Advisory Details

May 31st, 2011

(0Day) HP 3COM/H3C Intelligent Management Center img recv Remote Code Execution Vulnerability

ZDI-11-170
ZDI-CAN-1019

CVE ID
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Hewlett-Packard
AFFECTED PRODUCTS H3C Intelligent Management Center
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10908']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3COM/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.

The flaw exists within the img.exe component which listens by default on TCP port 8800. When handling the a packet type the process uses a user provided length value in an arithmetic operation resulting in integer wrapping. The process then copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

ADDITIONAL DETAILS

[May 31, 2011] - This vulnerability is being disclosed publicly
without a patch in accordance with the ZDI 180 day deadline.

-- Mitigation:
As the affected component is the 'core' process for IMC, we recommend either disabling this service entirely until a vendor patch is available or denying incoming connections to 8800/tcp, this is the remote vector into the vulnerable code.


DISCLOSURE TIMELINE
  • 2010-12-01 - Vulnerability reported to vendor
  • 2011-05-31 - Coordinated public release of advisory
CREDIT Luigi Auriemma
BACK TO ADVISORIES