Sentinel License Manager lservnt Service Remote Buffer Overflow

critical Nessus Plugin ID 17326

Synopsis

The remote service is subject to a buffer overflow attack.

Description

The remote host is running a version of Sentinel License Manager that is subject to remote buffer overflows. By sending 3000 bytes or more to the UDP port on which it listens (5093 by default), a remote attacker can crash the LServnt.exe service, overwrite the EIP register, and possibly execute arbitrary code.

Solution

Upgrade to Sentinel License Manager 8.0.0 or later as that reportedly addresses the issue.

See Also

http://www.cirt.dk/advisories/cirt-30-advisory.pdf

https://seclists.org/bugtraq/2005/Mar/123

Plugin Details

Severity: Critical

ID: 17326

File Name: sentinel_overflow.nasl

Version: 1.20

Type: remote

Published: 3/15/2005

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/7/2005

Exploitable With

Metasploit (SentinelLM UDP Buffer Overflow)

Reference Information

CVE: CVE-2005-0353

BID: 12742

CERT: 108790