Vulnerabilities > CVE-2010-3583 - Remote Command Execution vulnerability in Oracle VM 2.2.1

047910
CVSS 9.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
oracle
critical
nessus

Summary

Unspecified vulnerability in the OracleVM component in Oracle VM 2.2.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to ovs-agent. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a third party researcher that this is related to the exposure of multiple unspecified functions through XML-RPC that allow execution of arbitrary OS commands.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Nessus

NASL familyOracleVM Local Security Checks
NASL idORACLEVM_OVMSA-2010-0015.NASL
descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Update changelog, fill CVE number. - Fix config-file access mode issue. - Fix file access vulnerability [orabug 10142417] (CVE-2010-3582) - Fix local privilege escalation [orabug 10142476] (CVE-2010-3584) - Fix ovs agent command injection [orabug 10146644] (CVE-2010-3585) - Fix validate master ip command injection [orabug 10142448] (CVE-2010-3583) - Add excutable mode to utils/upgrade.py.
last seen2020-06-01
modified2020-06-02
plugin id68878
published2013-07-15
reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/68878
titleOracleVM 2.2 : ovs-agent (OVMSA-2010-0015)
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The package checks in this plugin were extracted from OracleVM
# Security Advisory OVMSA-2010-0015.
#

include("compat.inc");

if (description)
{
  script_id(68878);
  script_version("1.11");
  script_cvs_date("Date: 2019/10/25 13:36:06");

  script_cve_id("CVE-2010-3582", "CVE-2010-3583", "CVE-2010-3584", "CVE-2010-3585");
  script_bugtraq_id(44031, 44043, 44044, 44047);
  script_xref(name:"IAVA", value:"2010-A-0151");

  script_name(english:"OracleVM 2.2 : ovs-agent (OVMSA-2010-0015)");
  script_summary(english:"Checks the RPM output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote OracleVM host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote OracleVM system is missing necessary patches to address
critical security updates :

  - Update changelog, fill CVE number.

  - Fix config-file access mode issue.

  - Fix file access vulnerability [orabug 10142417]
    (CVE-2010-3582)

  - Fix local privilege escalation [orabug 10142476]
    (CVE-2010-3584)

  - Fix ovs agent command injection [orabug 10146644]
    (CVE-2010-3585)

  - Fix validate master ip command injection [orabug
    10142448] (CVE-2010-3583)

  - Add excutable mode to utils/upgrade.py."
  );
  # https://oss.oracle.com/pipermail/oraclevm-errata/2010-October/000056.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?f5790f09"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected ovs-agent package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Oracle VM Server Virtual Server Agent Command Injection');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:ovs-agent");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:vm_server:2.2");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/10/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/10/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/15");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"OracleVM Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/OracleVM/release", "Host/OracleVM/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/OracleVM/release");
if (isnull(release) || "OVS" >!< release) audit(AUDIT_OS_NOT, "OracleVM");
if (! preg(pattern:"^OVS" + "2\.2" + "(\.[0-9]|$)", string:release)) audit(AUDIT_OS_NOT, "OracleVM 2.2", "OracleVM " + release);
if (!get_kb_item("Host/OracleVM/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "OracleVM", cpu);

flag = 0;
if (rpm_check(release:"OVS2.2", reference:"ovs-agent-2.3-42")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ovs-agent");
}