exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

IBM Director Privilege Escalation

IBM Director Privilege Escalation
Posted Mar 10, 2009
Authored by Bernhard Mueller | Site sec-consult.com

SEC Consult Security Advisory 20090305-2 - IBM Director for Windows versions 5.20.3 Service Update 2 and below suffer from a local privilege escalation vulnerability.

tags | exploit, local
systems | windows
SHA-256 | 2c4bdf15757ef2a4d79baa1f93e9076442d2eb8f9826084c908501199c234703

IBM Director Privilege Escalation

Change Mirror Download
SEC-CONSULT Security Advisory < 20090305-2 >
=========================================================================================
title: IBM Director CIM Server Local Privilege Escalation
Vulnerability
program: IBM Director for Windows
vulnerable version: <= 5.20.3 Service Update 2
homepage: http://www-03.ibm.com/systems/management/director/
found: Sept. 2008
by: Bernhard Mueller / SEC Consult Vulnerability Lab
permanent link:
http://www.sec-consult.com/files/20090305-2_IBM_director_privilege_escalation.txt
=========================================================================================

Product description:
---------------

IBM Director is an application that can track and view system
configurations of remote computers. It is available for Linux, AIX, and
Windows servers.


Vulnerability overview:
---------------

The CIM server which comes with IBM Director suite for Microsoft Windows
contains a local privilege escalation vulnerability because the
application fails to properly validate incoming indication requests. By
exploiting this vulnerability an attacker can run arbitrary code with
the privileges of the CIM server process (LOCAL SYSTEM in the Windows
version).


Vulnerability details:
---------------

The CIM server listens for so-called indication requests which it passes
to local consumers. These consumers are implemented within dynamic link
libraries or shared objects that reside on the system.
Because the consumer named is not checked for Windows path
metacharacters ("\"), it is possible to traverse the filesystem and
specify any library on the system. CIM server will load the specified
DLL and call its initialization function, PegasusCreateProvider(const
char *).

For example, the following request will load C:\mydll.dll:


M-POST /CIMListener/\..\..\..\..\mydll HTTP/1.1
CIMOperation: MethodCall
CIMExport: MethodRequest
CIMExportMethod: ExportIndication

[some xml]


The vulnerability can be exploited by a local user or an attacker who is
able to upload a file to the target system.


Fix:
---------------

The vendor has adressed this vulnerability in service update 2 for IBM
Director agent 5.20.3. Download link:

https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8


vendor status:
---------------
vendor notified: 2008-11-03
patch available: 2009-03-09

--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
www.sec-consult.com

# EOF Bernhard Mueller, SEC Consult Vulnerability Lab / @2009
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close