0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
IBM Director <= 5.20.3su2 CIM Server Remote DoS Vulnerability
============================================================= IBM Director <= 5.20.3su2 CIM Server Remote DoS Vulnerability ============================================================= SEC-CONSULT Security Advisory < 20090305-1 > ========================================================================================= title: IBM Director CIM Server Remote Denial of Service Vulnerability program: IBM Director for Windows vulnerable version: <= 5.20.3 Service Update 2 ========================================================================================= Product description: --------------- IBM Director is an application that can track and view system configurations of remote computers. It is available for Linux, AIX, and Windows servers. Vulnerability overview: ---------------- The CIM server contained in the IBM Director suite for Microsoft Windows is vulnerable to a remote denial of service attack. The vulnerability allows an attacker to crash the service remotely. It will not be possible to reach the IBM Director agent until the service is manually restarted. Vulnerability details: --------------- CIM server crashes on receiving requests that contain overlong consumer names. The error condition does not allow for the redirection of program flow. M-POST /CIMListener/[Ax512] HTTP/1.1 CIMOperation: MethodCall CIMExport: MethodRequest CIMExportMethod: ExportIndication [some xml] Fix: --------------- The vendor has adressed this vulnerability in service update 2 for IBM Director agent 5.20.3. vendor status: --------------- vendor notified: 2008-11-03 patch available: 2009-03-09 -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH Office Vienna Mooslackengasse 17 A-1190 Vienna Austria # EOF Bernhard Mueller, SEC Consult Vulnerability Lab / @2009 # 0day.today [2024-09-28] #