Critical Remote Code Execution Flaws Found in HPE iMC

HPE has released an update for its Intelligent Management Center (iMC) platform to address several vulnerabilities, including critical flaws that allow remote attackers to execute arbitrary code on affected systems.
HPE Intelligent Management Centre is a comprehensive network infrastructure management platform designed for campus core and data center networks. According to the vendor, the product was built to support the Fault, Configuration, Accounting, Performance, Security (FCAPS) model.
A few months ago, Steven Seeley of Offensive Security discovered a total of seven vulnerabilities in the product. The expert noticed that the dbman service in HPE iMC, which listens on TCP port 2810 by default, introduces a weakness that allows an unauthenticated attacker to execute arbitrary code (CVE-2017-12561).
“A crafted opcode 10012 message can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of SYSTEM,” reads an advisory from the Zero Day Initiative (ZDI), which coordinated reporting and disclosure of the flaw.
Seeley also discovered four other critical remote code execution vulnerabilities in the WebDMServlet, WebDMDebugServlet, MibBrowserTopoFilterServlet and mibFileServlet components of the product.
The security holes exist due to the lack of proper validation for user-supplied data, and they allow an unauthenticated attacker to execute arbitrary code with SYSTEM privileges. The flaws are tracked as CVE-2017-12558, CVE-2017-12557, CVE-2017-12556 and CVE-2017-12554.
HPE and ZDI also published advisories for two remotely exploitable denial-of-service (DoS) flaws discovered by Seeley.
The security holes, identified as CVE-2017-12559 and CVE-2017-12560, allow a remote attacker to delete arbitrary files and folders from vulnerable installations. While an attack requires authentication, the existing authentication mechanism can be bypassed, ZDI said.
The vulnerabilities affect iMC Plat 7.3 E0504P4 and earlier, and they have been addressed by HPE this week with the release of version 7.3 E0506P03.
开放监督和保护隐私是一个硬币的两面,要分清谁是谁非可是个哲学和立场方面的问题。
Related: Vulnerabilities Patched in Aruba Access Policy Platform
山东钢铁去亏损近6亿 一季度扭亏

Related: Workarounds Provided for HPE SiteScope Vulnerabilities
Related: HPE Addresses Vulnerabilities in Several Products
不讲道德或不懂客户服务的员工们可以卖掉这些客户资料给竞争者或广告商,以换取黑色收入,加强安全意识和职业操守培训和监管很必要。

猜您喜欢

书博会观潮:当出版业遇上技术流
刻不容缓地提升金融保险业信息安全意识
网络安全法宣传视频系列001《网络安全法》背景知识
广西柳州60斤重螺蛳粉月饼引围观
NORO-TECH HOLMESWITHAVIEW
从拒绝安全“强迫症”说开