var-200410-0023
Vulnerability from variot

The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm". The software supports the performance management of networks, servers, virtual environments and applications. BACKGROUND

Ipswitch WhatsUp Gold is a Microsoft Windows based network monitoring application. More information is available at

http://www.Ipswitch.com/products/whatsup/index.html

II.

The problem specifically exists in the handling of reserved DOS device names. By generating a GET request for 'prn.htm' to the HTTP daemon installed by WhatsUp Gold, the application crashes and the following Runtime Library error is displayed:

Runtime Error!
Program: C:\Program Files\WhatsUp\whatsupg.exe
abnormal program termination

III. The WhatsUp Gold web server is not enabled by default.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability against WhatsUp Gold versions 8.03 and the latest version 8.03 Hotfix 1. It is suspected that earlier versions are also vulnerable.

V. WORKAROUNDS

Disable the WhatsUp Gold web server if it is not required.

VI. VENDOR RESPONSE

A patch to address this issue is available at:

http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2004-0799 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

08/12/2004 Initial vendor notification 08/12/2004 iDEFENSE clients notified 08/12/2004 Initial vendor response 09/16/2004 Coordinated public disclosure

IX. CREDIT

The discoverer wishes to remain anonymous.

Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp

X. LEGAL NOTICES

Copyright (c) 2004 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200410-0023",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ipswitch",
        "version": "8.03_hotfix_1"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "progress",
        "version": "8.03"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "progress",
        "version": "8.01"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "progress",
        "version": "8.0"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "progress",
        "version": "7.03"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "progress",
        "version": "7.04"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "progress",
        "version": "7.0"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ipswitch",
        "version": "8.03"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ipswitch",
        "version": "8.01"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ipswitch",
        "version": "8.0"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ipswitch",
        "version": "7.04"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ipswitch",
        "version": "7.03"
      },
      {
        "model": "whatsup gold",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "ipswitch",
        "version": "7.0"
      },
      {
        "model": "whatsup gold hotfix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.031"
      },
      {
        "model": "whatsup gold hotfix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.032"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "11110"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "iDEFENSE Security Advisory\u203b labs@idefense.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0799",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0799",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-9229",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0799",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200410-058",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9229",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using \"prn.htm\". The software supports the performance management of networks, servers, virtual environments and applications. BACKGROUND\n\nIpswitch WhatsUp Gold is a Microsoft Windows based network monitoring\napplication. More information is available at\n\n    http://www.Ipswitch.com/products/whatsup/index.html\n\nII. \n\nThe problem specifically exists in the handling of reserved DOS device\nnames. By generating a GET request for \u0027prn.htm\u0027 to the HTTP daemon\ninstalled by WhatsUp Gold, the application crashes and the following\nRuntime Library error is displayed:\n\n    Runtime Error!\n    Program: C:\\Program Files\\WhatsUp\\whatsupg.exe\n    abnormal program termination\n\nIII. The\nWhatsUp Gold web server is not enabled by default. \n\nIV. DETECTION\n\niDEFENSE has confirmed the existence of this vulnerability against\nWhatsUp Gold versions 8.03 and the latest version 8.03 Hotfix 1. It is\nsuspected that earlier versions are also vulnerable. \n\nV. WORKAROUNDS\n\nDisable the WhatsUp Gold web server if it is not required. \n\nVI. VENDOR RESPONSE\n\nA patch to address this issue is available at:\n\nhttp://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CAN-2004-0799 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n08/12/2004   Initial vendor notification\n08/12/2004   iDEFENSE clients notified\n08/12/2004   Initial vendor response\n09/16/2004   Coordinated public disclosure\n\nIX. CREDIT\n\nThe discoverer wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nX. LEGAL NOTICES\n\nCopyright (c) 2004 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      },
      {
        "db": "BID",
        "id": "11110"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "db": "PACKETSTORM",
        "id": "34397"
      }
    ],
    "trust": 1.35
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-9229",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0799",
        "trust": 2.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "17418",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20040916 IPSWITCH WHATSUP GOLD REMOTE DENIAL OF SERVICE VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "11110",
        "trust": 0.4
      },
      {
        "db": "PACKETSTORM",
        "id": "34397",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-9229",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "db": "BID",
        "id": "11110"
      },
      {
        "db": "PACKETSTORM",
        "id": "34397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "id": "VAR-200410-0023",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-28T23:04:39.358000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.ipswitch.com/support/whatsup/patch-upgrades.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.idefense.com/application/poi/display?id=142\u0026type=vulnerabilities"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17418"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/17418"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/375470"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=142\u0026amp;type=vulnerabilities"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/poi/teams/vcp.jsp"
      },
      {
        "trust": 0.1,
        "url": "http://www.ipswitch.com/products/whatsup/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org),"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0799"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "db": "BID",
        "id": "11110"
      },
      {
        "db": "PACKETSTORM",
        "id": "34397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "db": "BID",
        "id": "11110"
      },
      {
        "db": "PACKETSTORM",
        "id": "34397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-10-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "date": "2004-09-04T00:00:00",
        "db": "BID",
        "id": "11110"
      },
      {
        "date": "2004-09-21T00:24:23",
        "db": "PACKETSTORM",
        "id": "34397"
      },
      {
        "date": "2004-09-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "date": "2004-10-20T04:00:00",
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9229"
      },
      {
        "date": "2009-07-12T07:06:00",
        "db": "BID",
        "id": "11110"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      },
      {
        "date": "2024-08-27T17:48:24.383000",
        "db": "NVD",
        "id": "CVE-2004-0799"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "34397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ipswitch WhatsUp Gold Remote denial of service vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200410-058"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.