Netscape Enterprise Server Basic Authentication Buffer Overflow RCE (EGGBASKET/XP_NS-HTTPD)

critical Nessus Plugin ID 100511

Synopsis

A web application running on the remote host is affected by a remote code execution vulnerability.

Description

According to its banner, the Netscape Enterprise Server running on the remote host is either version 3.6 or 3.6 SP1. It is, therefore, affected by a buffer overflow condition in the HTTP Basic Authentication module of the server. An unauthenticated, remote attacker can exploit this to execute arbitrary code with elevated privileges.

EGGBASKET is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/08 by a group known as the Shadow Brokers.

Note that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported version number.

Solution

Contact the vendor for a patch.

See Also

https://github.com/x0rz/EQGRP/blob/master/Linux/etc/opscript.txt#L4291

Plugin Details

Severity: Critical

ID: 100511

File Name: netscape_enterprise_basic_auth_overflow.nasl

Version: 1.5

Type: remote

Family: Web Servers

Published: 5/30/2017

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:netscape:enterprise_server

Required KB Items: Settings/ParanoidReport, www/iplanet

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/1/1999

Reference Information

CVE: CVE-1999-0853

BID: 847