Vulnerabilities > CVE-2011-1205 - Buffer Errors vulnerability in IBM products

047910
CVSS 6.9 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
ibm
CWE-119
nessus

Summary

Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone.

Vulnerable Configurations

Part Description Count
Application
Ibm
66

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyWindows
    NASL idIBM_RATIONAL_CLEARQUEST_7_1_2_1.NASL
    descriptionThe remote host is running a version of IBM Rational ClearQuest 7.1.1.x prior to 7.1.1.4 / 7.1.2.x prior to 7.1.2.1 installed. It is, therefore, affected by the following vulnerabilities : - An information disclosure vulnerability exists in the Dojo Toolkit that allows a remote attacker to read cookies. (CVE-2010-4600) - Multiple unspecified vulnerabilities exist. (CVE-2010-4601) - A security bypass vulnerability exists that allows a restricted user to view arbitrary records by modifying the record number in the URL for a RECORD action in the browser bookmark. (CVE-2010-4602) - A vulnerability exists due to improper processing of back reference fields that allows an authenticated attacker to cause a denial of service or other unspecified impacts. (CVE-2010-4603)
    last seen2020-06-01
    modified2020-06-02
    plugin id81779
    published2015-03-12
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81779
    titleIBM Rational ClearQuest 7.1.1.x < 7.1.1.4 / 7.1.2.x < 7.1.2.1 Multiple Vulnerabilities (credentialed check)
    code
    #
    #  (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81779);
      script_version("1.3");
      script_cvs_date("Date: 2018/07/12 19:01:17");
    
      script_cve_id(
        "CVE-2010-4600",
        "CVE-2010-4601",
        "CVE-2010-4602",
        "CVE-2010-4603",
        "CVE-2011-1205"
      );
      script_bugtraq_id(45646, 45648, 47091);
    
      script_name(english:"IBM Rational ClearQuest 7.1.1.x < 7.1.1.4 / 7.1.2.x < 7.1.2.1 Multiple Vulnerabilities (credentialed check)");
      script_summary(english:"Checks the version of IBM Rational ClearQuest.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host has an application installed that is affected
    by multiple vulnerabilities.");
      script_set_attribute(
        attribute:"description", value:
    "The remote host is running a version of IBM Rational ClearQuest
    7.1.1.x prior to 7.1.1.4 / 7.1.2.x prior to 7.1.2.1 installed. It is,
    therefore, affected by the following vulnerabilities :
    
      - An information disclosure vulnerability exists in the
        Dojo Toolkit that allows a remote attacker to read
        cookies. (CVE-2010-4600)
    
      - Multiple unspecified vulnerabilities exist.
        (CVE-2010-4601)
    
      - A security bypass vulnerability exists that allows a
        restricted user to view arbitrary records by modifying
        the record number in the URL for a RECORD action in the
        browser bookmark. (CVE-2010-4602)
    
      - A vulnerability exists due to improper processing of
        back reference fields that allows an authenticated
        attacker to cause a denial of service or other
        unspecified impacts. (CVE-2010-4603)
    ");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM15146");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM01811");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM20172");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM22186");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21470998");
    
      script_set_attribute(attribute:"solution", value:"
    Upgrade to IBM Rational ClearQuest 7.1.1.4 / 7.1.2.1 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/05/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:rational_clearquest");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies('ibm_rational_clearquest_installed.nasl');
      script_require_keys('installed_sw/IBM Rational ClearQuest');
      
      exit(0); 
    }
    
    include('ibm_rational_clearquest_version.inc');
    
