Check Point Reference: | CPAI-2008-246 |
Date Published: | 20 Oct 2010 |
Severity: | Critical |
Last Updated: | Sunday 03 December, 2017 |
Source: | |
Industry Reference: | CVE-2008-0401 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | IBM Tivoli Provisioning Manager for OS Deployment provides central management for remote OS deployment for Linux, Macintosh, Sun Solaris, and Windows platforms. There exists a buffer overflow vulnerability in IBM Tivoli Provisioning Manager for OS Deployment. The flaw is due to a boundary error in the HTTP server component when processing crafted HTTP requests. A remote unauthenticated attacker may leverage this vulnerability to create a denial of service condition of the affected service, or inject and execute arbitrary code on the target host with privileges of the affected service. In an attack case where code injection is not successful, the target IBM Tivoli OS Deployment Server service will terminate. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: IBM Tivoli Enforcement Violation.
Attack Information: IBM Tivoli Provisioning Manager for OS Deployment HTTP Server Buffer Overflow