Cfengine AuthenticationDialogue() Function Remote Overflow

medium Nessus Plugin ID 14314

Synopsis

The remote host is affected by a denial of service vulnerability.
Cfengine is running on this remote host.

Description

Cfengine cfservd is reported prone to a remote heap-based buffer overrun vulnerability.

The vulnerability presents itself in the cfengine cfservd AuthenticationDialogue() function. The issue exists due to a lack of sufficient boundary checks performed on challenge data that is received from a client.

In addition, cfengine cfservd is reported prone to a remote denial of service vulnerability. The vulnerability presents itself in the cfengine cfservd AuthenticationDialogue() function which is responsible for processing SAUTH commands and also performing RSA based authentication. The vulnerability presents itself because return values for several statements within the AuthenticationDialogue() function are not checked.

Solution

Upgrade to 2.1.8 or newer.

See Also

https://seclists.org/fulldisclosure/2004/Aug/401

https://security.gentoo.org/glsa/200408-08

Plugin Details

Severity: Medium

ID: 14314

File Name: cfengine_authdiag.nasl

Version: 1.19

Type: local

Published: 8/20/2004

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/3/2004

Vulnerability Publication Date: 8/9/2004

Reference Information

CVE: CVE-2004-1701, CVE-2004-1702

BID: 10899, 10900