cisco_vpn_client_priv_escalation.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 65 行

NASL
65
字号
## Script Written By Ferdy Riphagen # Script distributed under the GNU GPLv2 License. #if (description) { script_id(25550); script_version("$Revision: 1.2 $"); script_cve_id("CVE-2006-2679"); script_bugtraq_id(18094); script_xref(name:"OSVDB", value:"25888"); name["english"] = "Cisco VPN Client Privilege Escalation Vulnerability"; script_name(english:name["english"]); desc = "Synopsis :The remote windows host contains an application that is affected by aprivilege escalation vulnerability. Description :The installed Cisco VPN Client version is prone to a privilegeescalation attack.  By using the 'Start before logon' feature in theVPN client dialer, a local attacker may gain privileges and executearbitrary commands with SYSTEM privileges. See also :http://www.cisco.com/warp/public/707/cisco-sa-20060524-vpnclient.shtmlSolution:Upgrade to version 4.8.01.0300 or a later. Risk factor : High / CVSS Base Score : 7.0(AV:L/AC:L/Au:NR/C:C/I:C/A:C/B:N)"; script_description(english:desc); summary = "Detects a privilege escalation in the Cisco VPN Client by query its version number"; script_summary(english:summary); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2007 Ferdy Riphagen"); script_dependencies("cisco_vpn_client_detect.nasl"); script_require_keys("SMB/CiscoVPNClient/Version"); exit(0);}version = get_kb_item("SMB/CiscoVPNClient/Version");if (version) {	# These versions are reported vulnerable:	# - 2.x, 3.x, 4.0.x, 4.6.x, 4.7.x, 4.8.00.x	# Not vulnerable:	# - 4.7.00.0533 	if ("4.7.00.0533" >< version) exit(0);	if (egrep(pattern:"^([23]\.|4\.([067]\.|8\.00)).+", string:version)) {		security_hole(port:get_kb_item("SMB/transport"));	}}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?