⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_openvpn_client_code_exec_vuln_900024.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################  OpenVPN Client Remote Code Execution Vulnerability##  Copyright: SecPod##  Date Written: 2008/08/08##  Revision: 1.3 ##  Log: schandan#  Issue #0095#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL #  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL, #  and information regarding obtaining source code from the Author. #  Consequently, pursuant to section 3(c) of the GPL, you must accompany the #  information found in this header with any distribution you make of this #  Program.#  ------------------------------------------------------------------------##############################################################################if(description){ script_id(900024); script_bugtraq_id(30532); script_cve_id("CVE-2008-3459"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.3 "); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_name(english:"OpenVPN Client Remote Code Execution Vulnerability"); summary["english"] = "Check for vulnerable version of OpenVPN"; script_summary(english:"Check for vulnerable version of OpenVPN"); desc["english"] = " Overview : The host is running OpenVPN Client, which is prone to remote code execution vulnerability. Vulnerability Insight:        Application fails to properly validate the specially crafted input        passed to lladdr/iproute configuration directives.        Impact : Remote attackers could execute arbitrary code on the Client.        Successful exploitation requires,        - the client to agree to allow the server to push configuration          directives to it by including pull or the macro client in its          configuration file.        - the client successfully authenticates the server.        - the server is malicious and has been compromised under the control          of the attacker. Impact Level : Application/System Affected Software/OS :        Non-Windows OpenVPN client OpenVPN 2.1-beta14 to OpenVPN 2.1-rc8 Fix : Upgrade to higher version of Non-Windows OpenVPN client OpenVPN 2.1-rc9 http://openvpn.net/index.php/downloads.html References : http://www.frsirt.com/english/advisories/2008/2316 http://openvpn.net/index.php/documentation/change-log/changelog-21.html CVSS Score :        CVSS Base Score     : 6.0 (AV:N/AC:M/Au:SI/C:P/I:P/A:P)        CVSS Temporal Score : 4.4 Risk factor : Medium"; script_description(english:desc["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/uname"); exit(0);} include("ssh_func.inc");  if("Linux" >!< get_kb_item("ssh/login/uname")){        exit(0); } foreach item (get_kb_list("ssh/*/rpms")) {        if("openvpn~" >< item)        {		# Grep for openvpn 2.1-beta14 to 2.1-rc8                if(egrep(pattern:"^openvpn~2.1~.*(beta14|rc[0-8])($|[^0-9])",			 string:item)){                        security_hole(0);                }                exit(0);        } } sock = ssh_login_or_reuse_connection(); if(!sock){        exit(0); }  vpnVer = ssh_cmd(socket:sock, cmd:"openvpn --version", timeout:timeout); ssh_close_connection();  if(!vpnVer){        exit(0); } # Grep for openvpn 2.1-beta14 to 2.1-rc8 if(egrep(pattern:"OpenVPN 2.1_(beta14|rc[0-8])($|[^.0-9])", string:vpnVer)){        security_hole(0); }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -