The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


TPTI-07-05: IBM Tivoli Provisioning Manager for OS Deployment Multiple


<< Previous INDEX Search src / Print Next >>
From: [email protected]
To: [email protected], [email protected]
Subject: TPTI-07-05: IBM Tivoli Provisioning Manager for OS Deployment Multiple
 Stack Overflow Vulnerabilities
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.2 June 01, 2004
Sender: [email protected]
Message-ID: <OF12856F00.34F1A3EF-ON882572CF.00764ACE-882572CF.007718A5@3com.com.>
Date: Wed, 2 May 2007 14:40:51 -0700
X-MIMETrack: Serialize by Router on USUT001/US/3Com(Release 6.5.5FP2|October 23, 2006) at
 05/02/2007 02:40:54 PM,
        Serialize complete at 05/02/2007 02:40:54 PM
Content-Type: text/plain; charset="US-ASCII"
X-Virus-Scanned: antivirus-gw at tyumen.ru

TPTI-07-05: IBM Tivoli Provisioning Manager for OS Deployment Multiple
            Stack Overflow Vulnerabilities
http://dvlabs.tippingpoint.com/advisory/TPTI-07-05
May  2, 2007

-- CVE ID:
CVE-2007-1868

-- Affected Vendor:
IBM

-- Affected Products:
Tivoli Provisioning Manager for OS Deployment

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
systems with vulnerable installations of IBM Tivoli Provisioning
Manager for OS Deployment. Authentication is not required to exploit
this vulnerability.

The specific flaws exist in the handling of HTTP requests to the
rembo.exe service listening on TCP port 8080. Several components of an
HTTP request can be modified to trigger buffer overflows. For example,
by supplying an overly long filename an attacker is able to overflow a
150 byte stack buffer and subsequently execute arbitrary code. The
overflow occurs during a string copy loop, shown here:

    00431136   lea   edi, [ebp+var_3C4] ; 150 byte stack buffer
    ...
    00431148 stringcopy:
    00431148   mov   al, [edx]          ; edx -> our data
    0043114A   add   edx, 1
    0043114D   mov   [edi], al          ; edi -> stack buffer
    0043114F   add   edi, 1
    00431152   test  al, al
    00431154   jnz   short stringcopy


The Host and Authorization fields are also vulnerable to similar
exploitable overflows.

-- Vendor Response:
IBM has issued an update to correct this vulnerability. More details can
be found at:

    http://www-1.ibm.com/support/docview.wss?uid=swg24015664


-- Disclosure Timeline:
2006.12.18 - Vulnerability reported to vendor
2007.05.02 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by Aaron Portnoy, TippingPoint
Security Research Team.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру