Hummingbird InetD LPD Component (Lpdw.exe) Data Overflow

medium Nessus Plugin ID 18403

Synopsis

The remote host contains an application that is affected by a buffer overflow vulnerability.

Description

The lpd daemon installed on the remote host appears to be from the Hummingbird Connectivity suite and suffers from a buffer overflow vulnerability. An attacker can crash the daemon by sending commands with overly-long queue names. Additionally, with a specially crafted packet, the attacker can also execute code remotely within the context of the affected service.

Solution

There is no known solution at this time.

See Also

http://www.nessus.org/u?bbff422b

Plugin Details

Severity: Medium

ID: 18403

File Name: hummingbird_lpd_overflow.nasl

Version: 1.14

Type: remote

Published: 5/30/2005

Updated: 7/12/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/18/2005

Exploitable With

Metasploit (Hummingbird Connectivity 10 SP5 LPD Buffer Overflow)

Reference Information

CVE: CVE-2005-1815

BID: 13788