code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(10434);
script_version("1.49");
script_cvs_date("Date: 2018/11/15 20:50:29");
script_cve_id("CVE-2000-0404");
script_bugtraq_id(1262);
script_xref(name:"MSFT", value:"MS00-036");
script_xref(name:"MSKB", value:"262694");
script_name(english:"MS00-036: NT ResetBrowser frame & HostAnnouncement flood patch (262694)");
script_summary(english:"Determines whether the hotfix Q262694 is installed");
script_set_attribute(attribute:"synopsis", value:
"It is possible to partially crash the remote host.");
script_set_attribute(attribute:"description", value:
"The hotfix for the 'ResetBrowser Frame' and the 'HostAnnouncement
flood' has not been applied.
The first of these vulnerabilities allows anyone to shut down the
network browser of this host at will.
The second vulnerability allows an attacker to add thousands of bogus
entries in the master browser, which will consume most of the network
bandwidth as a side effect.");
script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2000/ms00-036");
script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows NT and 2000.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2000/05/25");
script_set_attribute(attribute:"patch_publication_date", value:"2000/05/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2000/05/31");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
script_family(english:"Windows : Microsoft Bulletins");
script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, 'Host/patch_management_checks');
exit(0);
}
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
bulletin = 'MS00-036';
kb = "262694";
kbs = make_list(kb);
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
get_kb_item_or_exit('SMB/Registry/Enumerated');
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);
if (hotfix_check_sp(nt:7, win2k:2) <= 0) exit(0, "The host is not affected based on its version / service pack.");
if (
hotfix_missing(name:"Q299444") > 0 &&
hotfix_missing(name:"Q262694") > 0
)
{
if (
defined_func("report_xml_tag") &&
!isnull(bulletin) &&
!isnull(kb)
) report_xml_tag(tag:bulletin, value:kb);
hotfix_security_warning();
set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
exit(0);
}
else exit(0, "The host is not affected.");
|