EMC AutoStart ftAgent Multiple Remote Code Execution Vulnerabilities (ESA-2012-020)

High Nessus Plugin ID 61491

Synopsis

The remote Windows host has an application that is affected by multiple remote code execution vulnerabilities.

Description

The version of EMC AutoStart on the remote host reportedly contains multiple remote code execution vulnerabilities :

- The EMC AutoStart ftAgent, when processing messages with opcode 0x32 and subcode 0x04, opcode 0x32 and subcode 0x02, opcode 0x03 and subcode 0x04, opcode 0x55 and subcode 0x16, opcode 0x55 and subcode 0x01, opcode 0x41 and subcode 0x12, opcode 0x32 and subcode 0x3C, opcode 0x32 and subcode 0x2A, performs arithmetic on an unvalidated, user-supplied value used to determine the size of a new heap buffer. This allows a potential integer wrap to cause a heap-based buffer overflow.
(ZDI-12-116, ZDI-12-117, ZDI-12-118, ZDI-12-120, ZDI-12-121, ZDI-12-122, ZDI-12-123, ZDI-12-124, respectively)

- The EMC AutoStart ftAgent, when processing messages with opcode 0x41 and subcode 0x00, uses an uninitialized stack variable in calculating a memory pointer. Also, the function uses signed extension and signed comparison when checking the uninitialized stack variable, which allows arbitrary negative values to bypass the check. This could result in corruption of a controlled memory location, which can be leveraged to execute code under the context of a privileged user. (ZDI-12-119)

Failed attacks may result in a denial of service.

Solution

Upgrade to version 5.4.3 or later.

See Also

http://www.securityfocus.com/archive/1/522835

http://www.zerodayinitiative.com/advisories/ZDI-12-116/

http://www.zerodayinitiative.com/advisories/ZDI-12-117/

http://www.zerodayinitiative.com/advisories/ZDI-12-118/

http://www.zerodayinitiative.com/advisories/ZDI-12-119/

http://www.zerodayinitiative.com/advisories/ZDI-12-120/

http://www.zerodayinitiative.com/advisories/ZDI-12-121/

http://www.zerodayinitiative.com/advisories/ZDI-12-122/

http://www.zerodayinitiative.com/advisories/ZDI-12-123/

http://www.zerodayinitiative.com/advisories/ZDI-12-124/

http://www.zerodayinitiative.com/advisories/ZDI-12-159/

http://www.zerodayinitiative.com/advisories/ZDI-12-160/

http://www.zerodayinitiative.com/advisories/ZDI-12-161/

http://seclists.org/fulldisclosure/2012/Aug/281

http://seclists.org/fulldisclosure/2012/Aug/282

http://seclists.org/fulldisclosure/2012/Aug/283

Plugin Details

Severity: High

ID: 61491

File Name: emc_autostart_ftagent_esa-2012-020.nasl

Version: 1.7

Type: remote

Published: 2012/08/10

Modified: 2018/07/10

Dependencies: 61490

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:emc:autostart

Required KB Items: emc/autostart/ftagent/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/07/12

Vulnerability Publication Date: 2012/05/24

Reference Information

CVE: CVE-2012-0409

BID: 53682