Cfengine CAUTH Command Remote Format String

critical Nessus Plugin ID 14316

Synopsis

The remote host is affected by a remote command execution vulnerability.

Description

Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a remote-configuration client to cfengine. This version of cfd contains several flaws in the way that it calls syslog(). As a result, trusted hosts and valid users (if access controls are not in place) can cause the vulnerable host to log malicious data which, when logged, can either crash the server or execute arbitrary code on the stack. In the latter case, the code would be executed as the 'root' user.

Solution

Upgrade to 1.6.0a11 or newer

See Also

http://www.nessus.org/u?2328dff9

Plugin Details

Severity: Critical

ID: 14316

File Name: cfengine_format_string_vuln.nasl

Version: 1.17

Type: local

Published: 8/20/2004

Updated: 7/3/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 10/1/2000

Reference Information

CVE: CVE-2000-0947

BID: 1757