Plugin ID | 291 |
Plugin name | libgtop_daemon format string |
Plugin filename | libgtop_daemon format string.plugin |
Plugin filesize | 2004 bytes |
Plugin family | Misc |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/04 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 42800 |
Plugin procedure exploit | open|sleep|send %n%n\n|sleep|close|pattern_not_exists * |
Plugin exploit accuracy | 80 |
Plugin comment | The NASL script is Copyright (C) 2001 Renaud Deraison |
Bug vulnerability class | Format String |
Bug description | It seems that libgtop is/was running on this port nd is vulnerable to a format string attack which may allow an attacker to gain a shell on this host (with the privileges of 'nobody'). |
Bug solution | Upgrade to the latest version of libgtop_daemon. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 4 |
Bug simplicity | 8 |
Bug impact | 6 |
Bug risk | 6 |
Bug Nessus risk | High |
Bug check tools | Nessus can check this flaw with the plugin 10812 (libgtop_daemon format string). |
Source CVE | CAN-2001-0927 |
Source Nessus ID | 10812 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |