securecrt_remote_overflow.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 61 行

NASL
61
字号
##  This script was written by David Maciejak <david dot maciejak at kyxar dot fr>#  based on work from#  (C) Tenable Network Security##  Ref: Kyuzo <ogl@SirDrinkalot.rm-f.net>##  This script is released under the GNU GPL v2#if(description){ script_id(15822); script_cve_id("CVE-2002-1059"); script_bugtraq_id(5287); if ( defined_func("script_xref") ) script_xref(name:"OSVDB", value:"4991");  script_version("$Revision: 1323 $");   name["english"] = "SecureCRT SSH1 protocol version string overflow"; script_name(english:name["english"]);  desc["english"] = "The remote host is using a vulnerable version of SecureCRT, aSSH/Telnet client built for Microsoft Windows operation systems.It has been reported that SecureCRT contain a remote buffer overflowallowing an SSH server to execute arbitrary command via a speciallylong SSH1 protocol version string.Solution : Upgrade to SecureCRT 3.2.2, 3.3.4, 3.4.6, 4.1 or newerRisk factor : High"; script_description(english:desc["english"]);  summary["english"] = "Determines the version of SecureCRT"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2004 David Maciejak"); family["english"] = "Windows"; script_family(english:family["english"]);  script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/Registry/Enumerated"); script_require_ports(139, 445); exit(0);}version = get_kb_item("SMB/Registry/HKLM/SOFTWARE/VanDyke/SecureCRT/License/Version");if ( ! version ) version = get_kb_item("SMB/Registry/HKLM/SOFTWARE/VanDyke/SecureCRT/Evaluation License/Version");if ( ! version ) exit(0);if (egrep(pattern:"(2\.|3\.([01]|2[^.]|2\.1[^0-9]|3[^.]|3\.[1-3][^0-9]|4[^.]|4\.[1-5][^0-9])|4\.0 beta [12])", string:version))  security_hole(port);

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?