Advisory Details

August 1st, 2014

AlienVault OSSIM backup Command Remote Code Execution Vulnerability

ZDI-14-272
ZDI-CAN-2182

CVE ID CVE-2014-5158
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS AlienVault
AFFECTED PRODUCTS OSSIM
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13731']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault OSSIM. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the ossim-framework service. The issue lies in the handling of the backup command due to a failure to safely sanitize user data before executing a command. An attacker could leverage this vulnerability to execute code with root privileges.

ADDITIONAL DETAILS AlienVault has issued an update to correct this vulnerability. More details can be found at:
http://forums.alienvault.com/discussion/2559/security-advisory-multiple-vulnerabilities
DISCLOSURE TIMELINE
  • 2014-03-06 - Vulnerability reported to vendor
  • 2014-08-01 - Coordinated public release of advisory
CREDIT grimmlin
BACK TO ADVISORIES