Lucene search

K
openvasCopyright (C) 2008 Tenable Network Security, Inc. and Michel ArboiOPENVAS:136141256231080036
HistoryOct 24, 2008 - 12:00 a.m.

rpc.ypupdated RCE Vulnerability

2008-10-2400:00:00
Copyright (C) 2008 Tenable Network Security, Inc. and Michel Arboi
plugins.openvas.org
19

AI Score

6.5

Confidence

Low

EPSS

0.548

Percentile

97.7%

ypupdated with the

# SPDX-FileCopyrightText: 2008 Tenable Network Security, Inc. and Michel Arboi
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.80036");
  script_version("2024-06-27T05:05:29+0000");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/1749");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/28383");
  script_cve_id("CVE-1999-0208");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-06-27 05:05:29 +0000 (Thu, 27 Jun 2024)");
  script_tag(name:"creation_date", value:"2008-10-24 20:15:31 +0200 (Fri, 24 Oct 2008)");
  script_name("rpc.ypupdated RCE Vulnerability");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2008 Tenable Network Security, Inc. and Michel Arboi");
  script_family("General");

  script_tag(name:"solution", value:"Remove the '-i' option.
  If this option was not set, the rpc.ypupdated daemon is still vulnerable
  to the old flaw. Contact your vendor for a patch.");

  script_tag(name:"summary", value:"ypupdated with the '-i' option enabled is running on this port.");

  script_tag(name:"insight", value:"ypupdated is part of NIS and allows a client to update NIS maps.

  This old command execution vulnerability was discovered in 1995 and fixed then. However, it is still
  possible to run ypupdated in insecure mode by adding the '-i' option. Anybody can easily run commands
  as root on this machine by specifying an invalid map name that starts with a pipe character. Exploits
  have been publicly available since the first advisory.");

  script_tag(name:"qod_type", value:"remote_vul");
  script_tag(name:"solution_type", value:"Mitigation");

  script_tag(name:"deprecated", value:TRUE);

  exit(0);
}

exit(66); # This VT had called various functions which doesn't exist

AI Score

6.5

Confidence

Low

EPSS

0.548

Percentile

97.7%