Vulnerabilities > CVE-2008-4418 - Remote Denial Of Service vulnerability in HP Hp-Ux B.11.11/B.11.23/B.11.31

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
hp
nessus

Summary

Unspecified vulnerability in DCE in HP HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause a denial of service via unknown vectors. http://marc.info/?l=bugtraq&m=122893704624601&w=2 HP has made the following software patches available to resolve the vulnerabilities. The patches can be downloaded from http://itrc.hp.com OS/Product Version - HP-UX B.11.31 running DCE Action - Install PHSS_38259 or subsequent OS/Product Version - HP-UX B.11.23 running DCE Action - Install PHSS_38258 or subsequent OS/Product Version - HP-UX B.11.11 running DCE Action - Install PHSS_38183 or subsequent

Vulnerable Configurations

Part Description Count
OS
Hp
3

Nessus

  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHSS_38258.NASL
    descriptions700_800 11.23 HP DCE 1.9 client cumulative patch : A potential security vulnerability has been identified with HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id35176
    published2008-12-16
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35176
    titleHP-UX PHSS_38258 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHSS_38258. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35176);
      script_version("1.15");
      script_cvs_date("Date: 2018/11/19 11:02:42");
    
      script_cve_id("CVE-2008-4418");
      script_xref(name:"HP", value:"emr_na-c01623009");
      script_xref(name:"HP", value:"HPSBUX02393");
      script_xref(name:"HP", value:"SSRT080057");
    
      script_name(english:"HP-UX PHSS_38258 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.23 HP DCE 1.9 client cumulative patch : 
    
    A potential security vulnerability has been identified with HP-UX
    running DCE. The vulnerability could be exploited remotely to create a
    Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623009
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?89d25b9f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHSS_38258 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/12/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.23"))
    {
      exit(0, "The host is not affected since PHSS_38258 applies to a different OS release.");
    }
    
    patches = make_list("PHSS_38258", "PHSS_42853");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-64SLIB", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-IA-RUN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-PA-RUN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-DTS", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-RUN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-SHLIB", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-IA64-SHLIB", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCEC-ENG-A-MAN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-CoreTools.DCE-BPRG", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-CoreTools.DCEP-ENG-A-MAN", version:"B.11.23")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHSS_38259.NASL
    descriptions700_800 11.31 HP DCE 2.0 client cumulative patch : A potential security vulnerability has been identified with HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id35177
    published2008-12-16
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35177
    titleHP-UX PHSS_38259 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHSS_38259. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35177);
      script_version("1.22");
      script_cvs_date("Date: 2018/11/19 11:02:42");
    
      script_cve_id("CVE-2008-4418");
      script_xref(name:"HP", value:"emr_na-c01623009");
      script_xref(name:"HP", value:"HPSBUX02393");
      script_xref(name:"HP", value:"SSRT080057");
    
      script_name(english:"HP-UX PHSS_38259 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.31 HP DCE 2.0 client cumulative patch : 
    
    A potential security vulnerability has been identified with HP-UX
    running DCE. The vulnerability could be exploited remotely to create a
    Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623009
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?89d25b9f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHSS_38259 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/12/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.31"))
    {
      exit(0, "The host is not affected since PHSS_38259 applies to a different OS release.");
    }
    
    patches = make_list("PHSS_38259", "PHSS_39122", "PHSS_40201", "PHSS_43173", "PHSS_43701", "PHSS_44173");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-64SLIB", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-DTS", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-RUN", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-SHLIB", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-IA64-SHLIB", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCEC-ENG-A-MAN", version:"B.11.31")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHSS_38183.NASL
    descriptions700_800 11.11 HP DCE/9000 1.8 DCE Client IPv6 patch : A potential security vulnerability has been identified with HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id35175
    published2008-12-16
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35175
    titleHP-UX PHSS_38183 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHSS_38183. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35175);
      script_version("1.17");
      script_cvs_date("Date: 2018/11/19 11:02:42");
    
      script_cve_id("CVE-2008-4418");
      script_xref(name:"HP", value:"emr_na-c01623009");
      script_xref(name:"HP", value:"HPSBUX02393");
      script_xref(name:"HP", value:"SSRT080057");
    
      script_name(english:"HP-UX PHSS_38183 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.11 HP DCE/9000 1.8 DCE Client IPv6 patch : 
    
    A potential security vulnerability has been identified with HP-UX
    running DCE. The vulnerability could be exploited remotely to create a
    Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623009
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?89d25b9f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHSS_38183 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/12/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.11"))
    {
      exit(0, "The host is not affected since PHSS_38183 applies to a different OS release.");
    }
    
    patches = make_list("PHSS_38183", "PHSS_42852");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-64SLIB", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-DTS", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-RUN", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-SHLIB", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCEC-ENG-A-MAN", version:"B.11.11")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");