Vulnerability Note VU#512193

IBM Director fails to properly time-out connection requests from clients

Original Release date: 20 Nov 2007 | Last revised: 20 Nov 2007

Overview

IBM Director Systems, specifically CIM Server, contains a denial-of-service vulnerability that can allow a remote, unauthenticated attacker to render Director inoperative.

Description

IBM Director is a suite of system management tools.

When a rogue connection request is made to IBM Director Systems, specifically the CIM Server, a thread is created that listens on a port, waiting for a specific response from the client. If the client does not send the expected response, the thread remains in memory listening, indicating a high CPU utilization until the client connects to it. If multiple rogue clients connect simultaneously, the finite number of connections can be exhausted causing server to crash.

Versions 5.20.1 and earlier for Windows and Linux are affected.

Impact

IBM Director Systems will become inaccessible for management.

Solution

Apply an update

Download and Apply the patch for Windows and Linux systems here:
https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dmp


Block or restrict access

Employ other protection mechanisms that will restrict access to the Director Systems by installing firewalls, defining filters, or by using reverse proxies.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
IBM eServerAffected15 Nov 200720 Nov 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to IBM for reporting this vulnerability, who in turn credit Juniper Networks.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-5612
  • Date Public: 20 Nov 2007
  • Date First Published: 20 Nov 2007
  • Date Last Updated: 20 Nov 2007
  • Severity Metric: 0.91
  • Document Revision: 5

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.