|
|
Credit:
The information has been provided by AbdulAziz Hariri.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-291/
|
|
Vulnerable Systems:
* Cisco Unified Service Monitor
Authentication is not required to exploit this vulnerability.
The flaw exists within the brstart.exe service which listens by default on TCP port 9002. When handling an add_dm request the process uses a user provided value to allocate a buffer then blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the casuser user.
Patch Availability:
EMC has issued an update to correct this vulnerability. More details can be found at:
http://www.securityfocus.com/archive/1/519646/30/0/threaded
Cisco has issued an update to correct this vulnerability. More details can be found at:
http://www.cisco.com/warp/public/707/cisco-sa-20110914-lms.shtml
CVE Information:
CVE-2011-2738
Disclosure Timeline:
2011-02-17 - Vulnerability reported to vendor
2011-10-18 - Coordinated public release of advisory
|
|