HPE Intelligent Management Center dbman Multiple Vulnerabilities

critical Nessus Plugin ID 125736
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.9

Synopsis

A database backup and restoration tool running on the remote host is affected by multiple vulnerabilities.

Description

The HPE Intelligent Management Center (iMC) dbman process running on the remote host is affected by multiple vulnerabilities:

- A denial of service (DoS) vulnerability exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this issue, via a command 10014 request, to cause the dbman process to restart. (CVE-2018-7123)

- A denial of service (DoS) vulnerability exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this issue, via a command 10003 request, to cause the dbman process to stop responding. (CVE-2019-5355)

- A command injection vulnerability exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this, via a series of specially crafted requests, to execute arbitrary commands. (CVE-2019-5390)

- A stack-based buffer overflow condition exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this, via a series of specially crafted requests, to cause a denial of service condition or the execution of arbitrary code. (CVE-2019-5391)

- An information disclosure vulnerability exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this, via a command 10001 request, to disclose potentially sensitive information. (CVE-2019-5392)

- An information disclosure vulnerability exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this, via a command 10002 request, to backup iMC database files to a directory that allows unauthenticated access over HTTP. (CVE-2019-5393)

Note that the HPE iMC running on the remote host is reportedly affected by additional vulnerabilities; however, this plugin has not tested for these.

Solution

Upgrade HPE iMC version to 7.3 E0703 or later.

See Also

http://www.nessus.org/u?f3575044

Plugin Details

Severity: Critical

ID: 125736

File Name: hp_imc_dbman_multi_vulns_hpesbhf03930.nasl

Version: 1.3

Type: remote

Family: Misc.

Published: 6/6/2019

Updated: 2/11/2020

Dependencies: hp_imc_dbman_detect.nbin

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS Score Source: CVE-2019-5390

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/9/2019

Vulnerability Publication Date: 3/20/2019

Reference Information

CVE: CVE-2019-5392, CVE-2019-5390, CVE-2019-5391, CVE-2019-5355, CVE-2018-7123, CVE-2019-5393

TRA: TRA-2018-28, TRA-2019-12

HP: HPESBHF03930