Vulnerabilities > CVE-2006-1044 - Multiple Unspecified vulnerability in Lsoft Listserv 14.3/14.4

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
lsoft
nessus

Summary

Multiple buffer overflows in LISTSERV 14.3 and 14.4, including LISTSERV Lite and HPO, with the web archive interface enabled, allow remote attackers to execute arbitrary code via unknown attack vectors related to the WA CGI. NOTE: technical details will be released after the grace period has ended on 20060603. This vulnerability affects L-Soft, Listserv (LITE and HPO) 14.4 and all prior versions that are installed with the web archive interface.

Vulnerable Configurations

Part Description Count
Application
Lsoft
2

Nessus

NASL familyCGI abuses
NASL idLISTSERV_145.NASL
descriptionThe remote host is running Listserv, a mailing list management application. According to its version number, the Listserv install on the remote host suffers from as-yet unspecified buffer overflows, including one which reportedly can be exploited by an unauthenticated attacker to execute arbitrary code on the affected host.
last seen2020-06-01
modified2020-06-02
plugin id21016
published2006-03-06
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21016
titleListserv < 14.5 Multiple Buffer Overflows
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(21016);
  script_version("1.14");
  script_cvs_date("Date: 2018/11/15 20:50:17");

  script_cve_id("CVE-2006-1044");
  script_bugtraq_id(16951);

  script_name(english:"Listserv < 14.5 Multiple Buffer Overflows");
  script_summary(english:"Checks version number of Listserv");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI application that is affected by
multiple buffer overflow vulnerabilities." );
  script_set_attribute(attribute:"description", value:
"The remote host is running Listserv, a mailing list management
application. 

According to its version number, the Listserv install on the remote
host suffers from as-yet unspecified buffer overflows, including one
which reportedly can be exploited by an unauthenticated attacker to
execute arbitrary code on the affected host." );
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/426770/30/0/threaded" );
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?286efa50" );
  script_set_attribute(attribute:"solution", value:"Upgrade to Listserv 14.5 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:U/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"plugin_publication_date", value: "2006/03/06");
  script_set_attribute(attribute:"vuln_publication_date", value: "2006/03/03");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:lsoft:listserv");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

# Loop through various directories.
foreach dir (cgi_dirs())
{
  # For each of the possible names for the web interface...
  foreach wa (make_list("wa", "wa.exe", "wa.cgi"))
  {
    # Try to get the version number of the web interface.
    w = http_send_recv3(method:"GET", item:string(dir, "/", wa, "?DEBUG-SHOW-VERSION"), port:port, exit_on_fail:TRUE);
    res = w[2];

    # nb: Listserv 14.5 == WA version 2.3.42.
    if (res =~ "WA version ([01]\.|2\.([0-2]\.|3\.([0-3]|4[01])))")
    {
      security_hole(port);
      exit(0);
    }
  }
}