Powerd WHATIDO Variable Remote Overflow

High Nessus Network Monitor Plugin ID 3425

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is using Powerd, an open-source application, to monitor the UPS device. This version of Powerd is vulnerable to a remote overflow. An attacker exploiting this flaw will be able to execute arbitrary code on the target machine.

Solution

Block access to the powerd server port (532) from untrusted clients.

See Also

http://power.sourceforge.net

Plugin Details

Severity: High

ID: 3425

Family: Generic

Published: 2006/02/10

Modified: 2018/07/11

Dependencies: 3424

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 7.3

Temporal Score: 7.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:power_daemon:power_daemon

Reference Information

CVE: CVE-2006-0681

BID: 16582