Ebola AV Daemon < 0.1.5 Authentication Sequence Remote Overflow

high Nessus Plugin ID 11946

Language:

Synopsis

The remote antivirus daemon has a buffer overflow vulnerability.

Description

According to its version number, there is a remote buffer overflow vulnerability in the authentication mechanism of the Ebola AntiVirus daemon. A remote attacker could exploit this to crash the service, or possibly execute arbitrary code.

Solution

Upgrade to Ebola 0.1.5 or later.

See Also

https://seclists.org/bugtraq/2003/Dec/88

https://seclists.org/bugtraq/2003/Dec/129

http://www.pldaniels.com/ebola/

Plugin Details

Severity: High

ID: 11946

File Name: ebola_overflow.nasl

Version: 1.13

Type: remote

Published: 12/10/2003

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/4/2003

Reference Information

BID: 9156