what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DDI1012.txt

DDI1012.txt
Posted Apr 1, 2003
Authored by Digital Defense Inc. | Site digitaldefense.net

Digital Defense Inc. Security Advisory DDI-1012 - A malformed request used against HP Instant TopTools versions below 5.55 can cause a denial of service against a host by having it constantly it request itself.

tags | exploit, denial of service
SHA-256 | 7627cee904465d331ce5d25d50952fed0120096c80e38c11d338158b858a94ff

DDI1012.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


- ----------------------------------------------------------------------------
Digital Defense Inc. Security Advisory DDI-1012 labs@digitaldefense.net
http://www.digitaldefense.net/
- ----------------------------------------------------------------------------

Synopsis : Malformed request causes denial of service in HP Instant TopTools
Package : HP Instant TopTools
Type : Denial of service
Issue date : 03-31-2003
Versions Affected : < 5.55
CVE Id : CAN-2003-0169

- ----------------------------------------------------------------------------


o Product description:
HP Instant TopTools is an easy to install software application that enables you to
remotely view a NetServers' current state and easily access NetServer information to
assist in troubleshooting. Currently supported on all IPMI NetServers running
Microsoft NT/2000.


o Problem description:
When the Instant TopTools software is installed, you can easily cause a denial of
service that effectively brings the entire system to a halt. When you request a
file from the GoAhead-Webs webserver running on tcp port 280, you will notice it
doesn't directly serve any files. Most files are requested by a middle-man application
called hpnst.exe. For instance, if you want to get SrvSystemInfo.html, you request
this:

/cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html

You can easily cause a denial of service against the host by having hpnst.exe
request itself. If you request this 30-40 times, the system will
become extremely unstable. The application will continue to loop and call
itself even once your request has timed out. The only way to fix the loop is
to kill hpnst.exe in your task manager, or reboot. It is possible to kill
the process if only a single request has been made. However, the system is not
usable after several have been made. The exact amount of requests needed
would greatly depend on the individual system's profile. The actual requested
resource was:

/cgi-bin/hpnst.exe?c=p+i=hpnst.exe

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2003-0169 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.


o Testing Environment:
These tests were done against an HP NetServer LP 1000r.The underlying operating
system on the host was Windows 2000 Build 2195, SP3. Instant TopTools version
5.04 build 4.


o Solutions and Workarounds:
Upgrading to the current version of HP TopTools is the best method for
fixing this vulnerability. You can get version 5.55 for Windows Server
2003, Windows 2000, and Windows NT4 from:
http://h20004.www2.hp.com/soar_rnotes/bsdmatrix/matrix50459en_US.html#Utility%20-%20HP%20Instant%20Toptools

As a temporary workaround, disabling the HP TopTools software on each
host would be an effective method of bypassing this threat. If this
service is available to the Internet, it is highly recommended that
you filter tcp port 280 inbound to this host, not only to protect against
this vulnerability, but also due to the designed capabilities of this
software.


o Revision History:
03-31-2003 Initial public release


o Vendor Contact Information:
02-17-2003 security-alert@hp.com notified
02-18-2003 Response from HP SOFTWARE SECURITY RESPONSE TEAM
03-27-2003 Vendor notified Digital Defense that a fix is available
03-28-2003 Vendor and DDI confirm information, and plan release
03-31-2003 Initial public release


o Thanks to:
HP Software Security Response Team for quick responses and professional
handling of this matter.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+hLyFjB+XO4ZKjSARAkUUAKCL//8oI8okp9WVqcGmBUj4BLysKACfXpBv
FdK1x9n+BYEa6eLUsvW+l8E=
=TyyI
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close