IBM Tivoli Management Framework Endpoint addr URL Remote Buffer Overflow

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

A web server running on the remote host has a buffer overflow
vulnerability.

Description :

According to its self-reported version, the Tivoli Endpoint
installation running on the remote host is earlier than 4.1.1-LCF-0076
or 4.3.1-LCF-0012LA, and therefore has a buffer overflow
vulnerability. Input to the 'opts' parameter of '/addr' is not
properly validated. Authentication is required for exploitation,
though this can be achieved trivially by using a built-in account.

A remote, authenticated attacker could exploit this by sending a
malicious POST request to the server, resulting in arbitrary code
execution.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-11-169/
https://www-304.ibm.com/support/docview.wss?uid=swg21499146

Solution :

Upgrade to Tivoli Endpoint 4.1.1-LCF-0076 / 4.3.1-LCF-0012LA
or later. Alternatively, use the workaround described in the
IBM advisory.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 54924 ()

Bugtraq ID: 48049

CVE ID: CVE-2011-1220