Vulnerabilities > CVE-2004-1299 - Unspecified vulnerability in Vilistextum 2.6.6

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
vilistextum
critical
nessus
exploit available

Summary

Buffer overflow in the get_attr function in html.c for vilistextum 2.6.6 allows remote attackers to execute arbitrary code via a crafted web page.

Vulnerable Configurations

Part Description Count
Application
Vilistextum
1

Exploit-Db

descriptionVilistextum 2.6.6 HTML Attribute Parsing Buffer Overflow Vulnerability. CVE-2004-1299. Remote exploits for multiple platform
idEDB-ID:24983
last seen2016-02-03
modified2004-12-15
published2004-12-15
reporterAriel Berkman
sourcehttps://www.exploit-db.com/download/24983/
titleVilistextum 2.6.6 HTML Attribute Parsing Buffer Overflow Vulnerability

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200501-10.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200501-10 (Vilistextum: Buffer overflow vulnerability) Ariel Berkman discovered that Vilistextum unsafely reads data into an array without checking the length. This code vulnerability may lead to a buffer overflow. Impact : A remote attacker could craft a malicious webpage which, when converted, would result in the execution of arbitrary code with the rights of the user running Vilistextum. Workaround : There is no known workaround at this time.
last seen2020-06-01
modified2020-06-02
plugin id16401
published2005-02-14
reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/16401
titleGLSA-200501-10 : Vilistextum: Buffer overflow vulnerability
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200501-10.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include("compat.inc");

if (description)
{
  script_id(16401);
  script_version("1.17");
  script_cvs_date("Date: 2019/08/02 13:32:42");

  script_cve_id("CVE-2004-1299");
  script_xref(name:"GLSA", value:"200501-10");

  script_name(english:"GLSA-200501-10 : Vilistextum: Buffer overflow vulnerability");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200501-10
(Vilistextum: Buffer overflow vulnerability)

    Ariel Berkman discovered that Vilistextum unsafely reads data into
    an array without checking the length. This code vulnerability may lead
    to a buffer overflow.
  
Impact :

    A remote attacker could craft a malicious webpage which, when
    converted, would result in the execution of arbitrary code with the
    rights of the user running Vilistextum.
  
Workaround :

    There is no known workaround at this time."
  );
  # http://tigger.uic.edu/~jlongs2/holes/vilistextum.txt
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?33a1f95c"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200501-10"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Vilistextum users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose '>=app-text/vilistextum-2.6.7'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:vilistextum");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2005/01/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/14");
  script_set_attribute(attribute:"vuln_publication_date", value:"2004/12/16");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"app-text/vilistextum", unaffected:make_list("ge 2.6.7"), vulnerable:make_list("lt 2.6.7"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Vilistextum");
}