Vulnerabilities > CVE-2000-0283 - Unspecified vulnerability in SGI Irix

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
sgi
nessus

Summary

The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.

Nessus

NASL familyMisc.
NASL idIRIX_COPILOT.NASL
descriptionThe service
last seen2020-06-01
modified2020-06-02
plugin id11369
published2003-03-13
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11369
titleIrix Performance Copilot Service Information Disclosure
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(11369);
 script_version ("1.19");
 script_cve_id("CVE-2000-0283", "CVE-2000-1193");
 script_bugtraq_id(1106, 4642);
 
 script_name(english:"Irix Performance Copilot Service Information Disclosure");

 script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by an information disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The service 'IRIX performance copilot' is running.

This service discloses sensitive information about the remote host,
and may be used by an attacker to perform a local denial of service.

*** This warning may be a false positive since the presence
*** of the bug was not verified locally." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/Apr/45" );
 script_set_attribute(attribute:"solution", value:
"Restrict access through the pmcd.conf file." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/03/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/12");
 script_cvs_date("Date: 2018/11/15 20:50:23");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Checks the presence of IRIX copilot");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"Misc."); 

 script_require_ports(4321);
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");

port = 4321;

if(get_port_state(port))
{
 soc = open_sock_tcp(port);
 if(!soc)exit(0);
 r = recv(socket:soc, length:20);
 m = raw_string(0x00, 0x00, 0x00, 0x14, 0x00, 0x00, 0x70, 0x00, 0x00, 0x00);
 if(m >< r) {
 	register_service(port:port, proto:"copilot");
 	security_warning(port);
	}
}