Cfengine CAUTH Command Remote Format String

This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a remote command execution
vulnerability.

Description :

Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a
remote-configuration client to cfengine. This version of cfd contains
several flaws in the way that it calls syslog(). As a result, trusted
hosts and valid users (if access controls are not in place) can cause
the vulnerable host to log malicious data which, when logged, can
either crash the server or execute arbitrary code on the stack. In
the latter case, the code would be executed as the 'root' user.

See also :

http://www.nessus.org/u?2328dff9

Solution :

Upgrade to 1.6.0a11 or newer

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.5
(CVSS2#E:F/RL:U/RC:ND)

Family: Gain a shell remotely

Nessus Plugin ID: 14316 (cfengine_format_string_vuln.nasl)

Bugtraq ID: 1757

CVE ID: CVE-2000-0947