Advisory Details

June 6th, 2012

HP DataDirect OpenAccess GIOP Opcode 0x0E Remote Code Execution Vulnerability

ZDI-12-088
ZDI-CAN-1213

CVE ID CVE-2011-4163
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Hewlett-Packard
DataDirect
AFFECTED PRODUCTS Database Archiving
SequeLink
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['12362']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP DataDirect SequeLink. Authentication is not required to exploit this vulnerability.

The specific flaw exists within how the application parses a packet that is received. When parsing a field in this packet, the application will use a signed length to copy data into a statically sized buffer located on the stack. This can lead to a buffer overflow on the stack and allow for code execution under the context of the service.

ADDITIONAL DETAILS Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03128302
DataDirect has issued an update to correct this vulnerability. More details can be found at:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03128302
DISCLOSURE TIMELINE
  • 2011-06-01 - Vulnerability reported to vendor
  • 2012-06-06 - Coordinated public release of advisory
CREDIT AbdulAziz Hariri
BACK TO ADVISORIES