Vulnerabilities > CVE-2004-1437 - Remote Digest Authentication Buffer Overflow vulnerability in Pavuk 0.928R1/0.928R2/0.9Pl28I

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
pavuk
nessus
exploit available

Summary

Multiple buffer overflows in the digest authentication functionality in Pavuk 0.9.28-r2 and earlier allow remote attackers to execute arbitrary code.

Vulnerable Configurations

Part Description Count
Application
Pavuk
3

Exploit-Db

descriptionPavuk Digest Authentication Buffer Overflow Remote Exploit. CVE-2004-1437. Remote exploit for linux platform
idEDB-ID:380
last seen2016-01-31
modified2004-08-08
published2004-08-08
reporterinfamous41md
sourcehttps://www.exploit-db.com/download/380/
titlePavuk Digest Authentication Buffer Overflow Remote Exploit

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200407-19.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200407-19 (Pavuk: Digest authentication helper buffer overflow) Pavuk contains several buffer overflow vulnerabilities in the code handling digest authentication. Impact : An attacker could cause a buffer overflow, leading to arbitrary code execution with the rights of the user running Pavuk. Workaround : There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of Pavuk.
last seen2020-06-01
modified2020-06-02
plugin id14552
published2004-08-30
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14552
titleGLSA-200407-19 : Pavuk: Digest authentication helper buffer overflow
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200407-19.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include("compat.inc");

if (description)
{
  script_id(14552);
  script_version("1.15");
  script_cvs_date("Date: 2019/08/02 13:32:41");

  script_cve_id("CVE-2004-1437");
  script_xref(name:"GLSA", value:"200407-19");

  script_name(english:"GLSA-200407-19 : Pavuk: Digest authentication helper buffer overflow");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200407-19
(Pavuk: Digest authentication helper buffer overflow)

    Pavuk contains several buffer overflow vulnerabilities in the code
    handling digest authentication.
  
Impact :

    An attacker could cause a buffer overflow, leading to arbitrary code
    execution with the rights of the user running Pavuk.
  
Workaround :

    There is no known workaround at this time. All users are encouraged to
    upgrade to the latest available version of Pavuk."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200407-19"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Pavuk users should upgrade to the latest version:
    # emerge sync
    # emerge -pv '>=net-misc/pavuk-0.9.28-r3'
    # emerge '>=net-misc/pavuk-0.9.28-r3'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:pavuk");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2004/07/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/30");
  script_set_attribute(attribute:"vuln_publication_date", value:"2004/07/27");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"net-misc/pavuk", unaffected:make_list("ge 0.9.28-r3"), vulnerable:make_list("le 0.9.28-r2"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Pavuk");
}