Vulnerabilities > CVE-2010-3071 - Unspecified vulnerability in Duckcorp BIP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN duckcorp
nessus
Summary
bip before 0.8.6 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an empty USER command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 14 |
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2010-15774.NASL description Update to upstream v0.8.6 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 51464 published 2011-01-12 reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/51464 title Fedora 13 : bip-0.8.6-1.fc13 (2010-15774) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2010-15774. # include("compat.inc"); if (description) { script_id(51464); script_version("1.11"); script_cvs_date("Date: 2019/08/02 13:32:31"); script_cve_id("CVE-2010-3071"); script_bugtraq_id(42995); script_xref(name:"FEDORA", value:"2010-15774"); script_name(english:"Fedora 13 : bip-0.8.6-1.fc13 (2010-15774)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Update to upstream v0.8.6 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=630437" ); # https://lists.fedoraproject.org/pipermail/package-announce/2011-January/052992.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?da9e41d9" ); script_set_attribute(attribute:"solution", value:"Update the affected bip package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:bip"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13"); script_set_attribute(attribute:"patch_publication_date", value:"2010/10/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC13", reference:"bip-0.8.6-1.fc13")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bip"); }
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201201-18.NASL description The remote host is affected by the vulnerability described in GLSA-201201-18 (bip: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in bip: Uli Schlachter reported that bip does not properly handle invalid data during authentication, resulting in a daemon crash (CVE-2010-3071). Julien Tinnes reported that bip does not check the number of open file descriptors against FD_SETSIZE, resulting in a stack buffer overflow (CVE-2012-0806). Impact : A remote attacker could exploit these vulnerabilities to execute arbitrary code with the privileges of the user running the bip daemon, or cause a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 57744 published 2012-01-31 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57744 title GLSA-201201-18 : bip: Multiple vulnerabilities
References
- http://bip.t1r.net/
- http://bip.t1r.net/
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595409
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595409
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052992.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052992.html
- http://secunia.com/advisories/42889
- http://secunia.com/advisories/42889
- http://www.openwall.com/lists/oss-security/2010/09/05/1
- http://www.openwall.com/lists/oss-security/2010/09/05/1
- http://www.openwall.com/lists/oss-security/2010/09/07/6
- http://www.openwall.com/lists/oss-security/2010/09/07/6
- http://www.securityfocus.com/bid/42995
- http://www.securityfocus.com/bid/42995
- http://www.vupen.com/english/advisories/2011/0096
- http://www.vupen.com/english/advisories/2011/0096
- https://bugzilla.redhat.com/show_bug.cgi?id=630437
- https://bugzilla.redhat.com/show_bug.cgi?id=630437