Vulnerabilities > CVE-2011-1205 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Nessus
NASL family Windows NASL id IBM_RATIONAL_CLEARQUEST_7_1_2_1.NASL description The remote host is running a version of IBM Rational ClearQuest 7.1.1.x prior to 7.1.1.4 / 7.1.2.x prior to 7.1.2.1 installed. It is, therefore, affected by the following vulnerabilities : - An information disclosure vulnerability exists in the Dojo Toolkit that allows a remote attacker to read cookies. (CVE-2010-4600) - Multiple unspecified vulnerabilities exist. (CVE-2010-4601) - A security bypass vulnerability exists that allows a restricted user to view arbitrary records by modifying the record number in the URL for a RECORD action in the browser bookmark. (CVE-2010-4602) - A vulnerability exists due to improper processing of back reference fields that allows an authenticated attacker to cause a denial of service or other unspecified impacts. (CVE-2010-4603) last seen 2020-06-01 modified 2020-06-02 plugin id 81779 published 2015-03-12 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/81779 title IBM Rational ClearQuest 7.1.1.x < 7.1.1.4 / 7.1.2.x < 7.1.2.1 Multiple Vulnerabilities (credentialed check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(81779); script_version("1.3"); script_cvs_date("Date: 2018/07/12 19:01:17"); script_cve_id( "CVE-2010-4600", "CVE-2010-4601", "CVE-2010-4602", "CVE-2010-4603", "CVE-2011-1205" ); script_bugtraq_id(45646, 45648, 47091); script_name(english:"IBM Rational ClearQuest 7.1.1.x < 7.1.1.4 / 7.1.2.x < 7.1.2.1 Multiple Vulnerabilities (credentialed check)"); script_summary(english:"Checks the version of IBM Rational ClearQuest."); script_set_attribute(attribute:"synopsis", value: "The remote Windows host has an application installed that is affected by multiple vulnerabilities."); script_set_attribute( attribute:"description", value: "The remote host is running a version of IBM Rational ClearQuest 7.1.1.x prior to 7.1.1.4 / 7.1.2.x prior to 7.1.2.1 installed. It is, therefore, affected by the following vulnerabilities : - An information disclosure vulnerability exists in the Dojo Toolkit that allows a remote attacker to read cookies. (CVE-2010-4600) - Multiple unspecified vulnerabilities exist. (CVE-2010-4601) - A security bypass vulnerability exists that allows a restricted user to view arbitrary records by modifying the record number in the URL for a RECORD action in the browser bookmark. (CVE-2010-4602) - A vulnerability exists due to improper processing of back reference fields that allows an authenticated attacker to cause a denial of service or other unspecified impacts. (CVE-2010-4603) "); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM15146"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM01811"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM20172"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM22186"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21470998"); script_set_attribute(attribute:"solution", value:" Upgrade to IBM Rational ClearQuest 7.1.1.4 / 7.1.2.1 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/10"); script_set_attribute(attribute:"patch_publication_date", value:"2012/05/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/12"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:rational_clearquest"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc."); script_dependencies('ibm_rational_clearquest_installed.nasl'); script_require_keys('installed_sw/IBM Rational ClearQuest'); exit(0); } include('ibm_rational_clearquest_version.inc'); rational_clearquest_check_version( fixes:make_nested_list( make_array("Min", "7.1.0.0", "Fix UI", "7.1.1.9", "Fix", "7.1109.0.176"), make_array("Min", "7.1.2.0", "Fix UI", "7.1.2.6", "Fix", "7.1206.0.141")), severity:SECURITY_HOLE, sqli:TRUE );