    rational_clearquest_check_version(
      fixes:make_nested_list(
        make_array("Min", "7.1.0.0", "Fix UI", "7.1.1.9", "Fix", "7.1109.0.176"),
        make_array("Min", "7.1.2.0", "Fix UI", "7.1.2.6", "Fix", "7.1206.0.141")),
      severity:SECURITY_HOLE,
      sqli:TRUE
    );
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS11-027.NASL
    descriptionThe remote Windows host has one or more ActiveX controls installed that could be abused to execute arbitrary code remotely if a user can be tricked into viewing a malicious web page using Internet Explorer. Three of these controls are from Microsoft itself while the others are from third-party vendors that have asked Microsoft to prevent their controls from being run in Internet Explorer.
    last seen2020-06-01
    modified2020-06-02
    plugin id53384
    published2011-04-13
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/53384
    titleMS11-027: Cumulative Security Update of ActiveX Kill Bits (2508272)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(53384);
      script_version("1.29");
      script_cvs_date("Date: 2018/11/15 20:50:30");
    
      script_cve_id("CVE-2010-0811", "CVE-2010-2193", "CVE-2010-3973", "CVE-2011-1205", "CVE-2011-1243");
      script_bugtraq_id(40490, 40689, 45546, 47091, 47197);
      script_xref(name:"CERT", value:"725596");
      script_xref(name:"MSFT", value:"MS11-027");
      script_xref(name:"MSKB", value:"2508272");
    
      script_name(english:"MS11-027: Cumulative Security Update of ActiveX Kill Bits (2508272)");
      script_summary(english:"Checks if kill bits have been set");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote Windows host is missing an update that disables selected
    ActiveX controls."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote Windows host has one or more ActiveX controls installed that
    could be abused to execute arbitrary code remotely if a user can be
    tricked into viewing a malicious web page using Internet Explorer.
    
    Three of these controls are from Microsoft itself while the others are
    from third-party vendors that have asked Microsoft to prevent their
    controls from being run in Internet Explorer."
      );
      script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-027");
      script_set_attribute(
        attribute:"solution",
        value:
    "Microsoft has released a set of patches for Windows XP, 2003, Vista,
    2008, 7, and 2008 R2."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Microsoft WMI Administration Tools ActiveX Buffer Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'White_Phosphorus');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/06/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2011/04/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/04/13");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
    
      script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, 'Host/patch_management_checks');
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_activex_func.inc");
    include("misc_func.inc");
    
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = 'MS11-027';
    kb = '2508272';
    
    kbs = make_list(kb);
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(xp:'3', win2003:'2', vista:'1,2', win7:'0,1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);
    
    if (activex_init() != ACX_OK) exit(1, "Unable to initialize the ActiveX API.");
    
    # Test each control.
    info = "";
    clsids = make_list(
      '{1A6FE369-F28C-4AD9-A3E6-2BCB50807CF1}',  # Microsoft Internet Explorer 8 Developer Tools
      '{29851043-AA76-4efd-9232-4914DD0AD4A1}',  # IBM Rational Suite License ActiveX Control
      '{2745E5F5-D234-11D0-847A-00C04FD7BB08}',  # Microsoft WMITools ActiveX
      '{2C37C480-CEE3-11D1-82C3-0060089253D0}',  # IBM Rational Suite License ActiveX Control
      '{4918D1BD-B497-4f2f-A429-3C3CD74694FE}',  # IBM Rational Suite License ActiveX Control
      '{4F496A52-13F7-483d-B5E2-0FC4AA567749}',  # IBM Rational Suite License ActiveX Control
      '{53655704-5956-11D3-91AA-005004B34F28}',  # IBM Rational Suite License ActiveX Control
      '{687F154E-1099-11D4-91F9-005004B34F28}',  # IBM Rational Suite License ActiveX Control
      '{6F225D94-9318-11D4-9223-005004B34F28}',  # IBM Rational Suite License ActiveX Control
      '{7B297BFD-85E4-4092-B2AF-16A91B2EA103}',  # CA WebScan ActiveX
      '{83F0C8F0-4900-4909-A0AD-A5BAAC432739}',  # IBM Rational Suite License ActiveX Control
      '{8469A9DE-A3BF-4218-A1D2-F19AA9EA1617}',  # IBM Rational Suite License ActiveX Control
      '{AC146530-87A5-11D1-ADBD-00AA00B8E05A}',  # Microsoft WMITools ActiveX
      '{B3F90F4F-B521-4c76-BE28-DB569320CB8F}',  # IBM Rational Suite License ActiveX Control
      '{C679DECC-5289-4856-B504-74B11ADD424A}',  # IBM Rational Suite License ActiveX Control
      '{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}',  # Oracle Java Deployment Toolkit
      '{FA44198C-E0B3-4f10-8B77-F646EC7CE684}',  # IBM Rational Suite License ActiveX Control
      '{FB7199AB-79BF-11d2-8D94-0000F875C541}',  # Microsoft Windows Messenger ActiveX
      '{FF371BF4-213D-11D0-95F3-00C04FD9B15B}'   # Microsoft WMITools ActiveX
    );
    
