Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] HPE Intelligent Management Center Stack Buffer Overflow

Critical

Synopsis

Tenable discovered a stack buffer overflow vulnerability in HPE Intelligent Management Center's dbman.exe process. The dbman.exe process listens on TCP port 2810 and runs with SYSTEM privileges. The vulnerability can be triggered by an unauthenticated remote attacker, and the overflow is considered to be exploitable.

The vulnerability exists within the processing of RemoteDiskDirReqContent ASN.1 messages. The overflow occurs when the curDir field is populated with an exceptionally long string value (e.g. 2700 “A” characters). The following snippet from our proof of concept illustrates this:

msg = DbmanMsg()
msg['flag'] = 1
msg['curDir'] = "A"*2700

encodedMsg = encoder.encode(msg, defMode=True)
msgLen = len(encodedMsg)
values = (opcode, msgLen, encodedMsg)
s = struct.Struct("<ii%ds" % msgLen)
packed_data = s.pack(*values)

sock.send(packed_data)
sock.close()

Solution

See HPE's bulletin.

Disclosure Timeline

06-11-2018 - Tenable sends a write up and proof of concept to HPE. 90 day deadline set to September 10.
06-11-2018 - HPE assigns PSRT110724.
08-02-2018 - Tenable asks for a bug fix timeline.
08-09-2018 - Tenable reiterates timeline question.
08-10-2018 - HPE says "we have evaluated all of these vulnerabilities and are working on the schedule estimate," and as soon as they have something to communicate, they will share it.
09-04-2018 - Tenable follows up to ask if HPE will make the 90-day deadline and reminds HPE about the extension clause in Tenable's disclosure policy.
09-07-2018 - HPE says patch date is late November.
09-09-2018 - Tenable reminds HPE that date is outside of the disclosure window.
09-10-2018 - Tenable releases an advisory.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2018-7115
Tenable Advisory ID: TRA-2018-24
Credit:
Chris Lyne
CVSSv2 Base / Temporal Score:
10.0 / 8.5
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
Nessus Plugin ID: 119501
Affected Products:
HPE Intelligent Management Center (iMC) PLAT 7.3 E0605
Risk Factor:
Critical
Additional Keywords:
PSRT110724

Advisory Timeline

09-10-2018 - [R1] Initial Release
01-03-2018 - [R2] Added Solution Information