Cfengine CAUTH Command Remote Format String

This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.

Synopsis :

The remote host is affected by a remote command execution

Description :

Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a
remote-configuration client to cfengine. This version of cfd contains
several flaws in the way that it calls syslog(). As a result, trusted
hosts and valid users (if access controls are not in place) can cause
the vulnerable host to log malicious data which, when logged, can
either crash the server or execute arbitrary code on the stack. In
the latter case, the code would be executed as the 'root' user.

See also :

Solution :

Upgrade to 1.6.0a11 or newer

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 9.5

Family: Gain a shell remotely

Nessus Plugin ID: 14316 (cfengine_format_string_vuln.nasl)

Bugtraq ID: 1757

CVE ID: CVE-2000-0947

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial