U radu programskog paketa HP PKI ActiveX Control (HPPKI.ocx) uočen je sigurnosni propust koji udaljenom napadaču omogućuje izvođenje napada uskraćivanjem usluge.
Paket:
HP PKI ActiveX Control (HPPKI.ocx) 1.x
Operacijski sustavi:
HP-UX 10.x, HP-UX 11.x
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
Izvorni ID preporuke:
SA47122
Izvor:
Secunia
Problem:
Propust nastaje jer metoda "KillProcess()" omogućuje prekidanje proizvoljnih korisnički pokrenutih procesa upisivanjem djelomičnog ili cijelog naziva procesa kao argumenta.
Posljedica:
Napadač ga može iskoristiti za izvođenje DoS (eng. Denial of Service) napada.
Rješenje:
Korisnicima se savjetuje instalacija odgovarajuće nadogradnje.
HP PKI ActiveX Control Arbitrary Process Termination Weakness
Secunia Advisory SA47122
Release Date 2012-01-10
Criticality level Not criticalNot critical
Impact DoS
Where From remote
Authentication level Available in Customer Area
Report reliability Available in Customer Area
Solution Status Vendor Patch
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia CSI, Secunia PSI
Automated scanning Secunia CSI, Secunia PSI
Software:
HP PKI ActiveX Control (HPPKI.ocx) 1.x
Secunia CVSS Score Available in Customer Area
CVE Reference(s) No CVE references.
Description
Parvez Anwar has discovered a weakness in HP PKI ActiveX control, which can be exploited by malicious people to cause a DoS (Denial of Service).
The weakness is caused due to the insecure "KillProcess()" method allowing arbitrary running user processes to be terminated by supplying the partial or full name of the process as argument. This can be exploited to terminate a specific process by supplying its name or alternatively all processes matching a supplied character or string in their name (e.g. "exe" or ".").
The weakness is confirmed in version 1.1.0.6. Other versions may also be affected.
Solution
Update to version 1.2.0.1.
Provided and/or discovered by
Parvez Anwar via Secunia
Alternate/detailed remediation
Further details available in Customer Area
Posljednje sigurnosne preporuke