Lucene search

K
saintSAINT CorporationSAINT:BAF26C6C50AC100AC39E7789DBC63008
HistoryAug 20, 2013 - 12:00 a.m.

HP LeftHand Virtual SAN Appliance Hydra Service Login Buffer Overflow

2013-08-2000:00:00
SAINT Corporation
my.saintcorporation.com
22

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.787 High

EPSS

Percentile

98.3%

Added: 08/20/2013
CVE: CVE-2013-2343
BID: 60884
OSVDB: 94701

Background

HP LeftHand Virtual SAN Appliance (VSA) software is a VMware certified SAN/storage device and virtual appliance that provides complete SAN functionality for VMware Infrastructure without external SAN hardware.

Problem

HP LeftHand Virtual SAN Appliance software prior to version 10.0 is vulnerable to stack buffer overflow as a result of failure to perform adequate boundary checks on user-supplied input. The vulnerability is in the **LHNSessionManager** component of the hydra service, which listens on TCP port 13838. When a user attempts to log in, the process fails to properly verify the length of the username parameter before copying it to a limited size buffer. A remote unauthenticated attacker could exploit this vulnerability to execute arbitrary code as the root user.

Resolution

Upgrade HP LeftHand Virtual SAN Appliance software to version 10.0 or newer.

References

<http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03661318&gt;
<http://www.zerodayinitiative.com/advisories/ZDI-13-179/&gt;

Limitations

This exploit was tested against HP LeftHand Virtual SAN Appliance 9.0 on CentOS 5.4.

Platforms

Linux

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.787 High

EPSS

Percentile

98.3%

Related for SAINT:BAF26C6C50AC100AC39E7789DBC63008