Otkrivena je nova sigurnosna ranjivost paketa HP Business Service Management koja zlonamjernim korisnicima omogućuje pristup ranjivom sustavu s povećanim privilegijama i pokretanje proizvoljnog programskog koda.
Paket:
HP Business Service Management 9.x
Operacijski sustavi:
Microsoft Windows XP, Microsoft Windows Server 2003, Microsoft Windows Vista, Microsoft Windows Server 2008, Microsoft Windows 7
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
lokalno/udaljeno
Posljedica:
neovlašteni pristup sustavu, proizvoljno izvršavanje programskog koda, zaobilaženje postavljenih ograničenja
Rješenje:
zaobilazno rješenje (workaround)
CVE:
CVE-2012-2561
Izvorni ID preporuke:
SA49218
Izvor:
Secunia
Problem:
Ranjivost je uzrokovana nepravilnim ograničavanjem pristupa određenim priključcima što se može iskoristiti za učitavanje zlonamjernih datoteka.
Posljedica:
Zlonamjerni korisnik bi mogao iskoristiti propust za stjecanje viših privilegija, neovlašten pristup te izvršavanje zlonamjernog programskog koda.
Rješenje:
Svim se korisnicima savjetuje primjena zaobilaznih rješenja.
HP Business Service Management WAR Deployment Code Execution Vulnerability
Secunia Advisory SA49218
Release Date 2012-05-17
Criticality level Moderately criticalModerately critical
Impact System access
Where From local network
Authentication level Available in Customer Area
Report reliability Available in Customer Area
Solution Status Unpatched
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia VIM
Software:
HP Business Service Management 9.x
Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2012-2561 CVSS available in Customer Area
Description
A vulnerability has been reported in HP Business Service Management, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to the application not restricting access to certain ports and can be exploited to upload and deploy war files with specially crafted requests sent to TCP ports 1098, 1099, or 4444.
Successful exploitation may allow execution of arbitrary code but requires a default configuration.
The vulnerability is reported in version 9.12. Other versions may also be affected.
Solution
Restrict access to the affected service to trusted hosts only.
Provided and/or discovered by
US-CERT credits David Elze, Daimler TSS.
Original Advisory
http://www.kb.cert.org/vuls/id/859230
Posljednje sigurnosne preporuke