CVE-2008-1322 |
|
发布时间 :2008-03-13 10:44:00 | ||
修订时间 :2011-03-07 22:06:42 | ||||
NMCOE |
[原文]The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability.
[CNNVD]ASG-Sentry Network Manager 拒绝服务攻击漏洞(CNNVD-200803-217)
ASG-Sentry Network Manager 7.0.0 及其早期版本中的File Check Utility (fcheck.exe)远程攻击者通过一个详细说明-b 选择的查询字符串,来造成一个拒绝服务(CPU消耗)或写满任意文件。该问题可能源于一个变量注入漏洞。
–
CVSS (基础分值)
CVSS分值: | 7.8 | [严重(HIGH)] |
机密性影响: | NONE | [对系统的机密性无影响] |
完整性影响: | NONE | [不会对系统完整性产生影响] |
可用性影响: | COMPLETE | [可能导致系统完全宕机] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://xforce.iss.net/xforce/xfdb/41080 (UNKNOWN) XF asgsentry-fcheck-dos(41080) |
http://www.vupen.com/english/advisories/2008/0839/references (UNKNOWN) VUPEN ADV-2008-0839 |
http://www.securityfocus.com/bid/28188 (UNKNOWN) BID 28188 |
http://www.securityfocus.com/archive/1/archive/1/489359/100/0/threaded (UNKNOWN) BUGTRAQ 20080310 Multiple vulnerabilities in ASG-Sentry 7.0.0 |
http://www.milw0rm.com/exploits/5229 (UNKNOWN) MILW0RM 5229 |
http://securityreason.com/securityalert/3737 (UNKNOWN) SREASON 3737 |
http://secunia.com/advisories/29289 (VENDOR_ADVISORY) SECUNIA 29289 |
http://aluigi.altervista.org/adv/asgulo-adv.txt (UNKNOWN) MISC http://aluigi.altervista.org/adv/asgulo-adv.txt |
–
漏洞信息
ASG-Sentry Network Manager 拒绝服务攻击漏洞 | |
高危 | 其他 |
2008-03-13 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
ASG-Sentry Network Manager 7.0.0 及其早期版本中的File Check Utility (fcheck.exe)远程攻击者通过一个详细说明-b 选择的查询字符串,来造成一个拒绝服务(CPU消耗)或写满任意文件。该问题可能源于一个变量注入漏洞。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.asg-sentry.com/ |
–
漏洞信息 (5229)
ASG-Sentry <= 7.0.0 Multiple Remote Vulnerabilities (EDBID:5229) | |
multiple | dos |
2008-03-10 | Verified |
0 | Luigi Auriemma |
N/A |
[点击下载] |
####################################################################### Luigi Auriemma Application: ASG-Sentry http://www.asg-sentry.com Versions: <= 7.0.0 Platforms: Windows and Unix Bugs: A] arbitrary files deleting B] heap-overflow in FxAgent C] termination of FxIAList D] buffer-overflow in FxIAList Exploitation: remote Date: 10 Mar 2008 Author: Luigi Auriemma e-mail: [email protected] web: aluigi.org ####################################################################### 1) Introduction 2) Bugs 3) The Code 4) Fix ####################################################################### =============== 1) Introduction =============== >From vendor's website: "The ASG-Sentry family of products is a suite of tools strategically engineered to control, monitor, manage, and enhance your network. Sentry's tools provide you with full visibility to your network from any Web browser. Sentry also allows you to fully instrument your company's applications, CPUs, disk space, memory, files, Windows and UNIX platforms, and more." ####################################################################### ======= 2) Bugs ======= --------------------------- A] arbitrary files deleting --------------------------- The fcheck.exe (File Check Utility) CGI available in ASG is used for handling some index files which contain a list of filenames and checksums. The -b option of this utility allows the creation of these index files and is possible to specify both the name of the output file and, optionally, the folder which will be scanned recursively for finding and reading the various files to add to the list. The first vulnerability is in the possibility for an external attacker to use this CGI for overwriting existent files with no data (specifying a new folder which will be created by the same program) or with the list of filenames described before. Naturally is possible to specify both files on the local disks or on network shares. The second effect instead is the possibility of occupying CPU and disk for the scanning of any file in the disk simply specyfing, for example, c:\ as folder. --------------------------- B] heap-overflow in FxAgent --------------------------- The FxAgent process running on UDP port 6161 is used for handling the various SNMP requests. A community field longer than 64 bytes can be used by an attacker to exploit a heap-overflow. -------------------------- C] termination of FxIAList -------------------------- FxIAList is a service which runs on the TCP port 6162 and is used for the logging operations which include the commands "exit", "trace on" "verbose", "trace off" and the name of the log file to create (xxxx.xx.xx) and its content. The main problem is that the server doesn't require authentication so anyone can send the "exit" command and the service will just terminate. ------------------------------ D] buffer-overflow in FxIAList ------------------------------ The same service described before is affected also by a stack based buffer-overflow which happens during the copying of the data we want to write to the log file (max 1023 bytes) in a buffer of only 500. ####################################################################### =========== 3) The Code =========== http://aluigi.org/poc/asgulo.zip http://exploit-db.com/sploits/2008-asgulo.zip A] http://SERVER:6161/snmx-cgi/fcheck.exe?-b+..\../..\boot.ini http://SERVER:6161/snmx-cgi/fcheck.exe?-b+c:\windows\win.ini http://SERVER:6161/snmx-cgi/fcheck.exe?-b+c:\file.txt+c:\ http://SERVER:6161/snmx-cgi/fcheck.exe?-b+\host\document.txt this link for the network share is correct because Apache converts any backslash to double so that one becomes \\host\\document.txt B] nc SERVER 6161 -v -v -u < asgulo_fxagent.txt C] nc SERVER 6162 -v -v -w 1 < asgulo-ialist1.txt D] nc SERVER 6162 -v -v -w 1 < asgulo-ialist2.txt ####################################################################### ====== 4) Fix ====== No fix ####################################################################### # milw0rm.com [2008-03-10]
-
漏洞信息
43086 |
|
ASG-Sentry File Check Utility /snmx-cgi/fcheck.exe Arbitrary File Overwrite | |
Exploit Public |
-
漏洞描述
-
时间线
2008-03-10 |
Unknow |
Unknow | Unknow |