Vulnerabilities > CVE-2003-0238 - Unspecified vulnerability in Mirabilis ICQ

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mirabilis
nessus

Summary

The Message Session window in Mirabilis ICQ Pro 2003a allows remote attackers to cause a denial of service (CPU consumption) by spoofing the address of an ADS server and sending HTML with a -1 width in a table tag.

Nessus

NASL familyWindows
NASL idICQ_VULNS.NASL
descriptionThere are multiple flaws in versions of ICQ before 2003b, including some that may allow an attacker to execute arbitrary code on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id11572
published2003-05-05
reporterThis script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11572
titleICQ < 2003b Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

# Ref: 
# Date: Mon, 05 May 2003 16:44:47 -0300
# From: CORE Security Technologies Advisories <[email protected]>
# To: Bugtraq <[email protected]>,
# Subject: CORE-2003-0303: Multiple Vulnerabilities in Mirabilis ICQ client
#


include("compat.inc");

if(description)
{
 script_id(11572);
 script_version("1.16");
 script_cve_id("CVE-1999-1418", "CVE-1999-1440", "CVE-2000-0046", "CVE-2000-0564",
               "CVE-2000-0552", "CVE-2001-0367", "CVE-2002-0028", "CVE-2001-1305",
               "CVE-2003-0235", "CVE-2003-0236", "CVE-2003-0237", "CVE-2003-0238",
               "CVE-2003-0239");
 script_bugtraq_id( 132, 246, 929, 1307, 2664, 3226, 3813, 7461, 7462, 7463, 7464, 7465, 7466);

 script_name(english:"ICQ < 2003b Multiple Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a program that is affected by
multiple flaws." );
 script_set_attribute(attribute:"description", value:
"There are multiple flaws in versions of ICQ before 2003b, including
some that may allow an attacker to execute arbitrary code on the
remote host." );
  # http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1221
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?12bf93d6" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to ICQ 2003b or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/05/05");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/01/01");
 script_cvs_date("Date: 2018/08/22 16:49:14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

 script_summary(english:"Checks version of ICQ installed");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Windows");
 script_dependencies("icq_installed.nasl");
 script_require_keys("SMB/ICQ/Version");
 exit(0);
}

#

include("smb_func.inc");

ver = get_kb_item("SMB/ICQ/Version");
if (ver) {
  iver = split(ver, sep:'.', keep:FALSE);
  # Check whether it's an affected version.
  #
  # nb: 2003b == "5.5.6.3916"
  if (
    int(iver[0]) < 5 ||
    (
      int(iver[0]) == 5 &&
      (
        int(iver[1]) < 5 ||
        (
          int(iver[1]) == 5 &&
          (
            int(iver[2]) < 6 ||
            (int(iver[2]) == 6 && int(iver[3]) < 3916)
          )
        )
      )
    )
  ) security_hole(kb_smb_transport());
}