IBM Director CIM Server Remote Denial of Service Vulnerability

2009.03.13
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

SEC-CONSULT Security Advisory < 20090305-1 > ========================================================================================= title: IBM Director CIM Server Remote Denial of Service Vulnerability program: IBM Director for Windows vulnerable version: <= 5.20.3 Service Update 2 homepage: http://www-03.ibm.com/systems/management/director/ found: Sept. 2008 by: Bernhard Mueller / SEC Consult Vulnerability Lab permanent link: http://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt ========================================================================================= Product description: --------------- IBM Director is an application that can track and view system configurations of remote computers. It is available for Linux, AIX, and Windows servers. Vulnerability overview: ---------------- The CIM server contained in the IBM Director suite for Microsoft Windows is vulnerable to a remote denial of service attack. The vulnerability allows an attacker to crash the service remotely. It will not be possible to reach the IBM Director agent until the service is manually restarted. Vulnerability details: --------------- CIM server crashes on receiving requests that contain overlong consumer names. The error condition does not allow for the redirection of program flow. M-POST /CIMListener/[Ax512] HTTP/1.1 CIMOperation: MethodCall CIMExport: MethodRequest CIMExportMethod: ExportIndication [some xml] Fix: --------------- The vendor has adressed this vulnerability in service update 2 for IBM Director agent 5.20.3. Download link: https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8 vendor status: --------------- vendor notified: 2008-11-03 patch available: 2009-03-09

References:

http://seclists.org/fulldisclosure/2009/Mar/0179.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top