CVE-2009-0879 : Detail

CVE-2009-0879

A03-Injection
85.51%V3
Network
2009-03-12 14:00 +00:00
2018-10-10 16:57 +00:00

Alert for a CVE

Stay informed of any changes for a specific CVE.
Alert management

Descriptions

The CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to cause a denial of service (daemon crash) via a long consumer name, as demonstrated by an M-POST request to a long /CIMListener/ URI.

Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metric Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 8190

Publication date : 2009-03-09 23:00 +00:00
Author : Bernhard Mueller
EDB Verified : Yes

SEC-CONSULT Security Advisory < 20090305-1 > ========================================================================================= title: IBM Director CIM Server Remote Denial of Service Vulnerability program: IBM Director for Windows vulnerable version: <= 5.20.3 Service Update 2 homepage: http://www-03.ibm.com/systems/management/director/ found: Sept. 2008 by: Bernhard Mueller / SEC Consult Vulnerability Lab permanent link: http://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt ========================================================================================= Product description: --------------- IBM Director is an application that can track and view system configurations of remote computers. It is available for Linux, AIX, and Windows servers. Vulnerability overview: ---------------- The CIM server contained in the IBM Director suite for Microsoft Windows is vulnerable to a remote denial of service attack. The vulnerability allows an attacker to crash the service remotely. It will not be possible to reach the IBM Director agent until the service is manually restarted. Vulnerability details: --------------- CIM server crashes on receiving requests that contain overlong consumer names. The error condition does not allow for the redirection of program flow. M-POST /CIMListener/[Ax512] HTTP/1.1 CIMOperation: MethodCall CIMExport: MethodRequest CIMExportMethod: ExportIndication [some xml] Fix: --------------- The vendor has adressed this vulnerability in service update 2 for IBM Director agent 5.20.3. Download link: https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8 vendor status: --------------- vendor notified: 2008-11-03 patch available: 2009-03-09 -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH Office Vienna Mooslackengasse 17 A-1190 Vienna Austria Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com www.sec-consult.com # EOF Bernhard Mueller, SEC Consult Vulnerability Lab / @2009 # milw0rm.com [2009-03-10]

Products Mentioned

Configuraton 0

Ibm>>Director >> Version To (including) 5.20.3

    Ibm>>Director >> Version 3.1.1

      Ibm>>Director >> Version 4.10

        Ibm>>Director >> Version 4.11

          Ibm>>Director >> Version 4.12

            Ibm>>Director >> Version 4.20

              Ibm>>Director >> Version 4.21

                Ibm>>Director >> Version 4.22

                  Ibm>>Director >> Version 5.10.0

                    Ibm>>Director >> Version 5.10.1

                      Ibm>>Director >> Version 5.10.2

                        Ibm>>Director >> Version 5.10.3

                        Ibm>>Director >> Version 5.20.0

                          Ibm>>Director >> Version 5.20.1

                          Ibm>>Director >> Version 5.20.2

                            Microsoft>>Windows >> Version *

                            References

                            http://www.vupen.com/english/advisories/2009/0656
                            Tags : vdb-entry, x_refsource_VUPEN
                            http://osvdb.org/52615
                            Tags : vdb-entry, x_refsource_OSVDB
                            http://secunia.com/advisories/34212
                            Tags : third-party-advisory, x_refsource_SECUNIA
                            http://securitytracker.com/id?1021825
                            Tags : vdb-entry, x_refsource_SECTRACK
                            http://www.securityfocus.com/bid/34061
                            Tags : vdb-entry, x_refsource_BID
                            https://www.exploit-db.com/exploits/8190
                            Tags : exploit, x_refsource_EXPLOIT-DB
                            Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.