Vulnerabilities > CVE-2013-3834 - Remote Security vulnerability in Oracle Virtualization 5.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5 allows remote attackers to affect availability via unknown vectors related to ttaauxserv.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Misc. NASL id ORACLE_SECURE_GLOBAL_DESKTOP_DOS.NASL description The remote host has a version of Oracle Secure Global Desktop installed that has an unspecified denial of service vulnerability in the ttaauxserv binary that may be triggered by a remote attacker. last seen 2019-10-28 modified 2013-11-01 plugin id 70731 published 2013-11-01 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/70731 title Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check) code #TRUSTED 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 # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(70731); script_version("1.8"); script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/18"); script_cve_id("CVE-2013-3834"); script_bugtraq_id(63138); script_name(english:"Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check)"); script_summary(english:"Checks if patch is installed"); script_set_attribute( attribute:"synopsis", value: "The remote host has software installed that is affected by a denial of service vulnerability." ); script_set_attribute( attribute:"description", value: "The remote host has a version of Oracle Secure Global Desktop installed that has an unspecified denial of service vulnerability in the ttaauxserv binary that may be triggered by a remote attacker." ); # http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ac29c174"); script_set_attribute( attribute:"solution", value: "Install the patched binary per the instructions in the vendor's advisory." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/16"); script_set_attribute(attribute:"patch_publication_date", value:"2013/10/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/01"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:virtualization_secure_global_desktop"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc."); script_dependencies("oracle_secure_global_desktop_installed.nbin"); script_require_keys("Host/Oracle_Secure_Global_Desktop/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("ssh_func.inc"); include("telnet_func.inc"); include("hostlevel_funcs.inc"); if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS) enable_ssh_wrappers(); else disable_ssh_wrappers(); version = get_kb_item_or_exit("Host/Oracle_Secure_Global_Desktop/Version"); if (version != "5.00.907") audit(AUDIT_INST_VER_NOT_VULN, version); # this check is for Oracle Secure Global Desktop packages built for Linux platform uname = get_kb_item_or_exit("Host/uname"); if ("Linux" >!< uname) audit(AUDIT_OS_NOT, "Linux"); if (islocalhost()) { if (!defined_func("pread")) exit(1, "'pread()' is not defined."); info_t = INFO_LOCAL; } else { info_t = INFO_SSH; ret = ssh_open_connection(); if (!ret) exit(1, "Failed to open an SSH connection."); } cmd = "dd if=/opt/tarantella/bin/bin/ttaauxserv bs=10000 count=359 | md5sum"; cmd1 = "dd if=/opt/tarantella/bin/bin/ttaauxserv bs=10000 skip=360 | md5sum"; res = info_send_cmd(cmd:cmd); if (strlen(res) == 0) { if (info_t == INFO_SSH) ssh_close_connection(); exit(0, 'No results returned from "' + cmd + '" command ran on remote host.'); } if (res !~ "^[0-9a-f]{32}([ ]|$)") { if (info_t == INFO_SSH) ssh_close_connection(); exit(0, 'Unexpected output from "' + cmd + '"'); } res1 = info_send_cmd(cmd:cmd1); if (info_t == INFO_SSH) ssh_close_connection(); if (strlen(res1) == 0) exit(0, 'No results returned from "' + cmd1 + '" command ran on remote host.'); if (res1 !~ "^[0-9a-f]{32}([ ]|$)") exit(0, 'Unexpected output from "' + cmd1 + '"'); if ( "e8490e71847949c9cd161db9f9eece95" >!< res || "bfcc1282a99455ffeab15a348a1cf3f8" >!< res1 ) audit(AUDIT_INST_VER_NOT_VULN, "Oracle Secure Global Desktop"); if (report_verbosity > 0) { report = '\n Version : ' + version + '\n Unpatched binary : /opt/tarantella/bin/bin/ttaauxserv\n'; security_warning(port:0, extra:report); } else security_warning(0);
NASL family Misc. NASL id ORACLE_SECURE_GLOBAL_DESKTOP_DOS1.NASL description The remote host is running a version of Oracle Secure Global Desktop that may have an unspecified denial of service vulnerability in the ttaauxserv binary. Note that this may be a false positive, as this plugin only checks if a vulnerable version of Oracle Secure Global Desktop is running, and does not check if the patched binary has been installed. last seen 2020-06-01 modified 2020-06-02 plugin id 70732 published 2013-11-01 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/70732 title Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(70732); script_version("1.8"); script_cvs_date("Date: 2018/07/18 17:43:55"); script_cve_id("CVE-2013-3834"); script_bugtraq_id(63138); script_name(english:"Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check)"); script_summary(english:"Checks version of Oracle Secure Global Desktop"); script_set_attribute( attribute:"synopsis", value:"The remote host may be affected by a denial of service vulnerability." ); script_set_attribute( attribute:"description", value: "The remote host is running a version of Oracle Secure Global Desktop that may have an unspecified denial of service vulnerability in the ttaauxserv binary. Note that this may be a false positive, as this plugin only checks if a vulnerable version of Oracle Secure Global Desktop is running, and does not check if the patched binary has been installed." ); # http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ac29c174"); script_set_attribute( attribute:"solution", value: "Install the patched binary per the instructions in the vendor's advisory." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/16"); script_set_attribute(attribute:"patch_publication_date", value:"2013/10/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/01"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:virtualization_secure_global_desktop"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc."); script_dependencies("oracle_secure_global_desktop_http_detect.nbin"); script_require_keys("www/oracle_sgdadmin", "Settings/ParanoidReport"); script_require_ports("Services/www", 443); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); include("webapp_func.inc"); appname = "Oracle Secure Global Desktop"; port = get_http_port(default:443); install = get_install_from_kb(appname:"oracle_sgdadmin", port:port, exit_on_fail:TRUE); dir = install['dir']; install_url = build_url(port: port, qs:dir); version = install['ver']; if (version == "unknown") audit(AUDIT_UNKNOWN_WEB_APP_VER, appname + " Administration Console", install_url); # we can't detect if patch is installed from version info, # so we only run this check in paranoid mode if (report_paranoia < 2) audit(AUDIT_PARANOID); if (version != "5.00") audit(AUDIT_INST_VER_NOT_VULN, appname); build = get_kb_item_or_exit("www/" + port + "/oracle_sgdadmin/Build"); item = eregmatch(pattern:"^([0-9]{8})([0-9]{6})$", string:build); if (isnull(item)) exit(1, "Unable to parse build number for Oracle Secure Global Desktop."); if ( int(item[1]) <= 20130413 && # date int(item[2]) <= 131921 # time ) { if (report_verbosity > 0) { report = '\nBased on the self-reported version information from the web administration' + '\nconsole, the Oracle Secure Global Desktop install is potentially' + '\nvulnerable if the patch hasn\'t been applied : \n' + '\n Version : ' + version + ' (Build ' + build + ')\n'; security_warning(port:0, extra:report); } else security_warning(0); exit(0); } else audit(AUDIT_INST_VER_NOT_VULN, appname, version + ' (Build ' + build + ')');