Vulnerabilities > CVE-2004-1082

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
apache
apple
avaya
hp
ibm
openbsd
sco
sun
nessus

Summary

mod_digest_apple for Apache 1.3.31 and 1.3.32 on Mac OS X Server does not properly verify the nonce of a client response, which allows remote attackers to replay credentials.

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2004-046.NASL
    descriptionFour security vulnerabilities were fixed with the 1.3.31 release of Apache. All of these issues have been backported and applied to the provided packages. Thanks to Ralf Engelschall of OpenPKG for providing the patches. Apache 1.3 prior to 1.3.30 did not filter terminal escape sequences from its error logs. This could make it easier for attackers to insert those sequences into the terminal emulators of administrators viewing the error logs that contain vulnerabilities related to escape sequence handling (CVE-2003-0020). mod_digest in Apache 1.3 prior to 1.3.31 did not properly verify the nonce of a client response by using an AuthNonce secret. Apache now verifies the nonce returned in the client response to check whether it was issued by itself by means of a
    last seen2020-06-01
    modified2020-06-02
    plugin id14145
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14145
    titleMandrake Linux Security Advisory : apache-mod_perl (MDKSA-2004:046-1)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandrake Linux Security Advisory MDKSA-2004:046. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(14145);
      script_version ("1.21");
      script_cvs_date("Date: 2019/08/02 13:32:47");
    
      script_cve_id("CVE-2003-0020", "CVE-2003-0987", "CVE-2003-0993", "CVE-2004-0174", "CVE-2004-1082");
      script_xref(name:"MDKSA", value:"2004:046-1");
    
      script_name(english:"Mandrake Linux Security Advisory : apache-mod_perl (MDKSA-2004:046-1)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandrake Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Four security vulnerabilities were fixed with the 1.3.31 release of
    Apache. All of these issues have been backported and applied to the
    provided packages. Thanks to Ralf Engelschall of OpenPKG for providing
    the patches.
    
    Apache 1.3 prior to 1.3.30 did not filter terminal escape sequences
    from its error logs. This could make it easier for attackers to insert
    those sequences into the terminal emulators of administrators viewing
    the error logs that contain vulnerabilities related to escape sequence
    handling (CVE-2003-0020).
    
    mod_digest in Apache 1.3 prior to 1.3.31 did not properly verify the
    nonce of a client response by using an AuthNonce secret. Apache now
    verifies the nonce returned in the client response to check whether it
    was issued by itself by means of a 'AuthDigestRealmSeed' secret
    exposed as an MD5 checksum (CVE-2003-0987).
    
    mod_access in Apache 1.3 prior to 1.3.30, when running on big-endian
    64-bit platforms, did not properly parse Allow/Deny rules using IP
    addresses without a netmask. This could allow a remote attacker to
    bypass intended access restrictions (CVE-2003-0993).
    
    Apache 1.3 prior to 1.3.30, when using multiple listening sockets on
    certain platforms, allows a remote attacker to cause a DoS by blocking
    new connections via a short-lived connection on a rarely-accessed
    listening socket (CVE-2004-0174). While this particular vulnerability
    does not affect Linux, we felt it prudent to include the fix.
    
    Update :
    
    Due to the changes in mod_digest.so, mod_perl needed to be rebuilt
    against the patched Apache packages in order for httpd-perl to
    properly load the module. The appropriate mod_perl packages have been
    rebuilt and are now available."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:HTML-Embperl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:apache-mod_perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mod_perl-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mod_perl-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:10.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2004/05/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK10.0", reference:"HTML-Embperl-1.3.29_1.3.6-3.1.100mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.0", reference:"apache-mod_perl-1.3.29_1.29-3.1.100mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.0", reference:"mod_perl-common-1.3.29_1.29-3.1.100mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK10.0", reference:"mod_perl-devel-1.3.29_1.29-3.1.100mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"HTML-Embperl-1.3.27_1.3.4-7.1.91mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"apache-mod_perl-1.3.27_1.27-7.1.91mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"mod_perl-common-1.3.27_1.27-7.1.91mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"mod_perl-devel-1.3.27_1.27-7.1.91mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK9.2", reference:"HTML-Embperl-1.3.28_1.3.4-1.1.92mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK9.2", reference:"apache-mod_perl-1.3.28_1.28-1.1.92mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK9.2", reference:"mod_perl-common-1.3.28_1.28-1.1.92mdk", yank:"mdk")) flag++;
    if (rpm_check(release:"MDK9.2", reference:"mod_perl-devel-1.3.28_1.28-1.1.92mdk", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD20041202.NASL
    descriptionThe remote host is missing Security Update 2004-12-02. This security update contains a number of fixes for the following programs : - Apache - Apache2 - AppKit - Cyrus IMAP - HIToolbox - Kerberos - Postfix - PSNormalizer - QuickTime Streaming Server - Safari - Terminal These programs contain multiple vulnerabilities that could allow a remote attacker to execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id15898
    published2004-12-02
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15898
    titleMac OS X Multiple Vulnerabilities (Security Update 2004-12-02)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    if (NASL_LEVEL < 3004) exit(0);    # a large number of xrefs.
    if ( ! defined_func("bn_random") ) exit(0);
    
    include("compat.inc");
    
    if(description)
    {
     script_id(15898);
     script_version ("1.24");
     script_cvs_date("Date: 2018/07/14  1:59:35");
    
