[NT] IBM Tivoli Provisioning Manager for OS Deployment Multiple Stack Overflow Vulnerabilities
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 7 May 2007 12:40:22 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
IBM Tivoli Provisioning Manager for OS Deployment Multiple Stack Overflow
Tivoli Provisioning Manager for OS Deployment "provides an easy-to-use
console for remote deployment and management of operating systems. It
includes flexible alternatives for creating and managing operating system
cloned or scripted image installs. Tivoli Provisioning Manager for OS
Deployment can help significantly reduce the number of images required
across your environment and the effort required to manage those images".
A vulnerability allows remote attackers to execute arbitrary code on
systems with vulnerable installations of IBM Tivoli Provisioning Manager
for OS Deployment. Authentication is not required to exploit this
The specific flaws exist in the handling of HTTP requests to the rembo.exe
service listening on TCP port 8080. Several components of an HTTP request
can be modified to trigger buffer overflows. For example, by supplying an
overly long filename an attacker is able to overflow a 150 byte stack
buffer and subsequently execute arbitrary code. The overflow occurs during
a string copy loop, shown here:
00431136 lea edi, [ebp+var_3C4] ; 150 byte stack buffer
00431148 mov al, [edx] ; edx -> our data
0043114A add edx, 1
0043114D mov [edi], al ; edi -> stack buffer
0043114F add edi, 1
00431152 test al, al
00431154 jnz short stringcopy
The Host and Authorization fields are also vulnerable to similar
IBM has issued an update to correct this vulnerability. More details can
be found at: <http://www-1.ibm.com/support/docview.wss?uid=swg24015664>
2006.12.18 - Vulnerability reported to vendor
2007.05.02 - Coordinated public release of advisory
The information has been provided by <mailto:TSRT@xxxxxxxx> Aaron
Portnoy, TippingPoint Security Research Team.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] Multiple Vendors ZOO File Decompression Infinite Loop DoS
- Next by Date: [NEWS] LiveData Protocol Server Heap Overflow Vulnerability
- Previous by thread: [NEWS] Multiple Vendors ZOO File Decompression Infinite Loop DoS
- Next by thread: [NEWS] LiveData Protocol Server Heap Overflow Vulnerability