Vulnerabilities > CVE-2005-0353 - Remote Buffer Overflow vulnerability in Safenet Sentinel License Manager 7.2.0.2

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
safenet
critical
nessus
exploit available
metasploit

Summary

Buffer overflow in the Sentinel LM (Lservnt) service in the Sentinel License Manager 7.2.0.2 allows remote attackers to execute arbitrary code by sending a large amount of data to UDP port 5093.

Vulnerable Configurations

Part Description Count
Application
Safenet
1

Exploit-Db

  • descriptionSentinelLM UDP Buffer Overflow. CVE-2005-0353. Remote exploit for windows platform
    idEDB-ID:16746
    last seen2016-02-02
    modified2010-05-09
    published2010-05-09
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16746/
    titleSentinelLM UDP Buffer Overflow
  • descriptionSentinel LM 7.x UDP License Service Remote Buffer Overflow Exploit. CVE-2005-0353. Remote exploit for windows platform
    idEDB-ID:875
    last seen2016-01-31
    modified2005-03-13
    published2005-03-13
    reporterclass101
    sourcehttps://www.exploit-db.com/download/875/
    titleSentinel LM 7.x UDP License Service Remote Buffer Overflow Exploit

Metasploit

descriptionThis module exploits a simple stack buffer overflow in the Sentinel License Manager. The SentinelLM service is installed with a wide selection of products and seems particular popular with academic products. If the wrong target value is selected, the service will crash and not restart.
idMSF:EXPLOIT/WINDOWS/LICENSE/SENTINEL_LM7_UDP
last seen2020-01-14
modified2017-07-24
published2005-12-26
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0353
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/license/sentinel_lm7_udp.rb
titleSentinelLM UDP Buffer Overflow

Nessus

NASL familyGain a shell remotely
NASL idSENTINEL_OVERFLOW.NASL
descriptionThe remote host is running a version of Sentinel License Manager that is subject to remote buffer overflows. By sending 3000 bytes or more to the UDP port on which it listens (5093 by default), a remote attacker can crash the LServnt.exe service, overwrite the EIP register, and possibly execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id17326
published2005-03-15
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17326
titleSentinel License Manager lservnt Service Remote Buffer Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83234/sentinel_lm7_udp.rb.txt
idPACKETSTORM:83234
last seen2016-12-05
published2009-11-26
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/83234/SentinelLM-UDP-Buffer-Overflow.html
titleSentinelLM UDP Buffer Overflow