Quantcast
Channel: Sophos User Bulletin Board
Viewing all articles
Browse latest Browse all 14361

Internal Vuln on Astaro? External as well?

$
0
0
I was running a Nessus scan out of BT 5R3 on my internal network and got the following high rated vuln on my Astaro (gateway interface):

Quote:

Synopsis: Arbitrary commands can be run on this port.

Description
A VxWorks WDB Debug Agent is running on this host.

Using this service, it is possible to read or write any memory zone or
execute arbitrary code on the host. An attacker can use this flaw to
take complete control of the affected device.

Solution
Disable the debug agent or contact the device's vendor for a patch.

Risk Factor: Critical

CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Temporal Score
9.5 (CVSS2#E:F/RL:U/RC:ND)

Plugin Output
Agent version : 2.0
MTU : 1500
Agent mode : 1
Run time type : 1 (WDB agent in VxWorks)
Run time version : VxWorks5.5.1
CPU type : 41
No FP coprocessor.
Target cannot write protect memory.
Page size : -1
Endianness : 1234
Board support package name : DCT2500
Memory base address : -2142666752
Memory size : 2097152

CVE
CVE-2010-2965

BID
42158

Xref
OSVDB:66842
CERT:362332
IAVB:2010-B-0075
ICSA:10-214-01

Vulnerability Publication Date: 2010/08/02

Plugin Publication Date: 2010/08/06

Plugin Last Modification Date: 2012/08/15

Public Exploit Available: True

Exploitable With: Metasploit (VxWorks WDB Agent Remote Memory Dump)
I did not try to exploit this since this is my production box. I am leaving for vacation soon and do not have time to setup a test box.

Does anyone know if this is a false positive or if there is a patch? I am running version 7 - the most up to date version. If there is no patch yet, will one be coming?

I plan to go to 9 soon, but am not quite ready.

Would this show up on the external interface??

Thanks,
C68

Viewing all articles
Browse latest Browse all 14361

Trending Articles