Vulnerabilities > CVE-2006-6476 - Denial of Service and Agent Hijacking vulnerability in Mandiant First Response

047910
CVSS 2.4 - LOW
Attack vector
LOCAL
Attack complexity
HIGH
Privileges required
SINGLE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
PARTIAL
local
high complexity
mandiant
nessus

Summary

FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and when the agent is bound to 0.0.0.0 (all interfaces), opens sockets in non-exclusive mode, which allows local users to hijack the socket, and capture data or cause a denial of service (loss of daemon operation). Successful exploitation requires that the affected products are run in daemon mode and when the agent is bound to 0.0.0.0 (all interfaces). This vulnerability is addressed in the following product release: Mandiant, First Response, 1.1.1

Vulnerable Configurations

Part Description Count
Application
Mandiant
1

Nessus

NASL familyWindows
NASL idFIRST_RESPONSE_111.NASL
descriptionThe remote host contains a version of First Response, an incident response tool, that is affected by multiple vulnerabilities. If the First Response agent (fragent) is configured to listen for remote SSL-enabled connections, it is reportedly possible to disable the agent remotely by sending a series of specially crafted requests, thereby preventing legitimate connections from a First Response Command Console. Additionally, it is possible to hijack the agent by binding to the same socket address on which it is already listening if it was bound to the
last seen2020-06-01
modified2020-06-02
plugin id23925
published2006-12-19
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/23925
titleFirst Response < 1.1.1 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(23925);
  script_version("1.16");

  script_cve_id("CVE-2006-6475", "CVE-2006-6476", "CVE-2006-6477");
  script_bugtraq_id(21548);

  script_name(english:"First Response < 1.1.1 Multiple Vulnerabilities");
  script_summary(english:"Checks version of First Response");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows application is affected by multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host contains a version of First Response, an incident
response tool, that is affected by multiple vulnerabilities. 

If the First Response agent (fragent) is configured to listen for
remote SSL-enabled connections, it is reportedly possible to disable
the agent remotely by sending a series of specially crafted requests,
thereby preventing legitimate connections from a First Response
Command Console. 

Additionally, it is possible to hijack the agent by binding to the
same socket address on which it is already listening if it was bound
to the '0.0.0.0' wildcard address.  A local attacker may be able to
leverage this flaw to deny service to the agent or to conduct a
man-in-the-middle attack against connecting clients." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8c4e96e5" );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/archive/1/454712/100/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to MANDIANT First Response version 1.1.1 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/12/19");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/12/18");
 script_cvs_date("Date: 2018/11/15 20:50:26");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


# Look in the registry for the version of First Response installed.
# - version 1.1.0.
key = "SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/{B42D1E06-E04C-46DD-8EB9-469BEA526F92}/DisplayVersion";
ver = get_kb_item(key);
if (ver && ver == "1.1.0") security_hole(get_kb_item("SMB/transport"));
# - version 1.0.
key = "SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/{DB1060BF-AA42-4E11-82FA-8F31730D3710}/DisplayVersion";
ver = get_kb_item(key);
if (ver && ver == "1.0") security_hole(get_kb_item("SMB/transport"));