Vulnerabilities > CVE-2005-0582 - Unspecified vulnerability in Broadcom License Software 0.1.0.15

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
broadcom
critical
nessus
exploit available

Summary

Buffer overflow in Computer Associates (CA) License Client 0.1.0.15 allows remote attackers to execute arbitrary code via a long filename in a PUTOLF request.

Vulnerable Configurations

Part Description Count
Application
Broadcom
1

Exploit-Db

descriptionCA License Server (GETCONFIG) Remote Buffer Overflow Exploit (c). CVE-2005-0581,CVE-2005-0582. Remote exploit for windows platform
idEDB-ID:859
last seen2016-01-31
modified2005-03-06
published2005-03-06
reporterclass101
sourcehttps://www.exploit-db.com/download/859/
titleCA License Server GETCONFIG Remote Buffer Overflow Exploit c

Nessus

NASL familyWindows
NASL idCA_LICENSE_SERVICE_STACK_OVERFLOW.NASL
descriptionThe remote host is running the Computer Associate License Application. The remote version of this software is vulnerable to several flaws that could allow a remote attacker to execute arbitrary code on the remote host with SYSTEM privileges.
last seen2020-06-01
modified2020-06-02
plugin id17307
published2005-03-10
reporterThis script is Copyright (C) 2005-2018 KK Liu
sourcehttps://www.tenable.com/plugins/nessus/17307
titleCA License Service Multiple Vulnerabilities
code
#
# (C) KK Liu
#

# Changes by Tenable:
#  - Fixed the request
#  - Shorter description
#  - Fixed the version number check 
#  - Added a check on port 10202, 10203
#  - Changed plugin family (8/14/2009)


include("compat.inc");

if(description)
{
 script_id(17307);
 script_version ("1.34");
 script_cve_id("CVE-2005-0581", "CVE-2005-0582", "CVE-2005-0583");
 script_bugtraq_id(12705);

 script_name(english:"CA License Service Multiple Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host." );
 script_set_attribute(attribute:"description", value:
"The remote host is running the Computer Associate License Application. 

The remote version of this software is vulnerable to several flaws
that could allow a remote attacker to execute arbitrary code on the
remote host with SYSTEM privileges." );
 script_set_attribute(attribute:"see_also", value:"https://www.beyondtrust.com/resources/blog/research/" );
 script_set_attribute(attribute:"solution", value:"http://www.nessus.org/u?c1c908e9" );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Computer Associates License Server GETCONFIG Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'CANVAS');

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/03/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/03/02");
 script_cvs_date("Date: 2018/11/15 20:50:26");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/03/02");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"CA License Service Stack Overflow");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 KK Liu");
 script_family(english: "Windows");
 script_require_ports(10202, 10203, 10204);
 exit(0);
}

include("global_settings.inc");
include('misc_func.inc');

req = 'A0 GETCONFIG SELF 0 <EOM>\r\n';
ports = make_list(10202, 10203, 10204);
foreach port ( ports )
{
 if ( get_port_state(port) ) 
  {
	soc = open_sock_tcp(port);
	if ( soc ) 
	{
	send(socket:soc, data:req);
	r = recv(socket:soc, length:620);
	close(soc);
	if ( strlen(r) > 0 )
	{
     	chkstr = strstr(r, "VERSION<");
	if (chkstr ) 
 	{
	 register_service(port:port, proto:"CA_License_Service");
         if (egrep (pattern:"VERSION<[0-9] 1\.(5[3-9].*|60.*|61(\.[0-8])?)>", string:chkstr)) 
	 {
          security_hole(port);
	 }
	}
       } 
    }
  }
}

Saint

bid12705
descriptionComputer Associates License Client PUTOLF buffer overflow
idmisc_calicense
osvdb14389
titleca_license_putolf
typeremote