Vulnerabilities > CVE-2010-3585 - Remote Code Execution vulnerability in Oracle VM 2.2.1

047910
CVSS 9.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
oracle
critical
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in the OracleVM component in Oracle VM 2.2.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to ovs-agent. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a third party researcher that this is related to the exposure of unspecified functions using XML-RPC.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Exploit-Db

descriptionOracle VM Server Virtual Server Agent Command Injection. CVE-2010-3585. Remote exploit for linux platform
idEDB-ID:16915
last seen2016-02-02
modified2010-10-25
published2010-10-25
reportermetasploit
sourcehttps://www.exploit-db.com/download/16915/
titleOracle VM Server Virtual Server Agent Command Injection

Metasploit

descriptionThis module exploits a command injection flaw within Oracle\'s VM Server Virtual Server Agent (ovs-agent) service. By including shell meta characters within the second parameter to the 'utl_test_url' XML-RPC methodCall, an attacker can execute arbitrary commands. The service typically runs with root privileges. NOTE: Valid credentials are required to trigger this vulnerable. The username appears to be hardcoded as 'oracle', but the password is set by the administrator at installation time.
idMSF:EXPLOIT/UNIX/WEBAPP/ORACLE_VM_AGENT_UTL
last seen2020-06-14
modified2017-07-24
published2010-10-22
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3585
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/oracle_vm_agent_utl.rb
titleOracle VM Server Virtual Server Agent Command Injection

Nessus

NASL familyOracleVM Local Security Checks
NASL idORACLEVM_OVMSA-2010-0015.NASL
descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Update changelog, fill CVE number. - Fix config-file access mode issue. - Fix file access vulnerability [orabug 10142417] (CVE-2010-3582) - Fix local privilege escalation [orabug 10142476] (CVE-2010-3584) - Fix ovs agent command injection [orabug 10146644] (CVE-2010-3585) - Fix validate master ip command injection [orabug 10142448] (CVE-2010-3583) - Add excutable mode to utils/upgrade.py.
last seen2020-06-01
modified2020-06-02
plugin id68878
published2013-07-15
reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/68878
titleOracleVM 2.2 : ovs-agent (OVMSA-2010-0015)
code
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The package checks in this plugin were extracted from OracleVM
# Security Advisory OVMSA-2010-0015.
#

include("compat.inc");

if (description)
{
  script_id(68878);
  script_version("1.11");
  script_cvs_date("Date: 2019/10/25 13:36:06");

  script_cve_id("CVE-2010-3582", "CVE-2010-3583", "CVE-2010-3584", "CVE-2010-3585");
  script_bugtraq_id(44031, 44043, 44044, 44047);
  script_xref(name:"IAVA", value:"2010-A-0151");

  script_name(english:"OracleVM 2.2 : ovs-agent (OVMSA-2010-0015)");
  script_summary(english:"Checks the RPM output for the updated package.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote OracleVM host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote OracleVM system is missing necessary patches to address
critical security updates :

  - Update changelog, fill CVE number.

  - Fix config-file access mode issue.

  - Fix file access vulnerability [orabug 10142417]
    (CVE-2010-3582)

  - Fix local privilege escalation [orabug 10142476]
    (CVE-2010-3584)

  - Fix ovs agent command injection [orabug 10146644]
    (CVE-2010-3585)

  - Fix validate master ip command injection [orabug
    10142448] (CVE-2010-3583)

  - Add excutable mode to utils/upgrade.py."
  );
  # https://oss.oracle.com/pipermail/oraclevm-errata/2010-October/000056.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?f5790f09"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected ovs-agent package."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Oracle VM Server Virtual Server Agent Command Injection');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:vm:ovs-agent");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:vm_server:2.2");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/10/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/10/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/15");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"OracleVM Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/OracleVM/release", "Host/OracleVM/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/OracleVM/release");
if (isnull(release) || "OVS" >!< release) audit(AUDIT_OS_NOT, "OracleVM");
if (! preg(pattern:"^OVS" + "2\.2" + "(\.[0-9]|$)", string:release)) audit(AUDIT_OS_NOT, "OracleVM 2.2", "OracleVM " + release);
if (!get_kb_item("Host/OracleVM/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "OracleVM", cpu);

flag = 0;
if (rpm_check(release:"OVS2.2", reference:"ovs-agent-2.3-42")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ovs-agent");
}

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/95120/oracle_vm_agent_utl.rb.txt
idPACKETSTORM:95120
last seen2016-12-05
published2010-10-25
reporterjduck
sourcehttps://packetstormsecurity.com/files/95120/Oracle-VM-Server-Virtual-Server-Agent-Command-Injection.html
titleOracle VM Server Virtual Server Agent Command Injection

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:71408
last seen2017-11-19
modified2014-07-01
published2014-07-01
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-71408
titleOracle VM Server Virtual Server Agent Command Injection