    foreach clsid (clsids)
    {
      if (activex_get_killbit(clsid:clsid) == 0)
      {
        info += '  ' + clsid + '\n';
        if (!thorough_tests) break;
      }
    }
    activex_end();
    
    
    
    if (info)
    {
      if (report_verbosity > 0)
      {
        if (max_index(split(info)) > 1) s = "s";
        else s = "";
    
        report =
          '\nThe kill bit has not been set for the following control'+s+' :\n\n'+
          info;
    
        if (!thorough_tests)
        {
          report +=
            '\nNote that Nessus did not check whether there were other kill bits\n'+
            'that have not been set because the "Perform thorough tests" setting\n'+
            'was not enabled when this scan was run.\n';
        }
        hotfix_add_report(report, bulletin:bulletin, kb:kb);
      }
      else hotfix_add_report(bulletin:bulletin, kb:kb);
    
      set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE);
      hotfix_security_warning();
    }
    else audit(AUDIT_HOST_NOT, 'affected');
    

Seebug

bulletinFamilyexploit
descriptionBugtraq ID: 47091 CVE ID:CVE-2011-1205 IBM Rational Licensing是一款用于多个IBM产品的许可证管理机制。 IBM Rational Licensing的windows平台实现基于Microsoft COM架构,证书功能通过不同的4个COM对象提供给部分IBM Rational程序使用。这些COM对象存在缓冲区溢出,攻击者可以利用漏洞,构建特制的HTML文件,诱使用户在Internet Explorer本地电脑安全域下打开,可导致以目标用户安全上下文执行代码。 0 IBM Rational Licensing 7.1.1.4 IBM Rational Licensing 7.0 IBM Rational ClearQuest 7.1.1 02 IBM Rational ClearQuest 7.1.1 IBM Rational ClearQuest 7.1 2 IBM Rational ClearQuest 7.0.1 3 IBM Rational ClearQuest 7.0.1 .1 IBM Rational ClearQuest 7.0.1 IBM Rational ClearQuest 7.0 4 IBM Rational ClearQuest 7.1.1.4 IBM Rational ClearQuest 7.1 IBM Rational ClearQuest 7.0.1.5 IBM Rational ClearQuest 7.0.1.4 IBM Rational ClearQuest 7.0.1.11 IBM Rational ClearQuest 7.0.0.6 IBM Rational ClearQuest 7.0.0.5 IBM Rational ClearQuest IBM Rational ClearCase 7.0.1 IBM Rational ClearCase 7.1.1.4 IBM Rational ClearCase 7.1.0.1 IBM Rational ClearCase 7.0.1.4 IBM Rational ClearCase 7.0.1.2 IBM Rational ClearCase 7.0.0.5 IBM Rational ClearCase 7.0.0.4 IBM Rational ClearCase IBM Rational AppScan Enterprise 8.0.0.1 IBM Rational AppScan Enterprise 8.0.0 厂商解决方案 ------------ 用户可参考如下供应商提供的安全公告获得补丁信息: https://www-304.ibm.com/support/docview.wss?uid=swg21470998
idSSV:20431
last seen2017-11-19
modified2011-04-01
published2011-04-01
reporterRoot
titleIBM Rational Licensing本地特权提升漏洞