SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   IBM Director Vendors:   IBM
IBM Director CIM Server Consumer Name Validation Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1021825
SecurityTracker URL:  http://securitytracker.com/id/1021825
CVE Reference:   CVE-2009-0879   (Links to External Site)
Updated:  Mar 19 2009
Original Entry Date:  Mar 10 2009
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.20.3
Description:   A vulnerability was reported in IBM Director CIM Server. A remote user can cause denial of service conditions.

A remote user can send a request containing a specially crafted consumer name to cause the target service to crash. The service must be manually restarted to return to normal operations.

The vendor was notified on November 3, 2008.

Bernhard Mueller of SEC Consult Vulnerability Lab reported this vulnerability.

The original advisory is available at:

http://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt

Impact:   A remote user can cause the target service to crash.
Solution:   The vendor has issued a fix (5.20.3 Service Update 2), available at:

https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms〈=en_US&cp=UTF-8

Vendor URL:  www.ibm.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Subject:  [Full-disclosure] SEC Consult SA-20090305-1 :: IBM Director CIM

SEC-CONSULT Security Advisory < 20090305-1 >
=========================================================================================
   title: IBM Director CIM Server Remote Denial of Service Vulnerability
   program: IBM Director for Windows
   vulnerable version: <= 5.20.3 Service Update 2
   homepage: http://www-03.ibm.com/systems/management/director/
   found: Sept. 2008
   by: Bernhard Mueller / SEC Consult Vulnerability Lab
   permanent link:
http://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt
=========================================================================================

Product description:
---------------

IBM Director is an application that can track and view system
configurations of remote computers. It is available for Linux, AIX, and
Windows servers.


Vulnerability overview:
----------------

The CIM server contained in the IBM Director suite for Microsoft Windows
is vulnerable to a remote denial of service attack. The vulnerability
allows an attacker to crash the service remotely. It will not be
possible to reach the IBM Director agent until the service is manually
restarted.


Vulnerability details:
--------------- 

CIM server crashes on receiving requests that contain overlong consumer
names. The error condition does not allow for the redirection of program
flow.

M-POST /CIMListener/[Ax512] HTTP/1.1
CIMOperation: MethodCall
CIMExport: MethodRequest
CIMExportMethod: ExportIndication

[some xml]


Fix:
---------------

The vendor has adressed this vulnerability in service update 2 for IBM
Director agent 5.20.3. Download link:

https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8


vendor status:
---------------
vendor notified: 2008-11-03
patch available: 2009-03-09

--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
www.sec-consult.com

# EOF Bernhard Mueller, SEC Consult Vulnerability Lab / @2009


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC