📄 cisco_vpn_client_priv_escalation.nasl
字号:
## Script Written By Ferdy Riphagen # Script distributed under the GNU GPLv2 License. #if (description) { script_id(25550); script_version("$Revision: 1.2 $"); script_cve_id("CVE-2006-2679"); script_bugtraq_id(18094); script_xref(name:"OSVDB", value:"25888"); name["english"] = "Cisco VPN Client Privilege Escalation Vulnerability"; script_name(english:name["english"]); desc = "Synopsis :The remote windows host contains an application that is affected by aprivilege escalation vulnerability. Description :The installed Cisco VPN Client version is prone to a privilegeescalation attack. By using the 'Start before logon' feature in theVPN client dialer, a local attacker may gain privileges and executearbitrary commands with SYSTEM privileges. See also :http://www.cisco.com/warp/public/707/cisco-sa-20060524-vpnclient.shtmlSolution:Upgrade to version 4.8.01.0300 or a later. Risk factor : High / CVSS Base Score : 7.0(AV:L/AC:L/Au:NR/C:C/I:C/A:C/B:N)"; script_description(english:desc); summary = "Detects a privilege escalation in the Cisco VPN Client by query its version number"; script_summary(english:summary); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2007 Ferdy Riphagen"); script_dependencies("cisco_vpn_client_detect.nasl"); script_require_keys("SMB/CiscoVPNClient/Version"); exit(0);}version = get_kb_item("SMB/CiscoVPNClient/Version");if (version) { # These versions are reported vulnerable: # - 2.x, 3.x, 4.0.x, 4.6.x, 4.7.x, 4.8.00.x # Not vulnerable: # - 4.7.00.0533 if ("4.7.00.0533" >< version) exit(0); if (egrep(pattern:"^([23]\.|4\.([067]\.|8\.00)).+", string:version)) { security_hole(port:get_kb_item("SMB/transport")); }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -