Cfengine CAUTH Command Remote Format String

This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.

Synopsis :

The remote host is affected by a remote command execution

Description :

Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a
remote-configuration client to cfengine. This version of cfd contains
several flaws in the way that it calls syslog(). As a result, trusted
hosts and valid users (if access controls are not in place) can cause
the vulnerable host to log malicious data which, when logged, can
either crash the server or execute arbitrary code on the stack. In
the latter case, the code would be executed as the 'root' user.

See also :

Solution :

Upgrade to 1.6.0a11 or newer

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 9.5

Family: Gain a shell remotely

Nessus Plugin ID: 14316 (cfengine_format_string_vuln.nasl)

Bugtraq ID: 1757

CVE ID: CVE-2000-0947

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now