⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_ca_prdts_mult_vuln_900202.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################  CA kmxfw.sys Code Execution and DoS Vulnerabilities.##  Copyright: SecPod##  Date Written: 2008/08/18##  Revision: 1.1##  Log: veerendragg#  Issue #0122#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL #  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL, #  and information regarding obtaining source code from the Author. #  Consequently, pursuant to section 3(c) of the GPL, you must accompany the #  information found in this header with any distribution you make of this #  Program.#  ------------------------------------------------------------------------##############################################################################if(description){ script_id(900202); script_bugtraq_id(30651); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.1 "); script_category(ACT_GATHER_INFO); script_family(english:"Denial of Service"); script_name(english:"CA kmxfw.sys Code Execution and DoS Vulnerabilities"); script_summary(english:"Check for Engine version"); desc["english"] = " Overview : This host is running CA Product(s), which is prone to Local Code Execution and Denial of Service Vulnerabilities. Vulnerability Insight :        Multiple flaw are due to insufficient verification/validation of IOCTL        requests by the kmxfw.sys driver.        Impact : A remote/local user can cause denial of service conditions or        execute arbitrary code by sending a specially crafted IOCTL requests. Impact Level : Application Affected Software/OS :       CA Internet Security Suite 2007 (v3.2) with CA Personal Firewall           2007 (v9.1) Engine version 1.2.260 and below       CA Internet Security Suite 2008 (v4.0) with CA Personal Firewall           2008 (v10.0) Engine version 1.2.260 and below       CA Personal Firewall 2007 (v9.1) with Engine version 1.2.260 and below       CA Personal Firewall 2008 (v10.0) with Engine version 1.2.260 and below       CA Host-Based Intrusion Prevention System r8 Fix : Ensure the latest engine is installed by using the built-in update  mechanism and for Host-Based Intrusion Prevention System, https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=RO00535&actionID=4 ftp://ftp.ca.com/CAproducts/unicenter/CAHIPS/nt/0703/RO00535/RO00535.CAZ References : http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36560	      http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36559	      http://www.securityfocus.com/archive/1/archive/1/495397/100/0/threaded      	      http://securitytracker.com/alerts/2008/Aug/1020662.html      	      http://securitytracker.com/alerts/2008/Aug/1020663.html	      http://www.trapkit.de/advisories/TKADV2008-006.txt	      http://seclists.org/fulldisclosure/2008/Aug/0256.html CVSS Score :        CVSS Base Score     : 8.3 (AV:N/AC:M/Au:NR/C:P/I:P/A:C)        CVSS Temporal Score : 6.1 Risk factor : High"; script_description(english:desc["english"]); script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/WindowsVersion"); exit(0);} include("smb_nt.inc"); if(!get_kb_item("SMB/WindowsVersion")){        exit(0); } caEngVer = registry_get_sz(key:"SOFTWARE\CA\HIPSEngine", item:"Version"); if(!caEngVer){	exit(0); } # Grep for EngineVersion < 1.2.276  if(egrep(pattern:"^(0\..*|1\.[01](\..*)?|1\.2(\.([01]?[0-9]?[0-9]|" +		  "2[0-6][0-9]|27[0-5]))?)$",                 string:caEngVer)){       	security_hole(0); }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -