Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] HP Data Protector Multiple Remote Vulnerabilities

High

Synopsis

Tenable found two new vulnerabilities in HPE Data Protector's OmniInet.exe while researching HPSBGN03580.

FTP_PUT_FILE Request Stack Buffer Overflow

OmniInet.exe blindly copies the filename value from FTP_PUT_FILE requests into a fixed length stack buffer. Due to the lack of length checking an unauthenticated remote attacker can crash the remote process or potentially execute remote code under the context of SYSTEM.

.text:00413280      mov     eax, g_field_array
.text:00413285      mov     ecx, [eax+REQ_RxFtp.fileName] ; user-controlled data
.text:00413288      push    ecx                        ; int
.text:00413289      lea     edx, [ebp+var_80C]         ; stack buf of fixed size
.text:0041328F      push    edx                        ; wchar_t *
.text:00413290      call    StrCpyNS 

EXEC_SCRIPT argc Field Handling Denial of Service

A user, when submitting an EXEC_SCRIPT request, can specify a program to run, a list of program arguments, and a list of environment variables. The user supplied argc field indicates how many program arguments there are. However, OmniInet.exe never validates argc is reasonable or correct. An unauthenticated remote attacker can specify a large argc value without including the corresponding number of program arguments. This will cause OmniInet.exe to try and loop through argc amount of program arguments which eventually leads to a crash.

Solution

Upgrade to HPE Data Protector 8.17 or 9.09

Disclosure Timeline

2016-05-02 - Issue discovered
2016-05-05 - Submitted to ZDI for consideration, case bmartin0012 opened
2016-06-21 - ZDI declines, something about cookies. Maybe Nutter Butters?
2016-06-21 - Tenable asks a few questions to verify.
2016-06-28 - ZDI confirms they will decline. Oatmeal raisin fans I bet.
2016-06-28 - Submitted to HP via [email protected]
2016-06-28 - Vendor acknowledges mail, assigns PSRT110167
2016-08-11 - Vendor asks us what version we tested on w/o tracking number or original mail
2016-08-11 - Tenable digs up PSRT # to verify we're on the same page, sends version info
2016-09-20 - Ping vendor for update
2016-10-10 - Ping vendor for update
2016-10-11 - Vendor says they are fixing multiple issues, not just ours. DP 8.17 planned end of Nov, DP 9.1 planned end of Feb, 2017.
2016-12-11 - Ping vendor to see if 8.17 released as planned
2016-12-13 - Vendor says 8.17 released 'end of November', security bulletin coming soon
2017-02-27 - Ping vendor to see if released and bulletin published.
2017-03-31 - Ping vendor for update
2017-04-03 - Vendor says fixed in 8.16 and 9.08, working on final details of advisory
2017-04-03 - Tenable asks about fix information discrepancy from previous emails
2017-04-04 - Vendor gives full breakdown of issue w/ corresponding fix, CVSS, and more.
2017-04-04 - Tenable challenges HPE on one CVSS score
2017-08-01 - Vendor asks who to credit
2017-08-02 - Vendor publishes advisory

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2017-26
Credit:
Tenable Network Security
CVSSv2 Base / Temporal Score:
7.6 / 6.3
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C
Nessus Plugin ID: 102431
Affected Products:
HPE Data Protector prior to 8.17 and 9.09
Risk Factor:
High

Advisory Timeline

2017-11-06 - [R1] Initial Release