Vulnerabilities > CVE-2006-6676 - Numeric Errors vulnerability in Eset Software Nod32 Antivirus 1.0.11/1.0.12/1.0.13

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer overflow in the (a) OLE2 and (b) CHM parsers for ESET NOD32 Antivirus before 1.1743 allows remote attackers to execute arbitrary code via a crafted (1) .DOC or (2) .CAB file that triggers a heap-based buffer overflow.

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows
NASL idNOD32_11743.NASL
descriptionThe version of NOD32 installed on the remote host reportedly has a heap overflows involving processing of
last seen2020-06-01
modified2020-06-02
plugin id23932
published2006-12-20
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/23932
titleNOD32 Antivirus < 1.1743 Multiple File Processing Vulnerabilities
code
#
#  (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(23932);
  script_version("1.18");
 script_cvs_date("Date: 2018/11/15 20:50:27");

  script_cve_id("CVE-2006-6676", "CVE-2006-6677");
  script_bugtraq_id(21682, 21701);

  script_name(english:"NOD32 Antivirus < 1.1743 Multiple File Processing Vulnerabilities");
  script_summary(english:"Checks version of NOD32's virus signature database");

 script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an application that is affected by
multiple issues.");
 script_set_attribute(attribute:"description", value:
"The version of NOD32 installed on the remote host reportedly has a
heap overflows involving processing of '.doc' and '.cab' files and a
divide-by-zero flaw involving '.chm' files. A remote attacker may be
able to leverage the first flaw to execute code remotely or crash the
affected service.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2006/Dec/364" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2006/Dec/377" );
 script_set_attribute(attribute:"see_also", value:"https://support.eset.com/"); # look for 'v.1.1743 (20061215)'
 script_set_attribute(attribute:"solution", value:
"Run NOD32's Update feature an ensure the version of the virus
signature database is at least 1.1743.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2006/12/21");
 script_set_attribute(attribute:"plugin_publication_date", value:"2006/12/20");

script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("nod32_installed.nasl", "smb_hotfixes.nasl");
  script_require_keys("Antivirus/NOD32/installed", "SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


if (!get_kb_item("Antivirus/NOD32/installed"))
  exit(0, 'NOD32 is not installed.');


include("audit.inc");
include("smb_func.inc");


# Connect to the appropriate share.
if (!get_kb_item("SMB/Registry/Enumerated")) exit(1, "KB 'SMB/Registry/Enumerated' not set to TRUE.");

name    =  kb_smb_name();
port    =  kb_smb_transport();
login   =  kb_smb_login();
pass    =  kb_smb_password();
domain  =  kb_smb_domain();

if(! smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');

rc = NetUseAdd(login:login, password:pass, domain:domain, share:"IPC$");
if (rc != 1)
{
  NetUseDel();
  audit(AUDIT_SHARE_FAIL,"IPC$");
}


# Connect to remote registry.
hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);
if (isnull(hklm))
{
  NetUseDel();
  audit(AUDIT_REG_FAIL);
}


# Get the version of the virus signature database.
ver = NULL;
key = "SOFTWARE\Eset\Nod\CurrentVersion\Info";
key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);
if (!isnull(key_h))
{
  value = RegQueryValue(handle:key_h, item:"CurrentVersion");
  if (!isnull(value))
  {
    ver = value[1];
    matches = eregmatch(string:ver, pattern:"^([0-9]+)\.([0-9]+) ");
    if (matches)
    {
      maj = int(matches[1]);
      min = int(matches[2]);
      if (
        maj == 0 ||
        (maj == 1 && min < 1743)
      )
      {
        report = desc + string(
          "\n\n",
          "Plugin output :\n",
          "\n",
          "The version of the virus signature database currently installed is : \n",
          "\n",
          "  ", ver, "\n"
        );
        security_hole(port:port, extra:report);
      }
    }
  }

  RegCloseKey(handle:key_h);
}
RegCloseKey(handle:hklm);
NetUseDel();