Hi All,

Multiple vulnerabilities have been reported in HP Intelligent Management
Center (IMC), which can be exploited by malicious people to compromise a
vulnerable system, according to Secunia.

1. An input validation error in img.exe when processing certain packet
fields can be exploited to cause a stack-based buffer overflow via a
specially crafted packet sent to TCP port 8800.

2. An error in tftpserver.exe when processing Write Request (WRQ) packets
can be exploited to upload arbitrary files.

3. A boundary error in dbman.exe when creating a log message to be stored in
"dbman_debug.log" file can be exploited to cause a stack-based buffer
overflow via a specially crafted packet sent to UDP port 2810.

4. A boundary error in tftpserver.exe when processing the TFTP Mode field
can be exploited to cause a stack-based buffer overflow via a specially
crafted packet sent to UDP port 69.

5. A boundary error in tftpserver.exe when processing TFTP DATA (opcode
0x03) and ERROR (opcode 0x05) packets can be exploited to cause a
stack-based buffer overflow via a specially crafted packet sent to UDP port
69.

6. An indexing error in tftpserver.exe when accessing a table of function
pointers using the TFTP Opcode field can be exploited to transfer program
flow to an arbitrary memory location.

7. A use-after-free error in imcsyslogdm.exe when handling an error can be
exploited via an overly long syslog packet (greater than 2048 bytes) sent to
UDP port 514.

Successful exploitation of the vulnerabilities may allow execution of
arbitrary code.

The vulnerabilities are reported in versions PLAT 5.0 (E0101) and PLAT 5.0
(E0101L01).




Regards,
Amardeep Thakur,

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to