Lucene search

K
nessusThis script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.SMB_NT_MS08-035.NASL
HistoryJun 12, 2008 - 12:00 a.m.

MS08-035: Vulnerability in Active Directory Could Allow Denial of Service (953235)

2008-06-1200:00:00
This script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
25

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.933

Percentile

99.1%

The remote version of Active Directory contains a denial of service vulnerability when processing LDAP requests. An attacker can exploit this flaw to crash the remote Active Directory server.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(33138);
 script_version("1.31");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/08/05");

  script_cve_id("CVE-2008-1445");
 script_bugtraq_id(29584);
 script_xref(name:"MSFT", value:"MS08-035");
 script_xref(name:"MSKB", value:"949014");
 script_xref(name:"MSKB", value:"949269");
 script_xref(name:"IAVA", value:"2008-A-0041-S");

 script_name(english:"MS08-035: Vulnerability in Active Directory Could Allow Denial of Service (953235)");
 script_summary(english:"Determines the presence of update 953235.");

 script_set_attribute(attribute:"synopsis", value:"It is possible to crash Active Directory on the remote host.");
 script_set_attribute(attribute:"description", value:
"The remote version of Active Directory contains a denial of service
vulnerability when processing LDAP requests. An attacker can exploit
this flaw to crash the remote Active Directory server.");
  # https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2008/ms08-035
  script_set_attribute(attribute:"see_also", value:"https://www.nessus.org/u?c76586a6");
 script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows 2000, Windows XP,
Windows 2003, and 2008.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2008-1445");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(20);

 script_set_attribute(attribute:"vuln_publication_date", value:"2008/06/10");
 script_set_attribute(attribute:"patch_publication_date", value:"2008/06/10");
 script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/12");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
 script_set_attribute(attribute:"stig_severity", value:"I");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

  script_copyright(english:"This script is Copyright (C) 2008-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Windows : Microsoft Bulletins");

 script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
 script_require_keys("SMB/MS_Bulletin_Checks/Possible");
 script_require_ports(139, 445, 'Host/patch_management_checks');
 exit(0);
}

include("audit.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_reg_query.inc");
include("misc_func.inc");

get_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');

bulletin = 'MS08-035';
ad_kb    = '949014';
adam_kb  = '949269';

kbs = make_list(ad_kb, adam_kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);

get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);

if (hotfix_check_sp_range(win2k:'4,5', xp:'2,3', win2003:'1,2', vista:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);

share = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);

registry_init();
hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);

# Determine if Active Directory is enabled.
ADAM_Enabled = FALSE;
LDS_Enabled  = FALSE;
NTDS_Enabled = FALSE;

# NTDS check
ntds_value = get_registry_value(
  handle:hklm, item:"SYSTEM\CurrentControlSet\Services\NTDS\Parameters\DSA Database file");
if (!isnull(ntds_value))
  NTDS_Enabled = TRUE;

# LDS check
lds_value = get_registry_value(
  handle:hklm, item:"SYSTEM\CurrentControlSet\Services\DirectoryServices\Performance\InstallType");
if (!isnull(lds_value))
  LDS_Enabled = TRUE;

# ADAM check
adam_value = get_registry_value(
  handle:hklm, item:"SYSTEM\CurrentControlSet\Services\ADAM\Performance\Library");
if (!isnull(adam_value))
  ADAM_Enabled = TRUE;

RegCloseKey(handle:hklm);
close_registry(close:FALSE);

if (!NTDS_Enabled && !ADAM_Enabled && !LDS_Enabled)
{
  hotfix_check_fversion_end();
  exit(0, "The host is not affected since none of the affected Active Directory products are installed.");
}

if (
  (NTDS_Enabled && hotfix_is_vulnerable(os:"5.2", sp:1, file:"ntdsa.dll", version:"5.2.3790.3122", dir:"\system32", bulletin:bulletin, kb:ad_kb)) ||
  (NTDS_Enabled && hotfix_is_vulnerable(os:"5.2", sp:2, file:"ntdsa.dll", version:"5.2.3790.4274", dir:"\system32", bulletin:bulletin, kb:ad_kb)) ||
  (ADAM_Enabled && hotfix_is_vulnerable(os:"5.2", sp:1, file:"adamdsa.dll", version:"1.1.3790.3129", dir:"\ADAM", bulletin:bulletin, kb:adam_kb)) ||
  (ADAM_Enabled && hotfix_is_vulnerable(os:"5.2", sp:2, file:"adamdsa.dll", version:"1.1.3790.4281", dir:"\ADAM", bulletin:bulletin, kb:adam_kb)) ||
  (ADAM_Enabled && hotfix_is_vulnerable(os:"5.1", sp:2, file:"adamdsa.dll", version:"1.1.3790.4276", dir:"\ADAM", bulletin:bulletin, kb:adam_kb)) ||
  (ADAM_Enabled && hotfix_is_vulnerable(os:"5.1", sp:3, file:"adamdsa.dll", version:"1.1.3790.4276", dir:"\ADAM", bulletin:bulletin, kb:adam_kb)) ||
  (NTDS_Enabled && hotfix_is_vulnerable(os:"5.0", file:"ntdsa.dll", version:"5.0.2195.7155", dir:"\system32", bulletin:bulletin, kb:ad_kb)) ||
  ((NTDS_Enabled || LDS_Enabled) && hotfix_is_vulnerable(os:"6.0", sp:1, file:"ntdsai.dll", version:"6.0.6001.18072", dir:"\system32", bulletin:bulletin, kb:ad_kb)) ||
  ((NTDS_Enabled || LDS_Enabled) && hotfix_is_vulnerable(os:"6.0", sp:1, file:"ntdsai.dll", version:"6.0.6001.22179", min_version:"6.0.6001.20000", dir:"\system32", bulletin:bulletin, kb:ad_kb))
)
{
  set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
  hotfix_security_hole();
  hotfix_check_fversion_end();
  exit(0);
}
else
{
  hotfix_check_fversion_end();
  audit(AUDIT_HOST_NOT, 'affected');
}

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.933

Percentile

99.1%