H3C / HPE Intelligent Management Center PLAT < 7.3 E0504P04 Multiple Vulnerabilities

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An application installed on the remote Windows host is affected by
multiple vulnerabilities.

Description :

The version of HPE Intelligent Management Center (iMC) PLAT installed
on the remote host is prior to 7.3 E0504P04. It is, therefore,
affected by multiple vulnerabilities :

- A NULL pointer deference flaw exists, specifically in
the asn1_item_embed_d2i() function within file
crypto/asn1/tasn_dec.c, when handling the ASN.1 CHOICE
type, which results in a NULL value being passed to the
structure callback if an attempt is made to free certain
invalid encodings. An unauthenticated, remote attacker
can exploit this to cause a denial of service condition.
(CVE-2016-7053)

- A heap overflow condition exists in the
chacha20_poly1305_cipher() function within file
crypto/evp/e_chacha20_poly1305.c when handling TLS
connections using *-CHACHA20-POLY1305 cipher suites. An
unauthenticated, remote attacker can exploit this to
cause a denial of service condition. (CVE-2016-7054)

- A carry propagation error exists in the
Broadwell-specific Montgomery multiplication procedure
when handling input lengths divisible by but longer than
256 bits. This can result in transient authentication
and key negotiation failures or reproducible erroneous
outcomes of public-key operations with specially crafted
input. A man-in-the-middle attacker can possibly exploit
this issue to compromise ECDH key negotiations that
utilize Brainpool P-512 curves. (CVE-2016-7055)

- An unspecified flaw exists that allows an
unauthenticated, remote attacker to execute arbitrary
code. (CVE-2017-5815)

- A command injection vulnerability exists in the dbman
service due to improper validation of user-supplied
input before it is passed to a system call. An
unauthenticated, remote attacker can exploit this, via a
specially crafted opcode 10008 request, to inject and
execute arbitrary OS commands with SYSTEM privileges.
(CVE-2017-5816)

- Multiple command injection vulnerabilities exist in the
dbman service due to improper validation of
user-supplied input before it is passed to a system
call. An unauthenticated, remote attacker can exploit
these, via a specially crafted opcode 10007 request, to
inject and execute arbitrary OS commands with SYSTEM
privileges. (CVE-2017-5817, CVE-2017-5819)

- A flaw exists in the dbman service when handling opcode
10007 requests due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted request, to
delete arbitrary files with SYSTEM privileges.
(CVE-2017-5818)

- A flaw exists in the dbman service when handling opcode
10004 requests due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted request, to
execute arbitrary code. (CVE-2017-5820)

- A flaw exists in the dbman service when handling opcode
10006 and 10010 requests due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially request, to execute
arbitrary code. (CVE-2017-5821)

- A flaw exists in the dbman service when handling opcode
10010 requests due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted request, to
execute arbitrary code. (CVE-2017-5822)

- A flaw exists in the dbman service when handling opcode
10013 requests due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted request, to
execute arbitrary code. (CVE-2017-5823)

- An unspecified remote code execution vulnerability
exists that allows an unauthenticated, remote attacker
to execute arbitrary code. (CVE-2017-8948)

- A stack-based buffer overflow condition exists due to
improper validation of input when copying data. An
unauthenticated, remote attacker can exploit this to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2017-8956)

Note that Intelligent Management Center (iMC) is an HPE product;
however, it is branded as H3C.

See also :

http://www.nessus.org/u?a364642c
http://www.nessus.org/u?0316a4b7
http://www.nessus.org/u?3f1a2c3c
http://www.nessus.org/u?0e1b5046

Solution :

Upgrade to H3C / HPE iMC version 7.3 E0504P04 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now