⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gb_cups_mult_vuln_oct08.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################ OpenVAS Vulnerability Test# $Id: gb_cups_mult_vuln_oct08.nasl 316 2008-10-14 12:02:36Z oct $## CUPS Multiple Vulnerabilities - Oct08## Authors:      Veerendra GG <veerendragg@secpod.com>## Copyright:# Copyright (c) 2008 Intevation GmbH, http://www.intevation.net## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2# (or any later version), as published by the Free Software Foundation.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.###############################################################################if(description){  script_id(800111);  script_version("$Revision: 1.0 $");  script_cve_id("CVE-2008-3639", "CVE-2008-3640", "CVE-2008-3641");  script_bugtraq_id(31681, 31688, 31690);  script_name(english:"CUPS Multiple Vulnerabilities - Oct08");  desc["english"] = "  Overview: This host is running CUPS (Common UNIX Printing System) Service,  which is prone to Buffer Overflow and Integer Overflow Vulnerabilities.  Vulnerability Insight:  The flaws are caused due to,  - an error in the implementation of the HP-GL/2 filter and can be    exploited to cause buffer overflows with HP-GL/2 files containing overly    large pen numbers.  - an error within the read_rle8() and read_rle16() functions when    parsing malformed Run Length Encoded(RLE) data within Silicon Graphics    Image(SGI) files and can exploited to cause heap-based buffer overflow    with a specially crafted SGI file.  - an error within the WriteProlog() function included in the texttops    utility and can be exploited to cause a heap-based buffer overflow with    specially crafted file.  Impact:  Successful exploitation allows remote attackers to execute arbitrary code or  compromise a vulnerable system.  Impact Level: System  Affected Software/OS:  CUPS versions prior to 1.3.9  Fix:  Upgrade to CUPS version 1.3.9  http://www.cups.org/software.php  References:  http://cups.org/articles.php?L575  http://secunia.com/advisories/32226/  http://www.frsirt.com/english/advisories/2008/2782/  CVSS Score:    CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)    CVSS Temporal Score : 6.9  Risk factor: High";  script_description(english:desc["english"]);  script_summary(english:"Check for the version of CUPS service");  script_category(ACT_GATHER_INFO);  script_copyright(english:"Copyright (C) 2008 Intevation GmbH");  script_family(english:"Denial of Service");  script_dependencies("http_version.nasl");  script_require_ports("Services/www", 631);  exit(0);}include("http_func.inc");cupsPort = get_http_port(default:631);if(!cupsPort){  exit(0);}sndReq = http_get(item:string(dir, "/"), port:cupsPort);recRes = http_send_recv(port:cupsPort, data:sndReq);if(recRes == NULL){  exit(0);}if("<TITLE>Home - CUPS" >< recRes &&   egrep(pattern:"^HTTP/.* 200 OK", string:recRes)){  if(egrep(pattern:"CUPS (1\.[0-2](\..*)?|1\.3(\.[0-8])?($|[^.0-9]))",           string:recRes)){    security_hole(cupsPort);  }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -