Vulnerabilities > CVE-2008-1322 - Unspecified vulnerability in Asg-Sentry
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | ASG-Sentry. CVE-2008-1320,CVE-2008-1321,CVE-2008-1322. Dos exploits for multiple platform |
file | exploits/multiple/dos/5229.txt |
id | EDB-ID:5229 |
last seen | 2016-01-31 |
modified | 2008-03-10 |
platform | multiple |
port | |
published | 2008-03-10 |
reporter | Luigi Auriemma |
source | https://www.exploit-db.com/download/5229/ |
title | asg-sentry <= 7.0.0 - Multiple Vulnerabilities |
type | dos |
Nessus
NASL family | CGI abuses |
NASL id | ASG_SENTRY_FCHECK.NASL |
description | The File Check Utility (fcheck.exe) included with the version of ASG-Sentry installed on the remote host fails to sanitize input before creating index files with filenames and checksums. An unauthenticated remote attacker can leverage this issue to overwrite existing files with either no data or a list of filenames and checksums or possibly to use up CPU and disk resources by scanning, say, |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 34397 |
published | 2008-10-14 |
reporter | This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/34397 |
title | ASG-Sentry File Check Utility /snmx-cgi/fcheck.exe Arbitrary File Overwrite |
code |
|
References
- http://aluigi.altervista.org/adv/asgulo-adv.txt
- http://aluigi.altervista.org/adv/asgulo-adv.txt
- http://secunia.com/advisories/29289
- http://secunia.com/advisories/29289
- http://securityreason.com/securityalert/3737
- http://securityreason.com/securityalert/3737
- http://www.securityfocus.com/archive/1/489359/100/0/threaded
- http://www.securityfocus.com/archive/1/489359/100/0/threaded
- http://www.securityfocus.com/bid/28188
- http://www.securityfocus.com/bid/28188
- http://www.vupen.com/english/advisories/2008/0839/references
- http://www.vupen.com/english/advisories/2008/0839/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41080
- https://www.exploit-db.com/exploits/5229
- https://www.exploit-db.com/exploits/5229