Wednesday, February 9, 2011

Multiple Vendor Calendar Manager RPC Service Remote Code Execution Vulnerability

Dear Friends,
This is a vulnerability related to remote code execution and by using it any attacker can attack on your system.
So be prepared to face it...

Vulnerability Details:
This vulnerability allows attackers to execute arbitrary code on
vulnerable installations of the Calendar Manager RPC Service.
Authentication is not required to exploit this vulnerability.

The specific flaw exists within the CMSD server (rpc.cmsd) which listens
by default on UDP port 32768. The process does not properly handle large
XDR-encoded ASCII strings to RPC call 10 followed by RPC call 6. This
can be abused by an attacker to overflow a buffer on the remote host.
Successful exploitation can result in arbitrary code execution.

Vendor Response:
HP:
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02702395

IBM:
http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc
IBM is not providing credits, as our system at that time and for this
brand does not accept credits.

Oracle:
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html

Disclosure Timeline:
2009-08-20 - Vulnerability reported to vendor
2011-02-08 - Coordinated public release of advisory


Regards,
Vishnu Kumar Chandel

No comments:

Post a Comment