The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] IBM Tivoli Provisioning Manager for OS Deployment TFTP Blocksize DoS Vulnerability


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 18 Jul 2007 13:15:19 +0200
Subject: [NT] IBM Tivoli Provisioning Manager for OS Deployment TFTP Blocksize DoS Vulnerability
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070719105315.1A8335813@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM Tivoli Provisioning Manager for OS Deployment TFTP Blocksize DoS 
Vulnerability
------------------------------------------------------------------------


SUMMARY

 <http://www-306.ibm.com/software/tivoli/products/prov-mgr-os-deploy/ > 
IBM Corp.'s Tivoli Provisioning Manager for OS Deployment is "a network 
boot server that facilitates central management of networked workstations. 
It implements Preboot Execution Environment (PXE), a Web-based 
administration service, DHCP, TFTP, and several additional protocols".

Remote exploitation of a denial of service vulnerability within version 
5.1.0.2 of IBM Corp.'s Tivoli Provisioning Manager for OS Deployment 
allows attackers to deny service to all product functionality.

DETAILS

Vulnerable Systems:
 * IBM Corp.'s Tivoli Provisioning Manager for OS Deployment version 
5.1.0.2

Immune Systems:
 * IBM Corp.'s Tivoli Provisioning Manager for OS Deployment version 
5.1.0.116

This vulnerability specifically exists in the TFTP protocol 
implementation. When processing a read request (RRQ), an integer division 
by zero error can be triggered by supplying an invalid "blksize" argument. 
This exception is not handled and will result in the rembo.exe service 
terminating.

Exploitation allows an attacker to cause the service to terminate 
unexpectedly due to an exception that occurs when dividing by zero.

No authentication is required to access the vulnerable code. The attacker 
need only be able to send a specially crafted request to the TFTP port 
(UDP port 69) of the vulnerable machine.

This will deny service to all functionality provided by this service. This 
includes DHCP, TFTP, PXE, HTTP, HTTPS, as well as several other services.

Vendor Status:
The IBM Tivoli team has addressed this vulnerability within Tivoli 
Provisioning Manager for OS Deployment 5.1 Fix Pack 3. More information is 
available from IBM Document swg24016347 at the following URL.
 <http://www-1.ibm.com/support/docview.wss?uid=swg24016347>; 
http://www-1.ibm.com/support/docview.wss?uid=swg24016347

Disclosure Timeline:
 * 06/19/2007 - Initial vendor notification
 * 06/19/2007 - Initial vendor response
 * 07/17/2007 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense.
The original article can be found at:
 
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=560>; 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=560




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру