EMC AutoStart ftAgent Multiple Remote Code Execution Vulnerabilities (ESA-2012-020)

high Nessus Plugin ID 61491

Synopsis

The remote Windows host has an application that is affected by multiple remote code execution vulnerabilities.

Description

The version of EMC AutoStart on the remote host reportedly contains multiple remote code execution vulnerabilities :

- The EMC AutoStart ftAgent, when processing messages with opcode 0x32 and subcode 0x04, opcode 0x32 and subcode 0x02, opcode 0x03 and subcode 0x04, opcode 0x55 and subcode 0x16, opcode 0x55 and subcode 0x01, opcode 0x41 and subcode 0x12, opcode 0x32 and subcode 0x3C, opcode 0x32 and subcode 0x2A, performs arithmetic on an unvalidated, user-supplied value used to determine the size of a new heap buffer. This allows a potential integer wrap to cause a heap-based buffer overflow.
(ZDI-12-116, ZDI-12-117, ZDI-12-118, ZDI-12-120, ZDI-12-121, ZDI-12-122, ZDI-12-123, ZDI-12-124, respectively)

- The EMC AutoStart ftAgent, when processing messages with opcode 0x41 and subcode 0x00, uses an uninitialized stack variable in calculating a memory pointer. Also, the function uses signed extension and signed comparison when checking the uninitialized stack variable, which allows arbitrary negative values to bypass the check. This could result in corruption of a controlled memory location, which can be leveraged to execute code under the context of a privileged user. (ZDI-12-119)

Failed attacks may result in a denial of service.

Solution

Upgrade to version 5.4.3 or later.

See Also

https://www.securityfocus.com/archive/1/522835

https://www.zerodayinitiative.com/advisories/ZDI-12-116/

https://www.zerodayinitiative.com/advisories/ZDI-12-117/

https://www.zerodayinitiative.com/advisories/ZDI-12-118/

https://www.zerodayinitiative.com/advisories/ZDI-12-119/

https://www.zerodayinitiative.com/advisories/ZDI-12-120/

https://www.zerodayinitiative.com/advisories/ZDI-12-121/

https://www.zerodayinitiative.com/advisories/ZDI-12-122/

https://www.zerodayinitiative.com/advisories/ZDI-12-123/

https://www.zerodayinitiative.com/advisories/ZDI-12-124/

https://www.zerodayinitiative.com/advisories/ZDI-12-159/

https://www.zerodayinitiative.com/advisories/ZDI-12-160/

https://www.zerodayinitiative.com/advisories/ZDI-12-161/

https://seclists.org/fulldisclosure/2012/Aug/281

https://seclists.org/fulldisclosure/2012/Aug/282

https://seclists.org/fulldisclosure/2012/Aug/283

Plugin Details

Severity: High

ID: 61491

File Name: emc_autostart_ftagent_esa-2012-020.nasl

Version: 1.10

Type: remote

Published: 8/10/2012

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2012-0409

Vulnerability Information

CPE: cpe:/a:emc:autostart

Required KB Items: emc/autostart/ftagent/version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/12/2012

Vulnerability Publication Date: 5/24/2012

Reference Information

CVE: CVE-2012-0409

BID: 53682