Plugin ID | 296 |
Plugin name | FakeBO buffer overflow |
Plugin filename | FakeBO buffer overflow.plugin |
Plugin filesize | 2111 bytes |
Plugin family | Backdoors |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/04 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 12345 |
Plugin procedure detection | open|sleep|close|pattern_exists NetBus |
Plugin detection accuracy | 75 |
Plugin comment | The NASL script is Copyright (C) 1999 Renaud Deraison |
Bug advisory | http://www.securityfocus.com/archive/1/12437 |
Bug affected | FakeBO |
Bug not affected | Real BackOrifice |
Bug vulnerability class | Buffer Overflow |
Bug description | We detected a possible buffer overflow in the service FakeBO. An attacker may connect to this port, then send a specially crafted buffer which will give him a shell. |
Bug solution | Disable this service. It's useless anyway. At worst, upgrade. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 9 |
Bug risk | 8 |
Bug Nessus risk | High |
Bug check tools | Nessus can check this flaw with the plugin 10066 (FakeBO buffer overflow). |
Source Nessus ID | 10066 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |