CodeMeter TCP Packet Parsing Unspecified Remote DoS

medium Nessus Plugin ID 57802

Synopsis

A web application on the remote host is affected by a denial of service vulnerability.

Description

According to its self-reported version, the CodeMeter WebAdmin server installed on the remote host is prior to 4.40 (4.40.687.500). It is affected by a flaw in parsing specially crafted packets sent to TCP port 22350, which a remote attacker can exploit to cause a denial of service.

Solution

Upgrade to CodeMeter 4.40 (4.40.687.500) or later.

See Also

http://www.nessus.org/u?c1098ea2

http://jvn.jp/en/jp/JVN78901873/index.html

https://www.wibu.com/support/user/downloads-user-software.html

Plugin Details

Severity: Medium

ID: 57802

File Name: codemeter_webadmin_4_40.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2/2/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:wibu:codemeter_runtime

Required KB Items: installed_sw/CodeMeter

Exploit Ease: No known exploits are available

Patch Publication Date: 1/11/2012

Vulnerability Publication Date: 1/11/2012

Reference Information

CVE: CVE-2011-4057

BID: 51382

CERT: 659515