     script_cve_id("CVE-2004-1082", "CVE-2003-0020", "CVE-2003-0987", "CVE-2004-0174", "CVE-2004-0488", 
                   "CVE-2004-0492", "CVE-2004-0885", "CVE-2004-0940", "CVE-2004-1083", "CVE-2004-1084", 
                   "CVE-2004-0747", "CVE-2004-0786", "CVE-2004-0751", "CVE-2004-0748", "CVE-2004-1081", 
                   "CVE-2004-0803", "CVE-2004-0804", "CVE-2004-0886", "CVE-2004-1089", "CVE-2004-1085", 
                   "CVE-2004-0642", "CVE-2004-0643", "CVE-2004-0644", "CVE-2004-0772", "CVE-2004-1088", 
                   "CVE-2004-1086", "CVE-2004-1123", "CVE-2004-1121", "CVE-2004-1122", "CVE-2004-1087");
     script_bugtraq_id(9921, 9930, 9571, 11471, 11360, 11469, 10508, 11802);
    
     script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)");
     script_summary(english:"Check for Security Update 2004-12-02");
     
     script_set_attribute( attribute:"synopsis",  value:
    "The remote host is missing a Mac OS X update that fixes a security
    issue." );
     script_set_attribute( attribute:"description",   value:
    "The remote host is missing Security Update 2004-12-02. This security
    update contains a number of fixes for the following programs :
    
      - Apache
      - Apache2
      - AppKit
      - Cyrus IMAP
      - HIToolbox
      - Kerberos
      - Postfix
      - PSNormalizer
      - QuickTime Streaming Server
      - Safari
      - Terminal
    
    These programs contain multiple vulnerabilities that could allow a
    remote attacker to execute arbitrary code." );
     # http://web.archive.org/web/20080915104713/http://support.apple.com/kb/HT1646?
     script_set_attribute(
       attribute:"see_also",
       value:"http://www.nessus.org/u?210abeb5"
     );
     script_set_attribute(
       attribute:"solution", 
       value:"Install Security Update 2004-12-02."
     );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_cwe_id(119);
     script_set_attribute(attribute:"plugin_publication_date", value: "2004/12/02");
     script_set_attribute(attribute:"vuln_publication_date", value: "2003/02/24");
     script_set_attribute(attribute:"patch_publication_date", value: "2004/12/02");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_family(english:"MacOS X Local Security Checks");
    
     script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
    
     script_dependencies("ssh_get_info.nasl");
     script_require_keys("Host/MacOSX/packages");
     exit(0);
    }
    
    
    packages = get_kb_item("Host/MacOSX/packages");
    if ( ! packages ) exit(0);
    
    uname = get_kb_item("Host/uname");
    # MacOS X 10.2.8, 10.3.6 only
    if ( egrep(pattern:"Darwin.* (6\.8\.|7\.6\.)", string:uname) )
    {
      if ( ! egrep(pattern:"^SecUpd(Srvr)?2004-12-02", string:packages) ) security_hole(0);
    	else non_vuln = 1;
    }
    else if ( egrep(pattern:"Darwin.* (6\.9|[0-9][0-9]\.|7\.([7-9]|[0-9][0-9]\.|[8-9]\.))", string:uname) ) non_vuln = 1;
    
    if ( non_vuln )
    {
       set_kb_item(name:"CVE-2004-1082", value:TRUE);
       set_kb_item(name:"CVE-2003-0020", value:TRUE);
       set_kb_item(name:"CVE-2003-0987", value:TRUE);
       set_kb_item(name:"CVE-2004-0174", value:TRUE);
       set_kb_item(name:"CVE-2004-0488", value:TRUE);
       set_kb_item(name:"CVE-2004-0492", value:TRUE);
       set_kb_item(name:"CVE-2004-0885", value:TRUE);
       set_kb_item(name:"CVE-2004-0940", value:TRUE);
       set_kb_item(name:"CVE-2004-1083", value:TRUE);
       set_kb_item(name:"CVE-2004-1084", value:TRUE);
       set_kb_item(name:"CVE-2004-0747", value:TRUE);
       set_kb_item(name:"CVE-2004-0786", value:TRUE);
       set_kb_item(name:"CVE-2004-0751", value:TRUE);
       set_kb_item(name:"CVE-2004-0748", value:TRUE);
       set_kb_item(name:"CVE-2004-1081", value:TRUE);
       set_kb_item(name:"CVE-2004-0803", value:TRUE);
       set_kb_item(name:"CVE-2004-0804", value:TRUE);
       set_kb_item(name:"CVE-2004-0886", value:TRUE);
       set_kb_item(name:"CVE-2004-1089", value:TRUE);
       set_kb_item(name:"CVE-2004-1085", value:TRUE);
       set_kb_item(name:"CVE-2004-0642", value:TRUE);
       set_kb_item(name:"CVE-2004-0643", value:TRUE);
       set_kb_item(name:"CVE-2004-0644", value:TRUE);
       set_kb_item(name:"CVE-2004-0772", value:TRUE);
       set_kb_item(name:"CVE-2004-1088", value:TRUE);
       set_kb_item(name:"CVE-2004-1086", value:TRUE);
       set_kb_item(name:"CVE-2004-1123", value:TRUE);
       set_kb_item(name:"CVE-2004-1121", value:TRUE);
       set_kb_item(name:"CVE-2004-1122", value:TRUE);
       set_kb_item(name:"CVE-2004-1087", value:TRUE);
    }