Vulnerabilities > CVE-2004-0952 - Unspecified vulnerability in HP Hp-Ux

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
hp
nessus

Summary

HP-UX B.11.00 through B.11.23, when running Ignite-UX and using the add_new_client command, causes the TFTP server to set world-writable permissions on part of the directory tree, which allows remote attackers to modify data or cause disk consumption.

Vulnerable Configurations

Part Description Count
OS
Hp
4

Nessus

NASL familyMisc.
NASL idTFTP_PERMISSIONS_HP_IGNITE_UX.NASL
descriptionThe remote host has a vulnerable version of the HP Ignite-UX application installed that exposes a world-writeable directory to anonymous TFTP access. A remote attacker could exploit this to upload arbitrary files.
last seen2020-06-01
modified2020-06-02
plugin id19510
published2005-08-26
reporterThis NASL script is Copyright (C) 2005-2018 Corsaire Limited.
sourcehttps://www.tenable.com/plugins/nessus/19510
titleHP-UX Ignite-UX TFTP Service Remote File Manipulation
code
#
# This NASL script was written by Martin O'Neal of Corsaire (http://www.corsaire.com)
#
# The script will test whether the remote host has one of a number of sensitive
# files present on the tftp server
#
# DISCLAIMER
# The information contained within this script is supplied "as-is" with
# no warranties or guarantees of fitness of use or otherwise. Corsaire
# accepts no responsibility for any damage caused by the use or misuse of
# this information.
#

# Changes by Tenable:
# - Revised plugin title, output formatting, family change (8/22/09)

include("compat.inc");

if (description)
{
  script_id(19510);
  script_version("1.15");
  script_cvs_date("Date: 2018/08/22 16:49:14");

  script_cve_id("CVE-2004-0952");
  script_bugtraq_id(14571);

  script_name(english:"HP-UX Ignite-UX TFTP Service Remote File Manipulation");
  script_summary(english:"Determines if the remote host has writeable directories exposed via TFTP (HP Ignite-UX)");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote TFTP daemon has an arbitrary file upload vulnerability."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote host has a vulnerable version of the HP Ignite-UX
application installed that exposes a world-writeable directory to
anonymous TFTP access.  A remote attacker could exploit this to
upload arbitrary files."
  );
  script_set_attribute(attribute:"see_also", value:"http://research.corsaire.com/advisories/c041123-002.txt");
  script_set_attribute(attribute:"solution", value:"Apply the appropriate vendor patch.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/08/26");
  script_set_attribute(attribute:"vuln_publication_date", value:"2005/08/15");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_DESTRUCTIVE_ATTACK); # Intrusive
  script_copyright(english:"This NASL script is Copyright (C) 2005-2018 Corsaire Limited.");
  script_family(english:"Misc.");
  script_dependencies("tftpd_backdoor.nasl", "os_fingerprint.nasl");
  script_require_keys("Services/udp/tftp");
  script_exclude_keys('tftp/backdoor'); # Not wise but quicker
  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("tftp.inc");

port = get_kb_item_or_exit('Services/udp/tftp');
if ( get_kb_item("tftp/" + port + "/backdoor") )
 exit(1, 'The TFTP service on port '+port+' is a backdoor.');



if (report_paranoia < 2)
{
  os = get_kb_item("Host/OS");
  if ("HP-UX" >!< os) exit(1, "The remote OS is not HP-UX.");
}

# initialise test
file_name='/var/opt/ignite/nessus_tftp_test_'+rand();
if(tftp_put(port:port,path:file_name))
  security_warning(port:port,proto:"udp");
else
  exit(0, 'The TFTP server on port '+port+' is not vulnerable.');

Oval

accepted2014-03-24T04:01:47.045-04:00
classvulnerability
contributors
  • nameMichael Wood
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
descriptionHP-UX B.11.00 through B.11.23, when running Ignite-UX and using the add_new_client command, causes the TFTP server to set world-writable permissions on part of the directory tree, which allows remote attackers to modify data or cause disk consumption.
familyunix
idoval:org.mitre.oval:def:5775
statusaccepted
submitted2008-07-07T16:38:38.000-04:00
titleHP-UX Ignite-UX, Remote Unauthorized Access
version39