Lucene search

K
openvasThis script is Copyright (C) 2011 Greenbone Networks GmbHOPENVAS:103367
HistoryDec 14, 2011 - 12:00 a.m.

VxWorks Debugging Service Security-Bypass Vulnerability

2011-12-1400:00:00
This script is Copyright (C) 2011 Greenbone Networks GmbH
plugins.openvas.org
571

0.515 Medium

EPSS

Percentile

97.6%

VxWorks is prone to a remote security-bypass vulnerability.

Successful exploits will allow remote attackers to perform debugging
tasks on the vulnerable device.

The issue affects multiple products from multiple vendors that ship
with the VxWorks operating system.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_xvworks_debugging_service_42158.nasl 8236 2017-12-22 10:28:23Z cfischer $
#
# VxWorks Debugging Service Security-Bypass Vulnerability
#
# Authors:
# Michael Meyer <[email protected]>
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_summary = "VxWorks is prone to a remote security-bypass vulnerability.

Successful exploits will allow remote attackers to perform debugging
tasks on the vulnerable device.

The issue affects multiple products from multiple vendors that ship
with the VxWorks operating system.";

if (description)
{
 script_xref(name : "URL" , value : "http://www.securityfocus.com/bid/42158");
 script_xref(name : "URL" , value : "http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html");
 script_xref(name : "URL" , value : "http://www.windriver.com/");
 script_xref(name : "URL" , value : "http://www.securityfocus.com/archive/1/512825");
 script_xref(name : "URL" , value : "http://www.kb.cert.org/vuls/id/362332");
 script_id(103367);
 script_bugtraq_id(42158);
 script_cve_id("CVE-2010-2965");
 script_tag(name:"cvss_base", value:"10.0");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_version ("$Revision: 8236 $");

 script_name("VxWorks Debugging Service Security-Bypass Vulnerability");

 script_tag(name:"last_modification", value:"$Date: 2017-12-22 11:28:23 +0100 (Fri, 22 Dec 2017) $");
 script_tag(name:"creation_date", value:"2011-12-14 16:57:31 +0100 (Wed, 14 Dec 2011)");
 script_tag(name:"qod_type", value:"remote_vul");
 script_category(ACT_ATTACK);
 script_family("General");
 script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
 script_dependencies("rpcinfo.nasl");
 script_require_udp_ports(17185);
 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

port = 17185;
if( ! get_udp_port_state(port))exit(0);

soc = open_sock_udp(port);
if( ! soc ) exit(0);

function get_value(data, blob) {

  local_var value, tmp, i;

tmp = substr(data,blob);

for (i=0; i < strlen(data); i++)  {
  if (tmp[i] == '\0') {
    return value;
  }
  else {
   value += tmp[i];
  }

 }

return value;

}

paket = raw_string(0x50,0x26,0x30,0x91,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02,0x55,0x55,0x55,0x55,
                   0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
                   0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x2c,
                   0x8b,0x12,0x00,0x01);

send(socket:soc,data:paket);
recv = recv(socket:soc,length:4096);

if(isnull(recv) || ord(recv[7]) != 1)exit(0);

agent_vers = get_value(data:recv,blob:40);
if(!isnull(agent_vers)) {
  report += string("Agent version: ", agent_vers, "\n");
}

rtv = get_value(data:recv,blob:60);
if(!isnull(rtv)) {
  report += string("Run time version: ", rtv, "\n");
}

bname = get_value(data:recv,blob:88);
if(!isnull(bname)) {
  report += string("Board name: ", bname, "\n");
}

if(report) {
  report = string("It was possible to gather the following information from from the remote host:\n\n") + report;
  security_message(port:port,data:report);
} else {
  security_message(port:port);
}

exit(0);

0.515 Medium

EPSS

Percentile

97.6%