fake identd (fakeidentd) Fragmented Packet Request Remote Overflow

This script is Copyright (C) 2002-2014 Tenable Network Security, Inc.


Synopsis :

The identd server is prone to a remote buffer overflow attack.

Description :

The identd server on this port seems to be a version of fake identd
that fails to properly validate user input before copying it into a
buffer of fixed size. By splitting data into two or more packets, an
anonymous remote attacker can overflow the input buffer and execute
arbitrary code with root privileges.

See also :

http://archives.neohapsis.com/archives/bugtraq/2002-07/0370.html

Solution :

Either disable the service if it's not required or upgrade to Fake
Identd version 1.5 as that reportedly is not affected by this
vulnerability.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 11054 (fake_identd.nasl)

Bugtraq ID: 5351

CVE ID: CVE-2002-1792