[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Heap Memory Corruption in HP Device Access Manager for Protect Tools Information Store
Vulnerability ID: HTB23044
Product: HP Device Access Manager for Protect Tools Information Store
Vulnerable Version: Prior to v.22.214.171.124
Tested Version: 126.96.36.199
Vendor Notification: 26 August 2011
Vulnerability Type: Heap Memory Corruption
Status: Fixed by Vendor
Risk level: Medium
Credit: High-Tech Bridge SA Security Research Lab ( https://www.htbridge.ch/advisory/ )
The AddUser(), AddUserEx(), RemoveUser(), RemoveUserByGuide(), RemoveUserEx() and RemoveUserRegardless() methods do not check the length of the SidString variable.
An attacker could craft a HTML page to cause a denial of service attack against Internet Explorer. In a more dangerous scenario a heap memory corruption is trigerred which could lead in arbitrary code execution.
The following PoC code is available:
<input onclick="Do_It()" type="button" value="P0c">
HPSBHF02723 SSRT100536: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082368
HP has made HP Protect Tools Device Access Manager (PTDAM) for Windows updates available to resolve the vulnerability for products running PTDAM v6 software.
PTDAM v188.8.131.52 or subsequent is provided as a SoftPaq in the Download drivers and software page for each impacted product listed above.
To access the updated software, go to <a rel="nofollow" http://www.hp.com/ then
- select support and drivers
- go to drivers and software
- enter the PC model number
- select the Windows operating system version from the table
- The Protect Tools Device Access Manager is available as a download from the Download drivers and software page
- Choose the latest Device Access Manager for Protect Tools (v184.108.40.206 or subsequent)
Disclaimer: Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on the web page in Reference field.