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS11-027.NASL description The remote Windows host has one or more ActiveX controls installed that could be abused to execute arbitrary code remotely if a user can be tricked into viewing a malicious web page using Internet Explorer. Three of these controls are from Microsoft itself while the others are from third-party vendors that have asked Microsoft to prevent their controls from being run in Internet Explorer. last seen 2020-06-01 modified 2020-06-02 plugin id 53384 published 2011-04-13 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/53384 title MS11-027: Cumulative Security Update of ActiveX Kill Bits (2508272) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(53384); script_version("1.29"); script_cvs_date("Date: 2018/11/15 20:50:30"); script_cve_id("CVE-2010-0811", "CVE-2010-2193", "CVE-2010-3973", "CVE-2011-1205", "CVE-2011-1243"); script_bugtraq_id(40490, 40689, 45546, 47091, 47197); script_xref(name:"CERT", value:"725596"); script_xref(name:"MSFT", value:"MS11-027"); script_xref(name:"MSKB", value:"2508272"); script_name(english:"MS11-027: Cumulative Security Update of ActiveX Kill Bits (2508272)"); script_summary(english:"Checks if kill bits have been set"); script_set_attribute( attribute:"synopsis", value: "The remote Windows host is missing an update that disables selected ActiveX controls." ); script_set_attribute( attribute:"description", value: "The remote Windows host has one or more ActiveX controls installed that could be abused to execute arbitrary code remotely if a user can be tricked into viewing a malicious web page using Internet Explorer. Three of these controls are from Microsoft itself while the others are from third-party vendors that have asked Microsoft to prevent their controls from being run in Internet Explorer." ); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-027"); script_set_attribute( attribute:"solution", value: "Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Microsoft WMI Administration Tools ActiveX Buffer Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'White_Phosphorus'); script_set_attribute(attribute:"vuln_publication_date", value:"2010/06/08"); script_set_attribute(attribute:"patch_publication_date", value:"2011/04/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/04/13"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows : Microsoft Bulletins"); script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc."); script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl"); script_require_keys("SMB/MS_Bulletin_Checks/Possible"); script_require_ports(139, 445, 'Host/patch_management_checks'); exit(0); } include("audit.inc"); include("smb_func.inc"); include("smb_hotfixes.inc"); include("smb_hotfixes_fcheck.inc"); include("smb_activex_func.inc"); include("misc_func.inc"); get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible"); bulletin = 'MS11-027'; kb = '2508272'; kbs = make_list(kb); if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING); get_kb_item_or_exit("SMB/Registry/Enumerated"); get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1); if (hotfix_check_sp_range(xp:'3', win2003:'2', vista:'1,2', win7:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN); if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE); if (activex_init() != ACX_OK) exit(1, "Unable to initialize the ActiveX API."); # Test each control. info = ""; clsids = make_list( '{1A6FE369-F28C-4AD9-A3E6-2BCB50807CF1}', # Microsoft Internet Explorer 8 Developer Tools '{29851043-AA76-4efd-9232-4914DD0AD4A1}', # IBM Rational Suite License ActiveX Control '{2745E5F5-D234-11D0-847A-00C04FD7BB08}', # Microsoft WMITools ActiveX '{2C37C480-CEE3-11D1-82C3-0060089253D0}', # IBM Rational Suite License ActiveX Control '{4918D1BD-B497-4f2f-A429-3C3CD74694FE}', # IBM Rational Suite License ActiveX Control '{4F496A52-13F7-483d-B5E2-0FC4AA567749}', # IBM Rational Suite License ActiveX Control '{53655704-5956-11D3-91AA-005004B34F28}', # IBM Rational Suite License ActiveX Control '{687F154E-1099-11D4-91F9-005004B34F28}', # IBM Rational Suite License ActiveX Control '{6F225D94-9318-11D4-9223-005004B34F28}', # IBM Rational Suite License ActiveX Control '{7B297BFD-85E4-4092-B2AF-16A91B2EA103}', # CA WebScan ActiveX '{83F0C8F0-4900-4909-A0AD-A5BAAC432739}', # IBM Rational Suite License ActiveX Control '{8469A9DE-A3BF-4218-A1D2-F19AA9EA1617}', # IBM Rational Suite License ActiveX Control '{AC146530-87A5-11D1-ADBD-00AA00B8E05A}', # Microsoft WMITools ActiveX '{B3F90F4F-B521-4c76-BE28-DB569320CB8F}', # IBM Rational Suite License ActiveX Control '{C679DECC-5289-4856-B504-74B11ADD424A}', # IBM Rational Suite License ActiveX Control '{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}', # Oracle Java Deployment Toolkit '{FA44198C-E0B3-4f10-8B77-F646EC7CE684}', # IBM Rational Suite License ActiveX Control '{FB7199AB-79BF-11d2-8D94-0000F875C541}', # Microsoft Windows Messenger ActiveX '{FF371BF4-213D-11D0-95F3-00C04FD9B15B}' # Microsoft WMITools ActiveX ); foreach clsid (clsids) { if (activex_get_killbit(clsid:clsid) == 0) { info += ' ' + clsid + '\n'; if (!thorough_tests) break; } } activex_end(); if (info) { if (report_verbosity > 0) { if (max_index(split(info)) > 1) s = "s"; else s = ""; report = '\nThe kill bit has not been set for the following control'+s+' :\n\n'+ info; if (!thorough_tests) { report += '\nNote that Nessus did not check whether there were other kill bits\n'+ 'that have not been set because the "Perform thorough tests" setting\n'+ 'was not enabled when this scan was run.\n'; } hotfix_add_report(report, bulletin:bulletin, kb:kb); } else hotfix_add_report(bulletin:bulletin, kb:kb); set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE); hotfix_security_warning(); } else audit(AUDIT_HOST_NOT, 'affected');
Seebug
bulletinFamily | exploit |
description | Bugtraq ID: 47091 CVE ID:CVE-2011-1205 IBM Rational Licensing是一款用于多个IBM产品的许可证管理机制。 IBM Rational Licensing的windows平台实现基于Microsoft COM架构,证书功能通过不同的4个COM对象提供给部分IBM Rational程序使用。这些COM对象存在缓冲区溢出,攻击者可以利用漏洞,构建特制的HTML文件,诱使用户在Internet Explorer本地电脑安全域下打开,可导致以目标用户安全上下文执行代码。 0 IBM Rational Licensing 7.1.1.4 IBM Rational Licensing 7.0 IBM Rational ClearQuest 7.1.1 02 IBM Rational ClearQuest 7.1.1 IBM Rational ClearQuest 7.1 2 IBM Rational ClearQuest 7.0.1 3 IBM Rational ClearQuest 7.0.1 .1 IBM Rational ClearQuest 7.0.1 IBM Rational ClearQuest 7.0 4 IBM Rational ClearQuest 7.1.1.4 IBM Rational ClearQuest 7.1 IBM Rational ClearQuest 7.0.1.5 IBM Rational ClearQuest 7.0.1.4 IBM Rational ClearQuest 7.0.1.11 IBM Rational ClearQuest 7.0.0.6 IBM Rational ClearQuest 7.0.0.5 IBM Rational ClearQuest IBM Rational ClearCase 7.0.1 IBM Rational ClearCase 7.1.1.4 IBM Rational ClearCase 7.1.0.1 IBM Rational ClearCase 7.0.1.4 IBM Rational ClearCase 7.0.1.2 IBM Rational ClearCase 7.0.0.5 IBM Rational ClearCase 7.0.0.4 IBM Rational ClearCase IBM Rational AppScan Enterprise 8.0.0.1 IBM Rational AppScan Enterprise 8.0.0 厂商解决方案 ------------ 用户可参考如下供应商提供的安全公告获得补丁信息: https://www-304.ibm.com/support/docview.wss?uid=swg21470998 |
id | SSV:20431 |
last seen | 2017-11-19 |
modified | 2011-04-01 |
published | 2011-04-01 |
reporter | Root |
title | IBM Rational Licensing本地特权提升漏洞 |
References
- http://www.ibm.com/support/docview.wss?uid=swg21470998
- http://www.securitytracker.com/id?1025268
- http://www.securitytracker.com/id?1025269
- http://www.vupen.com/english/advisories/2011/0832
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66304
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66324
- http://www.ibm.com/support/docview.wss?uid=swg21470998
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66324
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66304
- http://www.vupen.com/english/advisories/2011/0832
- http://www.securitytracker.com/id?1025269
- http://www.securitytracker.com/id?1025268