📄 smbcl_gnutls_cb-a08-0079.nasl
字号:
## This script was written by Carsten Koch-Mauthe <c.koch-mauthe at dn-systems.de>## This script is released under the GNU GPLv2## $Revision: 01 $if(description){ script_id(90027); script_version ("$Revision: 01 $"); script_cve_id("CVE-2008-1948"); name["english"] = "GnuTLS < 2.2.5 vulnerability"; script_name(english:name["english"]); desc["english"] = "The remote host is probably affected by the vulnerabilities described inCVE-2008-1948, CVE-2008-1949, CVE-2008-1950GnuTLS < 2.2.5 vulnerabilityImpact CVE-2008-1948 The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1. CVE-2008-1949 The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2. CVE 2008-1950 Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950Solution: All GnuTLS users should upgrade to the latest version:Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Determines GnuTLS < 2.2.5 vulnerability"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is under GPLv2"); family["english"] = "Windows"; script_family(english:family["english"]); exit(0);}## The code starts here#include("smbcl_func.inc");include("version_func.inc");if( check_smbcl() == 0 ) exit(0);local_var ver, test_version, sec_hole, sec_proto, r, path, share, prog;sec_hole = 0;sec_proto = "GnuTLS";ver = NULL;r = NULL;test_version = "2.2.5"; path = "Programme\"; share ="C$"; prog = "GnuTLS*"; r = smbgetdir(share: share, dir: path+prog, typ: 2 ); if( isnull(r) ) { path = "Program Files\"; r = smbgetdir(share: share, dir: path+prog, typ: 2 ); } if( !isnull(r) ) { foreach i (keys(r)) { ver = eregmatch(pattern:"[0-9].*", string:r[i]); if(!isnull(ver) ) { if(version_is_less(version:ver[0], test_version:test_version) ) { if(sec_hole == 0) { security_hole(port:0, proto:sec_proto); sec_hole = 1; } security_hole(port:0, proto:sec_proto, data:string("\nFound : ")+share + " " + path + r[i] + string("\n")); } } } }exit(0);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -