Lucene search

K
nessusThis script is Copyright (C) 2002-2024 Thomas ReinkeOPENSSH_AFS.NASL
HistoryMay 12, 2002 - 12:00 a.m.

OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow

2002-05-1200:00:00
This script is Copyright (C) 2002-2024 Thomas Reinke
www.tenable.com
92

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.6

Confidence

Low

EPSS

0.557

Percentile

97.7%

You are running a version of OpenSSH older than OpenSSH 3.2.1.

A buffer overflow exists in the daemon if AFS is enabled on your system, or if the options KerberosTgtPassing or AFSTokenPassing are enabled. Even in this scenario, the vulnerability may be avoided by enabling UsePrivilegeSeparation.

Versions prior to 2.9.9 are vulnerable to a remote root exploit. Versions prior to 3.2.1 are vulnerable to a local root exploit.

#
# This script was written by Thomas Reinke <[email protected]>
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title, formatted output, enhanced solution, changed plugin family (8/18/09)


include("compat.inc");

if(description)
{
	script_id(10954);
	script_version("1.29");
	script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/27");

 	script_cve_id("CVE-2002-0575");
 	script_bugtraq_id(4560);
 
 	script_name(english:"OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow");
 	script_summary(english:"Checks for the remote SSH version");
 
 	script_set_attribute(attribute:"synopsis", value:
"Arbitrary code may be run on the remote host." );
 	script_set_attribute(attribute:"description", value:
"You are running a version of OpenSSH older than OpenSSH 3.2.1.

A buffer overflow exists in the daemon if AFS is enabled on
your system, or if the options KerberosTgtPassing or
AFSTokenPassing are enabled.  Even in this scenario, the
vulnerability may be avoided by enabling UsePrivilegeSeparation.

Versions prior to 2.9.9 are vulnerable to a remote root
exploit. Versions prior to 3.2.1 are vulnerable to a local
root exploit." );
 	script_set_attribute(attribute:"solution", value:
"Upgrade to version 3.2.1 or later." );
	script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
	script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
	script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
	script_set_attribute(attribute:"exploit_available", value:"true");

	script_set_attribute(attribute:"plugin_publication_date", value: "2002/05/12");
	script_set_attribute(attribute:"vuln_publication_date", value: "2003/05/22");
	script_set_attribute(attribute:"plugin_type", value:"remote");
	script_set_attribute(attribute:"cpe", value:"cpe:/a:openbsd:openssh");
	script_end_attributes();

	script_category(ACT_GATHER_INFO);
	script_family(english:"Gain a shell remotely");
	
	script_copyright(english:"This script is Copyright (C) 2002-2024 Thomas Reinke");

 if (!defined_func("bn_random")) 
	script_dependencie("openssh_detect.nbin");
 else
	script_dependencie("openssh_detect.nbin", "redhat-RHSA-2002-131.nasl");
  script_require_keys("installed_sw/OpenSSH");
  script_require_ports("Services/ssh", 22);
	exit(0);
}

include('backport.inc');
include('vcf.inc');
include('vcf_extras.inc');

if (get_kb_item("CVE-2002-0640")) exit(0);

var port = get_service(svc:'ssh', default:22, exit_on_fail:TRUE);
var app_info = vcf::openssh::get_app_info(app:'OpenSSH', port:port);

vcf::check_all_backporting(app_info:app_info);

var constraints = [
  {'fixed_version' : '3.2.1'}
];

vcf::openssh::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.6

Confidence

Low

EPSS

0.557

Percentile

97.7%