Vulnerability Note VU#895524

HP System Management Homepage vulnerable to a denial-of-service condition

Original Release date: 24 Sep 2013 | Last revised: 24 Sep 2013

Overview

HP System Management Homepage 7.2.0.14 and possibly earlier versions contain a denial-of-service vulnerability (CWE-121).

Description

CWE-121: Stack-based Buffer Overflow

HP System Management Homepage 7.2.0.14 contains a denial-of-service vulnerability. The remote attacker may send the listener service a malformed request using the iprange parameter in /proxy/DataValidation. One of the listener child processes will then crash with that request value, overwriting EIP and corrupting the stack, resulting in a denial-of-service condition.

Impact

A remote attacker may be able to cause a denial-of-service condition against the HP System Management Homepage software.

Solution

HP has made System Management Homepage (SMH) v7.2.1 available for Windows and Linux to resolve the vulnerabilities. In the event that updating is not possible, the following workaround is also available.

Limit Access
Anonymous access is required for this attack to take place. Disabling this feature via the administration page will render the attacker unable to send this request without having proper authentication credentials.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Hewlett-Packard CompanyAffected28 Jun 201320 Sep 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 5.6 AV:N/AC:H/Au:S/C:N/I:P/A:C
Temporal 4.4 E:POC/RL:OF/RC:C
Environmental 3.3 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to the reporter that wishes to remain anonymous.

This document was written by Adam Rauf.

Other Information

  • CVE IDs: CVE-2013-4821
  • Date Public: 18 Sep 2013
  • Date First Published: 24 Sep 2013
  • Date Last Updated: 24 Sep 2013
  • Document Revision: 13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.