The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] IBM Tivoli Provisioning Manager for OS Deployment Multiple Stack Overflow Vulnerabilities


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 7 May 2007 12:40:22 +0200
Subject: [NT] IBM Tivoli Provisioning Manager for OS Deployment Multiple Stack Overflow Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070507094952.57FFC5937@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM Tivoli Provisioning Manager for OS Deployment Multiple Stack Overflow 
Vulnerabilities
------------------------------------------------------------------------


SUMMARY

 <http://www-306.ibm.com/software/tivoli/products/prov-mgr-os-deploy/>; 
Tivoli  Provisioning Manager for OS Deployment "provides an easy-to-use 
console for remote deployment and management of operating systems. It 
includes flexible alternatives for creating and managing operating system 
cloned or scripted image installs. Tivoli Provisioning Manager for OS 
Deployment can help significantly reduce the number of images required 
across your environment and the effort required to manage those images".

A vulnerability allows remote attackers to execute arbitrary code on 
systems with vulnerable installations of IBM Tivoli Provisioning Manager 
for OS Deployment. Authentication is not required to exploit this 
vulnerability.

DETAILS

The specific flaws exist in the handling of HTTP requests to the rembo.exe 
service listening on TCP port 8080. Several components of an HTTP request 
can be modified to trigger buffer overflows. For example, by supplying an 
overly long filename an attacker is able to overflow a 150 byte stack 
buffer and subsequently execute arbitrary code. The overflow occurs during 
a string copy loop, shown here:

    00431136   lea   edi, [ebp+var_3C4] ; 150 byte stack buffer
    ...
    00431148 stringcopy:
    00431148   mov   al, [edx]          ; edx -> our data
    0043114A   add   edx, 1
    0043114D   mov   [edi], al          ; edi -> stack buffer
    0043114F   add   edi, 1
    00431152   test  al, al
    00431154   jnz   short stringcopy


The Host and Authorization fields are also vulnerable to similar 
exploitable overflows.

Vendor Response:
IBM has issued an update to correct this vulnerability. More details can 
be found at:  <http://www-1.ibm.com/support/docview.wss?uid=swg24015664>; 
http://www-1.ibm.com/support/docview.wss?uid=swg24015664

Disclosure Timeline:
2006.12.18 - Vulnerability reported to vendor
2007.05.02 - Coordinated public release of advisory

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1868>; 
CVE-2007-1868


ADDITIONAL INFORMATION

The information has been provided by  <mailto:TSRT@3com.com.> Aaron 
Portnoy, TippingPoint Security Research Team.
The original article can be found at:  
<http://dvlabs.tippingpoint.com/advisory/TPTI-07-05>; 
http://dvlabs.tippingpoint.com/advisory/TPTI-07-05




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру