Vulnerabilities > CVE-2000-0472 - Remote Buffer Overflow vulnerability in ISC innd 2.x

047910
CVSS 3.6 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
local
low complexity
isc
nessus
exploit available

Summary

Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.

Vulnerable Configurations

Part Description Count
Application
Isc
5

Exploit-Db

descriptionISC innd 2.x Remote Buffer Overflow Vulnerability. CVE-2000-0472. Remote exploit for linux platform
idEDB-ID:19998
last seen2016-02-02
modified2000-06-12
published2000-06-12
reporterMichal Zalewski
sourcehttps://www.exploit-db.com/download/19998/
titleISC innd 2.x - Remote Buffer Overflow Vulnerability

Nessus

NASL familyGain a shell remotely
NASL idINND_OVERFLOW.NASL
descriptionThe remote version of INN is between 2.0 and 2.2.2 There is a known security flaw in this version of INN which may allow an attacker to execute arbitrary code on this server is the option
last seen2020-06-01
modified2020-06-02
plugin id10436
published2000-06-07
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10436
titleINN < 2.2.3 verifycancels Option Cancel Request Message Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10436);
 script_version ("1.21");
 script_cve_id("CVE-2000-0472");
 script_bugtraq_id(1316);

 script_name(english:"INN < 2.2.3 verifycancels Option Cancel Request Message Overflow");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a remote buffer overflow vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote version of INN is between 2.0 and 2.2.2

There is a known security flaw in this version of INN which
may allow an attacker to execute arbitrary code on this server
is the option 'verifycancels' is enabled in inn.conf" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/Jun/86" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to version 2.2.3 or make sure that the option 
verifycancel is disabled on this server." );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/06/07");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/06/06");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks INN version");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");
 script_dependencie("find_service1.nasl");
 script_require_ports("Services/nntp", 119);
 exit(0);
}

#
# The script code starts here
#

port = get_kb_item("Services/nntp");
if(!port) port = 119;

if(get_port_state(port))
{
 soc = open_sock_tcp(port);
  if(soc)
  {
   # check for INN 2.0.0 to 2.2.2
   
   r = recv_line(socket:soc, length:1024);
    if(ereg(string:r, pattern:"^20[01] .* INN 2\.(([0-1]\..*)|(2\.[0-2])) .*$"))
    {
      security_note(port);
    }
  }
}