Vulnerabilities > CVE-2003-0237 - Remote Command Execution vulnerability in Mirabilis ICQ Features On Demand

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
mirabilis
nessus

Summary

The "ICQ Features on Demand" functionality for Mirabilis ICQ Pro 2003a does not properly verify the authenticity of software upgrades, which allows remote attackers to install arbitrary software via a spoofing attack.

Nessus

NASL familyWindows
NASL idICQ_VULNS.NASL
descriptionThere are multiple flaws in versions of ICQ before 2003b, including some that may allow an attacker to execute arbitrary code on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id11572
published2003-05-05
reporterThis script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11572
titleICQ < 2003b Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

# Ref: 
# Date: Mon, 05 May 2003 16:44:47 -0300
# From: CORE Security Technologies Advisories <[email protected]>
# To: Bugtraq <[email protected]>,
# Subject: CORE-2003-0303: Multiple Vulnerabilities in Mirabilis ICQ client
#


include("compat.inc");

if(description)
{
 script_id(11572);
 script_version("1.16");
 script_cve_id("CVE-1999-1418", "CVE-1999-1440", "CVE-2000-0046", "CVE-2000-0564",
               "CVE-2000-0552", "CVE-2001-0367", "CVE-2002-0028", "CVE-2001-1305",
               "CVE-2003-0235", "CVE-2003-0236", "CVE-2003-0237", "CVE-2003-0238",
               "CVE-2003-0239");
 script_bugtraq_id( 132, 246, 929, 1307, 2664, 3226, 3813, 7461, 7462, 7463, 7464, 7465, 7466);

 script_name(english:"ICQ < 2003b Multiple Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a program that is affected by
multiple flaws." );
 script_set_attribute(attribute:"description", value:
"There are multiple flaws in versions of ICQ before 2003b, including
some that may allow an attacker to execute arbitrary code on the
remote host." );
  # http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1221
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?12bf93d6" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to ICQ 2003b or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/05/05");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/01/01");
 script_cvs_date("Date: 2018/08/22 16:49:14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 script_summary(english:"Checks version of ICQ installed");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Windows");
 script_dependencies("icq_installed.nasl");
 script_require_keys("SMB/ICQ/Version");
 exit(0);
}

#

include("smb_func.inc");

ver = get_kb_item("SMB/ICQ/Version");
if (ver) {
  iver = split(ver, sep:'.', keep:FALSE);
  # Check whether it's an affected version.
  #
  # nb: 2003b == "5.5.6.3916"
  if (
    int(iver[0]) < 5 ||
    (
      int(iver[0]) == 5 &&
      (
        int(iver[1]) < 5 ||
        (
          int(iver[1]) == 5 &&
          (
            int(iver[2]) < 6 ||
            (int(iver[2]) == 6 && int(iver[3]) < 3916)
          )
        )
      )
    )
  ) security_hole(kb_smb_transport());
}