Vulnerabilidad en IBM Tivoli

Noticias, Updates, de Seguridad

#Vulnerabilidades en @IBM @Tivoli #Endpoint

Esta es una vulnerabilidad muy importante y quienes tengan esta tecnología que son muchos deben de aplicar las actualizaciones y parches correspondientes.

Les dejo el detalle de la vulnerabilidad, los productos y versiones que afecta y la liga para corregir esta brecha.

— Producto Afectado: IBM Tivoli Endpoint

— TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 11237.

For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

— Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Endpoint. Authentication is required to exploit this vulnerability, however it is trivially achieved.

The specific flaw exists within the lcfd.exe process which listens by default on TCP port 9495. To reach this page remotely authentication is required. However, by abusing a built-in account an attacker can access the restricted pages. While parsing requests to one of these, the process blindly copies the contents of a POST variable to a 256 byte
stack buffer. This can be leveraged by a remote attacker to execute arbitrary code under the context of the SYSTEM user.

— Vendor Response:
IBM has issued an update to correct this vulnerability. More details can be found at:

https://www-304.ibm.com/support/docview.wss?uid=swg21499146

Espero que esta información haya sido de utilidad.

Saludos

Tags: , , , ,

Professional Ethical Hacker, Pentester & Forensics Investigator MPCS, CEH v8, CSSP, CICP-CICAP HTCIA Member & ISECOM Member Twitter: @victormirandamx

November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930