Borland CaliberRM StarTeam Multicast Service Buffer Overflow

Borland CaliberRM StarTeam Multicast Service Buffer Overflow Secunia Advisory: SA29631   Release Date: 2008-04-04 Critical: Moderately critical Impact: System access Where: From local network Solution Status: Unpatched Software:Borland CaliberRM 2006Borland CaliberRM 2008CVE reference:CVE-2008-0311 (Secunia mirror) This advisory is currently marked as unpatched! - Companies can be alerted when a patch is released! Description:A vulnerability has been reported in Borland CaliberRM, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within "PGMWebHandler::parse_request()" in the StarTeam Multicast Service component (STMulticastService). This can be exploited to cause a stack-based buffer overflow via an overly long HTTP request sent to default port 3057/TCP. Successful exploitation allows execution of arbitrary code but requires that the StarTeam Multicast service is installed by enabling MPX Events and StarTeam Message Broker options during installation. The vulnerability is reported in Borland CaliberRM 2006 and 2008. Other versions and products using the affected component may also be affected.Solution:Restrict network access to the service. Affected users can also disable the listening port. http://support.borland.com/kbshow.php?q=29083Provided and/or discovered by:Discovered by an anonymous researcher and reported via iDefense Labs.Original Advisory:iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=675

Döküman Arama

Başlık :

Kapat