Netscape Enterprise Server Basic Authentication Buffer Overflow RCE (EGGBASKET/XP_NS-HTTPD)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A web application running on the remote host is affected by a remote
code execution vulnerability.

Description :

According to its banner, the Netscape Enterprise Server running on the
remote host is either version 3.6 or 3.6 SP1. It is, therefore,
affected by a buffer overflow condition in the HTTP Basic
Authentication module of the server. An unauthenticated, remote
attacker can exploit this to execute arbitrary code with elevated
privileges.

EGGBASKET is one of multiple Equation Group vulnerabilities and
exploits disclosed on 2017/04/08 by a group known as the Shadow
Brokers.

Note that Nessus has not attempted to exploit this issue but has
instead relied only on the application's self-reported version number.

See also :

https://github.com/x0rz/EQGRP/blob/master/Linux/etc/opscript.txt#L4291

Solution :

Contact the vendor for a patch.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 100511 ()

Bugtraq ID: 847

CVE ID: CVE-1999-0853

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now