CVE-2009-0879 : Détail

CVE-2009-0879

A03-Injection
31.75%V3
Network
2009-03-12
14h00 +00:00
2018-10-10
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to cause a denial of service (daemon crash) via a long consumer name, as demonstrated by an M-POST request to a long /CIMListener/ URI.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 8190

Date de publication : 2009-03-09 23h00 +00:00
Auteur : Bernhard Mueller
EDB Vérifié : Yes

SEC-CONSULT Security Advisory < 20090305-1 > ========================================================================================= title: IBM Director CIM Server Remote Denial of Service Vulnerability program: IBM Director for Windows vulnerable version: <= 5.20.3 Service Update 2 homepage: http://www-03.ibm.com/systems/management/director/ found: Sept. 2008 by: Bernhard Mueller / SEC Consult Vulnerability Lab permanent link: http://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt ========================================================================================= Product description: --------------- IBM Director is an application that can track and view system configurations of remote computers. It is available for Linux, AIX, and Windows servers. Vulnerability overview: ---------------- The CIM server contained in the IBM Director suite for Microsoft Windows is vulnerable to a remote denial of service attack. The vulnerability allows an attacker to crash the service remotely. It will not be possible to reach the IBM Director agent until the service is manually restarted. Vulnerability details: --------------- CIM server crashes on receiving requests that contain overlong consumer names. The error condition does not allow for the redirection of program flow. M-POST /CIMListener/[Ax512] HTTP/1.1 CIMOperation: MethodCall CIMExport: MethodRequest CIMExportMethod: ExportIndication [some xml] Fix: --------------- The vendor has adressed this vulnerability in service update 2 for IBM Director agent 5.20.3. Download link: https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8 vendor status: --------------- vendor notified: 2008-11-03 patch available: 2009-03-09 -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH Office Vienna Mooslackengasse 17 A-1190 Vienna Austria Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com www.sec-consult.com # EOF Bernhard Mueller, SEC Consult Vulnerability Lab / @2009 # milw0rm.com [2009-03-10]

Products Mentioned

Configuraton 0

Ibm>>Director >> Version To (including) 5.20.3

    Ibm>>Director >> Version 3.1.1

      Ibm>>Director >> Version 4.10

        Ibm>>Director >> Version 4.11

          Ibm>>Director >> Version 4.12

            Ibm>>Director >> Version 4.20

              Ibm>>Director >> Version 4.21

                Ibm>>Director >> Version 4.22

                  Ibm>>Director >> Version 5.10.0

                    Ibm>>Director >> Version 5.10.1

                      Ibm>>Director >> Version 5.10.2

                        Ibm>>Director >> Version 5.10.3

                        Ibm>>Director >> Version 5.20.0

                          Ibm>>Director >> Version 5.20.1

                          Ibm>>Director >> Version 5.20.2

                            Microsoft>>Windows >> Version *

                            Références

                            http://www.vupen.com/english/advisories/2009/0656
                            Tags : vdb-entry, x_refsource_VUPEN
                            http://osvdb.org/52615
                            Tags : vdb-entry, x_refsource_OSVDB
                            http://secunia.com/advisories/34212
                            Tags : third-party-advisory, x_refsource_SECUNIA
                            http://securitytracker.com/id?1021825
                            Tags : vdb-entry, x_refsource_SECTRACK
                            http://www.securityfocus.com/bid/34061
                            Tags : vdb-entry, x_refsource_BID
                            https://www.exploit-db.com/exploits/8190
                            Tags : exploit, x_refsource_EXPLOIT-DB