Vulnerability Note VU#150326
Internet Security Systems' BlackICE and RealSecure contain a heap overflow in the processing of SMB packets
Internet Security Systems' BlackICE and RealSecure intrusion detection products contain a remotely exploitable vulnerability. Exploitation of this vulnerability could lead to the compromise of the system with privileges of the vulnerable process, typically the "SYSTEM" user.
Internet Security Systems (ISS) has two lines of intrusion detection and prevention products, BlackICE and RealSecure. A heap overflow vulnerability has been discovered in the code that processes Server Message Block (SMB) packets. Since all packets are processed by these products, this vulnerability can be exploited even when the utilities are set to their most restrictive settings. When these products receive an SMB packet, the packet is disassembled, processed and reassembled. The vulnerability occurs in the code that reassembles the SMB packet.
eEye Digital Security has released an advisory and according to their advisory, this vulnerability can be remotely exploited via a single crafted SMB packet.
ISS has also released an advisory about this issue, available at http://xforce.iss.net/xforce/alerts/id/165. Quoting from the ISS advisory:
We encourage you to apply these updates as soon as practical.
Exploitation of this vulnerability could lead to the execution of arbitrary code on the system with privileges of the vulnerable process, typically the "SYSTEM" user on the windows platform.
This vulnerability has been fixed in both the BlackICE and RealSecure releases.
Until a patch can be applied, blocking SMB traffic at your network perimeter may mitigate the risk this vulnerability presents. this may or may not be practical based on network configuration and requirements.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Internet Security Systems Inc.||Affected||-||26 Feb 2004|
CVSS Metrics (Learn More)
Thanks to eEye Digital Security for reporting this vulnerability.
This document was written by Jason A Rafail and Shawn Hernan based on information supplied by ISS and Eeye.
- CVE IDs: Unknown
- Date Public: 13 Feb 2004
- Date First Published: 26 Feb 2004
- Date Last Updated: 27 Feb 2004
- Severity Metric: 12.12
- Document Revision: 24
If you have feedback, comments, or additional information about this vulnerability, please send us email.