The CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to cause a denial of service (daemon crash) via a long consumer name, as demonstrated by an M-POST request to a long /CIMListener/ URI.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/0656 | vdb entry patch vendor advisory |
http://osvdb.org/52615 | vdb entry |
http://www.securityfocus.com/archive/1/501638/100/0/threaded | mailing list |
http://secunia.com/advisories/34212 | third party advisory vendor advisory |
https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49285 | vdb entry |
http://securitytracker.com/id?1021825 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/34061 | vdb entry |
https://www.exploit-db.com/exploits/8190 | exploit |
https://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt | exploit |