TippingPoint Zero Day Initiative

(0day) HP 3COM/H3C Intelligent Management Center img recv Remote Code Execution Vulnerability

ZDI-11-170: May 31st, 2011

CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10908. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3COM/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.

The flaw exists within the img.exe component which listens by default on TCP port 8800. When handling the a packet type the process uses a user provided length value in an arithmetic operation resulting in integer wrapping. The process then copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

Vendor Response

Hewlett-Packard states:

[May 31, 2011] - This vulnerability is being disclosed publicly
without a patch in accordance with the ZDI 180 day deadline.

-- Mitigation:
As the affected component is the 'core' process for IMC, we recommend either disabling this service entirely until a vendor patch is available or denying incoming connections to 8800/tcp, this is the remote vector into the vulnerable code.

Disclosure Timeline

    2010-12-01 - Vulnerability reported to vendor
    2011-05-31 - Coordinated public release of advisory


This vulnerability was discovered by:
    Luigi Auriemma