Vulnerabilities > CVE-2010-0751 - Null Pointer Dereference vulnerability in multiple products

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
libnids-project
fedoraproject
CWE-476
nessus

Summary

The ip_evictor function in ip_fragment.c in libnids before 1.24, as used in dsniff and possibly other products, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via crafted fragmented packets.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-5545.NASL
    descriptionlibnids 1.24 (Mar 14 2010): - fixed another remotely triggerable NULL dereference in ip_fragment.c - unofficial patch that enables tracking of already established TCP connections - missing reset of some tcp_* variables upon nids_exit - correct calculation of radiotap header - compilation warning fixes with newer gcc - use pcap_get_selectable_fd() instead of pcap_fileno() dsniff-2.4-0.9.b1: - Rebuild against libnids 1.24 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47400
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47400
    titleFedora 11 : dsniff-2.4-0.9.b1.fc11 / libnids-1.24-1.fc11 (2010-5545)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2010-5545.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(47400);
      script_version("1.10");
      script_cvs_date("Date: 2019/08/02 13:32:32");
    
      script_cve_id("CVE-2010-0751");
      script_xref(name:"FEDORA", value:"2010-5545");
    
      script_name(english:"Fedora 11 : dsniff-2.4-0.9.b1.fc11 / libnids-1.24-1.fc11 (2010-5545)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "libnids 1.24 (Mar 14 2010): - fixed another remotely triggerable NULL
    dereference in ip_fragment.c - unofficial patch that enables tracking
    of already established TCP connections - missing reset of some tcp_*
    variables upon nids_exit - correct calculation of radiotap header -
    compilation warning fixes with newer gcc - use
    pcap_get_selectable_fd() instead of pcap_fileno() dsniff-2.4-0.9.b1: -
    Rebuild against libnids 1.24
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-April/038387.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3cc63a77"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-April/038388.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?5c1e6bb4"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected dsniff and / or libnids packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:dsniff");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libnids");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/04/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^11([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 11.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC11", reference:"dsniff-2.4-0.9.b1.fc11")) flag++;
    if (rpm_check(release:"FC11", reference:"libnids-1.24-1.fc11")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "dsniff / libnids");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-5562.NASL
    descriptionlibnids 1.24 (Mar 14 2010): - fixed another remotely triggerable NULL dereference in ip_fragment.c - unofficial patch that enables tracking of already established TCP connections - missing reset of some tcp_* variables upon nids_exit - correct calculation of radiotap header - compilation warning fixes with newer gcc - use pcap_get_selectable_fd() instead of pcap_fileno() dsniff-2.4-0.9.b1: - Rebuild against libnids 1.24 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47403
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47403
    titleFedora 13 : dsniff-2.4-0.9.b1.fc13 / libnids-1.24-1.fc13 (2010-5562)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2010-5562.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(47403);
      script_version("1.9");
      script_cvs_date("Date: 2019/08/02 13:32:33");
    
      script_cve_id("CVE-2010-0751");
      script_bugtraq_id(39142);
      script_xref(name:"FEDORA", value:"2010-5562");
    
      script_name(english:"Fedora 13 : dsniff-2.4-0.9.b1.fc13 / libnids-1.24-1.fc13 (2010-5562)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "libnids 1.24 (Mar 14 2010): - fixed another remotely triggerable NULL
    dereference in ip_fragment.c - unofficial patch that enables tracking
    of already established TCP connections - missing reset of some tcp_*
    variables upon nids_exit - correct calculation of radiotap header -
    compilation warning fixes with newer gcc - use
    pcap_get_selectable_fd() instead of pcap_fileno() dsniff-2.4-0.9.b1: -
    Rebuild against libnids 1.24
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-April/038410.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?ebb18d88"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-April/038411.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?84ef832f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected dsniff and / or libnids packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:dsniff");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libnids");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/04/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC13", reference:"dsniff-2.4-0.9.b1.fc13")) flag++;
    if (rpm_check(release:"FC13", reference:"libnids-1.24-1.fc13")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "dsniff / libnids");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-5535.NASL
    descriptionlibnids 1.24 (Mar 14 2010): - fixed another remotely triggerable NULL dereference in ip_fragment.c - unofficial patch that enables tracking of already established TCP connections - missing reset of some tcp_* variables upon nids_exit - correct calculation of radiotap header - compilation warning fixes with newer gcc - use pcap_get_selectable_fd() instead of pcap_fileno() dsniff-2.4-0.9.b1: - Rebuild against libnids 1.24 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47398
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47398
    titleFedora 12 : dsniff-2.4-0.9.b1.fc12 / libnids-1.24-1.fc12 (2010-5535)