Lucene search

K
saintSAINT CorporationSAINT:45ACCD6132D6A4F0934596C1A76CF66A
HistorySep 09, 2013 - 12:00 a.m.

HP System Management Homepage iprange Parameter Stack Buffer Overflow

2013-09-0900:00:00
SAINT Corporation
download.saintcorporation.com
12

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.363 Low

EPSS

Percentile

97.1%

Added: 09/09/2013
CVE: CVE-2013-2362
BID: 61337
OSVDB: 95489

Background

HP System Management Homepage (SMH) is a web-based interface that consolidates the management of ProLiant and Integrity servers.

Problem

A stack buffer overflow vulnerability in HP SMH allows command execution when an attacker requests **/proxy/DataValidation** with an overly long **iprange** parameter. A remote unauthenticated attacker could exploit this vulnerability to run arbitrary code on the vulnerable target as the SYSTEM user.

Resolution

Upgrade to HP System Management Homepage version 7.2.1 or higher.

References

<http://www.zerodayinitiative.com/advisories/ZDI-13-204/&gt;
[http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&amp;cc=us&amp;objectID=c03839862 ](<http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c03839862
>)

Limitations

Exploit works on HP System Management Homepage 7.2.0-14 on Windows Server 2003 SP2 English (DEP OptOut).

This exploit requires the IO-Socket-SSL Perl module.

Platforms

Windows

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.363 Low

EPSS

Percentile

97.1%

Related for SAINT:45ACCD6132D6A4F0934596C1A76CF66A