Vulnerabilities > CVE-2013-3834 - Remote Security vulnerability in Oracle Virtualization 5.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
oracle
nessus

Summary

Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5 allows remote attackers to affect availability via unknown vectors related to ttaauxserv.

Vulnerable Configurations

Part Description Count
Application
Oracle
1

Nessus

  • NASL familyMisc.
    NASL idORACLE_SECURE_GLOBAL_DESKTOP_DOS.NASL
    descriptionThe remote host has a version of Oracle Secure Global Desktop installed that has an unspecified denial of service vulnerability in the ttaauxserv binary that may be triggered by a remote attacker.
    last seen2019-10-28
    modified2013-11-01
    plugin id70731
    published2013-11-01
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70731
    titleOracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check)
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70731);
      script_version("1.8");
      script_set_attribute(attribute:"plugin_modification_date", value:"2018/07/18");
    
      script_cve_id("CVE-2013-3834");
      script_bugtraq_id(63138);
    
      script_name(english:"Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (credentialed check)");
      script_summary(english:"Checks if patch is installed");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote host has software installed that is affected by a denial
    of service vulnerability."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote host has a version of Oracle Secure Global Desktop
    installed that has an unspecified denial of service vulnerability in
    the ttaauxserv binary that may be triggered by a remote attacker."
      );
      # http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ac29c174");
      script_set_attribute(
        attribute:"solution",
        value:
    "Install the patched binary per the instructions in the vendor's
    advisory."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/01");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:virtualization_secure_global_desktop");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("oracle_secure_global_desktop_installed.nbin");
      script_require_keys("Host/Oracle_Secure_Global_Desktop/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("ssh_func.inc");
    include("telnet_func.inc");
    include("hostlevel_funcs.inc");
    
    
    if(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)
      enable_ssh_wrappers();
    else disable_ssh_wrappers();
    
    version = get_kb_item_or_exit("Host/Oracle_Secure_Global_Desktop/Version");
    if (version != "5.00.907") audit(AUDIT_INST_VER_NOT_VULN, version);
    
    # this check is for Oracle Secure Global Desktop packages built for Linux platform
    uname = get_kb_item_or_exit("Host/uname");
    if ("Linux" >!< uname) audit(AUDIT_OS_NOT, "Linux");
    
    if (islocalhost())
    {
      if (!defined_func("pread")) exit(1, "'pread()' is not defined.");
      info_t = INFO_LOCAL;
    }
    else
    {
      info_t = INFO_SSH;
      ret = ssh_open_connection();
      if (!ret) exit(1, "Failed to open an SSH connection.");
    }
    
    cmd = "dd if=/opt/tarantella/bin/bin/ttaauxserv bs=10000 count=359 | md5sum";
    cmd1 = "dd if=/opt/tarantella/bin/bin/ttaauxserv bs=10000 skip=360 | md5sum";
    
    res = info_send_cmd(cmd:cmd);
    if (strlen(res) == 0)
    {
      if (info_t == INFO_SSH) ssh_close_connection();
      exit(0, 'No results returned from "' + cmd + '" command ran on remote host.');
    }
    
    if (res !~ "^[0-9a-f]{32}([ ]|$)")
    {
      if (info_t == INFO_SSH) ssh_close_connection();
      exit(0, 'Unexpected output from "' + cmd + '"');
    }
    
    res1 = info_send_cmd(cmd:cmd1);
    if (info_t == INFO_SSH) ssh_close_connection();
    
    if (strlen(res1) == 0) exit(0, 'No results returned from "' + cmd1 + '" command ran on remote host.');
    if (res1 !~ "^[0-9a-f]{32}([ ]|$)") exit(0, 'Unexpected output from "' + cmd1 + '"');
    
    if (
      "e8490e71847949c9cd161db9f9eece95" >!< res ||
       "bfcc1282a99455ffeab15a348a1cf3f8" >!< res1
    ) audit(AUDIT_INST_VER_NOT_VULN, "Oracle Secure Global Desktop");
    
    if (report_verbosity > 0)
    {
      report = '\n  Version          : ' + version +
               '\n  Unpatched binary : /opt/tarantella/bin/bin/ttaauxserv\n';
      security_warning(port:0, extra:report);
    }
    else security_warning(0);
    
  • NASL familyMisc.
    NASL idORACLE_SECURE_GLOBAL_DESKTOP_DOS1.NASL
    descriptionThe remote host is running a version of Oracle Secure Global Desktop that may have an unspecified denial of service vulnerability in the ttaauxserv binary. Note that this may be a false positive, as this plugin only checks if a vulnerable version of Oracle Secure Global Desktop is running, and does not check if the patched binary has been installed.
    last seen2020-06-01
    modified2020-06-02
    plugin id70732
    published2013-11-01
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70732
    titleOracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70732);
      script_version("1.8");
      script_cvs_date("Date: 2018/07/18 17:43:55");
    
      script_cve_id("CVE-2013-3834");
      script_bugtraq_id(63138);
    
      script_name(english:"Oracle Secure Global Desktop ttaauxserv Remote Denial of Service (remote check)");
      script_summary(english:"Checks version of Oracle Secure Global Desktop");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote host may be affected by a denial of service vulnerability."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote host is running a version of Oracle Secure Global Desktop
    that may have an unspecified denial of service vulnerability in the
    ttaauxserv binary.  Note that this may be a false positive, as this
    plugin only checks if a vulnerable version of Oracle Secure Global
    Desktop is running, and does not check if the patched binary has been
    installed."
      );
      # http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ac29c174");
      script_set_attribute(
        attribute:"solution",
        value:
    "Install the patched binary per the instructions in the vendor's
    advisory."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/10/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/11/01");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:virtualization_secure_global_desktop");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("oracle_secure_global_desktop_http_detect.nbin");
      script_require_keys("www/oracle_sgdadmin", "Settings/ParanoidReport");
      script_require_ports("Services/www", 443);
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    include("webapp_func.inc");
    
    appname = "Oracle Secure Global Desktop";
    port = get_http_port(default:443);
    
    install = get_install_from_kb(appname:"oracle_sgdadmin", port:port, exit_on_fail:TRUE);
    
    dir = install['dir'];
    
    install_url = build_url(port: port, qs:dir);
    version = install['ver'];
    
    if (version == "unknown") audit(AUDIT_UNKNOWN_WEB_APP_VER, appname + " Administration Console", install_url);
    
    # we can't detect if patch is installed from version info,
    # so we only run this check in paranoid mode
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    if (version != "5.00") audit(AUDIT_INST_VER_NOT_VULN, appname);
    
    build = get_kb_item_or_exit("www/" + port + "/oracle_sgdadmin/Build");
    
    item = eregmatch(pattern:"^([0-9]{8})([0-9]{6})$", string:build);
    if (isnull(item)) exit(1, "Unable to parse build number for Oracle Secure Global Desktop.");
    
    if (
      int(item[1]) <= 20130413 && # date
      int(item[2]) <= 131921 # time
    )
    {
      if (report_verbosity > 0)
      {
        report =
          '\nBased on the self-reported version information from the web administration' +
          '\nconsole, the Oracle Secure Global Desktop install is potentially' +
          '\nvulnerable if the patch hasn\'t been applied : \n' +
          '\n  Version : ' + version + ' (Build ' + build + ')\n';
        security_warning(port:0, extra:report);
      }
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_INST_VER_NOT_VULN, appname, version + ' (Build ' + build + ')');