(0day) HP 3COM/H3C Intelligent Management Center img recv Remote Code Execution VulnerabilityZDI-11-170: May 31st, 2011
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10908. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3COM/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.
The flaw exists within the img.exe component which listens by default on TCP port 8800. When handling the a packet type the process uses a user provided length value in an arithmetic operation resulting in integer wrapping. The process then copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
Vendor ResponseHewlett-Packard states:
[May 31, 2011] - This vulnerability is being disclosed publicly
without a patch in accordance with the ZDI 180 day deadline.
As the affected component is the 'core' process for IMC, we recommend either disabling this service entirely until a vendor patch is available or denying incoming connections to 8800/tcp, this is the remote vector into the vulnerable code.
2010-12-01 - Vulnerability reported to vendor
2011-05-31 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: