Advisory Details

July 20th, 2017

AlienVault Unified Security Management nfcapd Process_ipfix_template_withdraw Heap-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-492
ZDI-CAN-4416

CVE ID
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS AlienVault
AFFECTED PRODUCTS Unified Security Management
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability.

The specific flaw exists within nfcapd's Process_ipfix_template_withdraw function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of root.

ADDITIONAL DETAILS AlienVault has issued an update to correct this vulnerability. More details can be found at:
https://www.alienvault.com/forums/discussion/8325/
DISCLOSURE TIMELINE
  • 2017-01-10 - Vulnerability reported to vendor
  • 2017-07-20 - Coordinated public release of advisory
  • 2018-02-09 - Advisory Updated
CREDIT 62600BCA031B9EB5CB4A74ADDDD6771E
BACK TO ADVISORIES