Lucene search

K
saintSAINT CorporationSAINT:B1B750277D00BF4DD528D6A87273D27A
HistoryOct 11, 2011 - 12:00 a.m.

NetSupport Client Handshake Hostname Overflow

2011-10-1100:00:00
SAINT Corporation
my.saintcorporation.com
18

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.939

Percentile

99.2%

Added: 10/11/2011
CVE: CVE-2011-0404
BID: 45728
OSVDB: 70408

Background

NetSupport Manager is a remote desktop support solution.

Problem

The NetSupport client/server communication is carried out over a proprietary communications protocol. This protocol begins with a handshake between the client and server. The handshake contains a hostname, which is not properly validated. In NetSupport client version 11.0 and prior, a stack-based buffer overflow condition exists due to this lack of validation. An attack may exploit this vulnerability to compromise any workstation running a vulnerable version of the NetSupport client.

Resolution

No vendor upgrades are available as of this exploit’s release data. Disabling NetSupport until a patch is made available should be considered. Seeking an alternative solution may also be beneficial.

References

<http://archives.neohapsis.com/archives/fulldisclosure/2011-01/0090.html&gt;

Limitations

This exploit has been tested against NetSupport Manager 11.00 on Red Hat Enterprise Linux Server 5.3.

Platforms

Linux

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.939

Percentile

99.2%