Lucene search

K
saintSAINT CorporationSAINT:7E32853DFFA6567B56E222967EED5D65
HistoryOct 17, 2008 - 12:00 a.m.

Openwsman HTTP Basic Authentication buffer overflow

2008-10-1700:00:00
SAINT Corporation
download.saintcorporation.com
25

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.176

Percentile

96.2%

Added: 10/17/2008
CVE: CVE-2008-2234
BID: 30694
OSVDB: 47534

Background

Openwsman is an open-source implementation of the Web Services Management specification.

Problem

A buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending a specially crafted HTTP Basic Authentication header.

Resolution

Upgrade to Openwsman 2.1.0 or higher, or install a fixed package from your Linux vendor.

References

<http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html&gt;

Limitations

Exploit works on Openwsman 2.0.0 on Red Hat Enterprise Linux 4 Update 4.

In order for the exploit to succeed, Openwsman must be running in debug mode (openwsmand -d) with code execution on the stack enabled (execstack -s openwsmand).

Platforms

Linux

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.176

Percentile

96.2%