown_ver : TRUE
);
path    = install["path"];
version = install["version"];
edition = install["Edition"];

if (edition == "Business")
  audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
else if (edition == UNKNOWN_VER && report_paranoia < 2)
  exit(0, "The edition of " + app + " could not be determined.");

port = get_kb_item('SMB/transport');
if (!port) port = 445;

fix = '1.04.1.1012';

if (ver_compare(fix:fix, ver:version, strict:FALSE) < 0)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : ' + path +
      '\n  Edition           : ' + edition +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fix +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
VendorProductVersionCPE
malwarebytesmalwarebytes_anti-exploitcpe:/a:malwarebytes:malwarebytes_anti-exploit

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.012 Low

EPSS

Percentile

85.3%

Related for MALWAREBYTES_ANTI_EXPLOIT_1_04_1_1012.NASL