Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according to Secunia.
1. An input validation error in img.exe when processing certain packet fields can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 8800.
2. An error in tftpserver.exe when processing Write Request (WRQ) packets can be exploited to upload arbitrary files.
3. A boundary error in dbman.exe when creating a log message to be stored in "dbman_debug.log" file can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to UDP port 2810.
4. A boundary error in tftpserver.exe when processing the TFTP Mode field can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to UDP port 69.
5. A boundary error in tftpserver.exe when processing TFTP DATA (opcode 0x03) and ERROR (opcode 0x05) packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to UDP port 69.
6. An indexing error in tftpserver.exe when accessing a table of function pointers using the TFTP Opcode field can be exploited to transfer program flow to an arbitrary memory location.
7. A use-after-free error in imcsyslogdm.exe when handling an error can be exploited via an overly long syslog packet (greater than 2048 bytes) sent to UDP port 514.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
The vulnerabilities are reported in versions PLAT 5.0 (E0101) and PLAT 5.0 (E0101L01).
1. An input validation error in img.exe when processing certain packet fields can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 8800.
2. An error in tftpserver.exe when processing Write Request (WRQ) packets can be exploited to upload arbitrary files.
3. A boundary error in dbman.exe when creating a log message to be stored in "dbman_debug.log" file can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to UDP port 2810.
4. A boundary error in tftpserver.exe when processing the TFTP Mode field can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to UDP port 69.
5. A boundary error in tftpserver.exe when processing TFTP DATA (opcode 0x03) and ERROR (opcode 0x05) packets can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to UDP port 69.
6. An indexing error in tftpserver.exe when accessing a table of function pointers using the TFTP Opcode field can be exploited to transfer program flow to an arbitrary memory location.
7. A use-after-free error in imcsyslogdm.exe when handling an error can be exploited via an overly long syslog packet (greater than 2048 bytes) sent to UDP port 514.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
The vulnerabilities are reported in versions PLAT 5.0 (E0101) and PLAT 5.0 (E0101L01).
No comments:
Post a Comment