NetSupport Manager Client Spoofing Remote Authentication Bypass

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a program that is prone to an
authentication bypass attack.

Description :

NetSupport Manager (NSM), a multi-platform remote control application,
is installed on the remote host.

According to its version, the NetSupport Manager client component on
the remote host does not properly handle authentication sessions. A
remote attacker may be able to leverage this issue to pose as the
NetSupport Manager, associate to the NSM client, and gain complete
control of the affected system.

See also :

http://www.securityfocus.com/archive/1/480240/30/0/threaded
http://www.netsupportsoftware.com/support/td.asp?td=543

Solution :

Upgrade to NetSupport Manager version 10.20.0004 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 26071 ()

Bugtraq ID: 25761

CVE ID: CVE-2007-5057

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now