Vulnerabilities > CVE-2008-4418 - Unspecified vulnerability in HP Hp-Ux B.11.11/B.11.23/B.11.31

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
hp
nessus

Summary

Unspecified vulnerability in DCE in HP HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause a denial of service via unknown vectors.

Vulnerable Configurations

Part Description Count
OS
Hp
3

Nessus

  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHSS_38258.NASL
    descriptions700_800 11.23 HP DCE 1.9 client cumulative patch : A potential security vulnerability has been identified with HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id35176
    published2008-12-16
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35176
    titleHP-UX PHSS_38258 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHSS_38258. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35176);
      script_version("1.15");
      script_cvs_date("Date: 2018/11/19 11:02:42");
    
      script_cve_id("CVE-2008-4418");
      script_xref(name:"HP", value:"emr_na-c01623009");
      script_xref(name:"HP", value:"HPSBUX02393");
      script_xref(name:"HP", value:"SSRT080057");
    
      script_name(english:"HP-UX PHSS_38258 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.23 HP DCE 1.9 client cumulative patch : 
    
    A potential security vulnerability has been identified with HP-UX
    running DCE. The vulnerability could be exploited remotely to create a
    Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623009
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?89d25b9f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHSS_38258 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/12/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.23"))
    {
      exit(0, "The host is not affected since PHSS_38258 applies to a different OS release.");
    }
    
    patches = make_list("PHSS_38258", "PHSS_42853");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-64SLIB", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-IA-RUN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-PA-RUN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-DTS", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-RUN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-SHLIB", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-IA64-SHLIB", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCEC-ENG-A-MAN", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-CoreTools.DCE-BPRG", version:"B.11.23")) flag++;
    if (hpux_check_patch(app:"DCE-CoreTools.DCEP-ENG-A-MAN", version:"B.11.23")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHSS_38259.NASL
    descriptions700_800 11.31 HP DCE 2.0 client cumulative patch : A potential security vulnerability has been identified with HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id35177
    published2008-12-16
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35177
    titleHP-UX PHSS_38259 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHSS_38259. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35177);
      script_version("1.22");
      script_cvs_date("Date: 2018/11/19 11:02:42");
    
      script_cve_id("CVE-2008-4418");
      script_xref(name:"HP", value:"emr_na-c01623009");
      script_xref(name:"HP", value:"HPSBUX02393");
      script_xref(name:"HP", value:"SSRT080057");
    
      script_name(english:"HP-UX PHSS_38259 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.31 HP DCE 2.0 client cumulative patch : 
    
    A potential security vulnerability has been identified with HP-UX
    running DCE. The vulnerability could be exploited remotely to create a
    Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623009
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?89d25b9f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHSS_38259 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/12/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.31"))
    {
      exit(0, "The host is not affected since PHSS_38259 applies to a different OS release.");
    }
    
    patches = make_list("PHSS_38259", "PHSS_39122", "PHSS_40201", "PHSS_43173", "PHSS_43701", "PHSS_44173");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-64SLIB", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-DTS", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-RUN", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-SHLIB", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-IA64-SHLIB", version:"B.11.31")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCEC-ENG-A-MAN", version:"B.11.31")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHSS_38183.NASL
    descriptions700_800 11.11 HP DCE/9000 1.8 DCE Client IPv6 patch : A potential security vulnerability has been identified with HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id35175
    published2008-12-16
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/35175
    titleHP-UX PHSS_38183 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHSS_38183. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(35175);
      script_version("1.17");
      script_cvs_date("Date: 2018/11/19 11:02:42");
    
      script_cve_id("CVE-2008-4418");
      script_xref(name:"HP", value:"emr_na-c01623009");
      script_xref(name:"HP", value:"HPSBUX02393");
      script_xref(name:"HP", value:"SSRT080057");
    
      script_name(english:"HP-UX PHSS_38183 : HP-UX Running DCE, Remote Denial of Service (DoS) (HPSBUX02393 SSRT080057 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.11 HP DCE/9000 1.8 DCE Client IPv6 patch : 
    
    A potential security vulnerability has been identified with HP-UX
    running DCE. The vulnerability could be exploited remotely to create a
    Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623009
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?89d25b9f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHSS_38183 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/12/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/16");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.11"))
    {
      exit(0, "The host is not affected since PHSS_38183 applies to a different OS release.");
    }
    
    patches = make_list("PHSS_38183", "PHSS_42852");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"DCE-Core.DCE-COR-64SLIB", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-DTS", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-RUN", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCE-CORE-SHLIB", version:"B.11.11")) flag++;
    if (hpux_check_patch(app:"DCE-Core.DCEC-ENG-A-MAN", version:"B.11.11")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");