ID

VAR-200807-0235


CVE

CVE-2008-3249


TITLE

Lenovo System Update Vulnerability to install arbitrary packages on the client

Trust: 0.8

sources: JVNDB: JVNDB-2008-004654

DESCRIPTION

The client in Lenovo System Update before 3.14 does not properly validate the certificate when establishing an SSL connection, which allows remote attackers to install arbitrary packages via an SSL certificate whose X.509 headers match a public certificate used by IBM. Lenovo System Update is prone to a security-bypass vulnerability because the application fails to properly check SSL certificates. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks by impersonating trusted servers, which can lead to the installation of arbitrary software on an affected computer. This may result in a complete compromise of the computer. This issue affects Lenovo System Update 3 (Version 3.13.0005, Build date 2008-1-3); other versions may also be vulnerable. Lenovo System Update is a set of system automatic update tools from Lenovo in China, which includes device driver updates, Windows system patch updates, etc. Lenovo's System Update service allows downloading and installing arbitrary update executables from fake servers. After the SSL negotiation is successful, the client will continue to download the XML file, which contains the path name, size and related SHA-1 hash to the EXE file. If the software version displayed in the XML file is higher than the version of the installed software, the EXE file will be downloaded, the SHA-1 hash will be calculated and compared with the hash defined in the XML file, and if it matches, it will be administrator Permission to execute executable programs. To exploit this vulnerability, the attacker must create a self-signed SSL certificate that contains the X.509 header values ​​(issuer, common name, organization, etc.) of the public SSL certificate used by the SystemUpdate server (download.boulder.ibm.com) , the attacker would also modify the XML configuration file of the targeted software package so that the version number, file size, and SHA-1 hash match the malicious EXE file. When SystemUpdate tries to connect to the server, the attacker can accept the connection through techniques such as DNS spoofing and ARP redirection. Wireless networks are especially at risk because impersonation of access points can simplify attacks. Once SystemUpdate connects to TCP port 443, the fake server negotiates an SSL session with an attacker-created SSL certificate, then sends malicious XML and EXE files when SystemUpdate requests the targeted software package. ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: ThinkVantage System Update Missing SSL Certificate Chain Verification SECUNIA ADVISORY ID: SA30379 VERIFY ADVISORY: http://secunia.com/advisories/30379/ CRITICAL: Less critical IMPACT: Spoofing WHERE: >From remote SOFTWARE: ThinkVantage System Update 3.x http://secunia.com/product/15450/ DESCRIPTION: Derek Callaway has reported a security issue in ThinkVantage System Update, which can be exploited by malicious people to conduct spoofing attacks. Successful exploitation allows e.g. downloading and executing malicious programs, but requires that the application connects to a malicious update server providing a specially crafted X.509 certificate (e.g. via DNS poisoning). Other versions may also be affected. http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-66956 PROVIDED AND/OR DISCOVERED BY: Derek Callaway, Security Objectives ORIGINAL ADVISORY: SECOBJADV-2008-01: http://www.security-objectives.com/advisories/SECOBJADV-2008-01.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3249 // JVNDB: JVNDB-2008-004654 // BID: 29366 // VULHUB: VHN-33374 // PACKETSTORM: 66635

AFFECTED PRODUCTS

vendor:lenovomodel:thinkvantage system updatescope:eqversion:3.13

Trust: 1.6

vendor:lenovomodel:thinkvantage system updatescope:lteversion:3.13.0005

Trust: 1.0

vendor:lenovomodel:thinkvantage system updatescope:ltversion:3.14

Trust: 0.8

vendor:lenovomodel:thinkvantage system updatescope:eqversion:3.13.0005

Trust: 0.6

vendor:lenovomodel:system updatescope:eqversion:3

Trust: 0.3

vendor:lenovomodel:system updatescope:neversion:3.14

Trust: 0.3

sources: BID: 29366 // JVNDB: JVNDB-2008-004654 // CNNVD: CNNVD-200807-352 // NVD: CVE-2008-3249

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3249
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-3249
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200807-352
value: MEDIUM

Trust: 0.6

VULHUB: VHN-33374
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-3249
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33374
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33374 // JVNDB: JVNDB-2008-004654 // CNNVD: CNNVD-200807-352 // NVD: CVE-2008-3249

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-33374 // JVNDB: JVNDB-2008-004654 // NVD: CVE-2008-3249

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200807-352

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-200807-352

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004654

PATCH

title:Lenovo System Updateurl:http://support.lenovo.com/en_US/

Trust: 0.8

sources: JVNDB: JVNDB-2008-004654

EXTERNAL IDS

db:NVDid:CVE-2008-3249

Trust: 2.8

db:BIDid:29366

Trust: 2.0

db:SECUNIAid:30379

Trust: 1.8

db:SECTRACKid:1020112

Trust: 1.7

db:JVNDBid:JVNDB-2008-004654

Trust: 0.8

db:BUGTRAQid:20080525 SECOBJADV-2008-01: LENOVO SYSTEMUPDATE SSL CERTIFICATE ISSUER SPOOFING VULNERABILITY

Trust: 0.6

db:XFid:42638

Trust: 0.6

db:CNNVDid:CNNVD-200807-352

Trust: 0.6

db:VULHUBid:VHN-33374

Trust: 0.1

db:PACKETSTORMid:66635

Trust: 0.1

sources: VULHUB: VHN-33374 // BID: 29366 // JVNDB: JVNDB-2008-004654 // PACKETSTORM: 66635 // CNNVD: CNNVD-200807-352 // NVD: CVE-2008-3249

REFERENCES

url:http://www.security-objectives.com/advisories/secobjadv-2008-01.txt

Trust: 2.1

url:http://www.securityfocus.com/bid/29366

Trust: 1.7

url:http://www.securityfocus.com/archive/1/492579

Trust: 1.7

url:http://securitytracker.com/id?1020112

Trust: 1.7

url:http://secunia.com/advisories/30379

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42638

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3249

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3249

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/42638

Trust: 0.6

url:http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=migr-66956

Trust: 0.4

url:/archive/1/492579

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/15450/

Trust: 0.1

url:http://secunia.com/network_software_inspector_2/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/30379/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33374 // BID: 29366 // JVNDB: JVNDB-2008-004654 // PACKETSTORM: 66635 // CNNVD: CNNVD-200807-352 // NVD: CVE-2008-3249

CREDITS

Derek Callaway

Trust: 0.6

sources: CNNVD: CNNVD-200807-352

SOURCES

db:VULHUBid:VHN-33374
db:BIDid:29366
db:JVNDBid:JVNDB-2008-004654
db:PACKETSTORMid:66635
db:CNNVDid:CNNVD-200807-352
db:NVDid:CVE-2008-3249

LAST UPDATE DATE

2025-04-10T23:03:24.183000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33374date:2017-08-08T00:00:00
db:BIDid:29366date:2015-05-07T17:28:00
db:JVNDBid:JVNDB-2008-004654date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200807-352date:2009-04-08T00:00:00
db:NVDid:CVE-2008-3249date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33374date:2008-07-21T00:00:00
db:BIDid:29366date:2008-05-25T00:00:00
db:JVNDBid:JVNDB-2008-004654date:2012-09-25T00:00:00
db:PACKETSTORMid:66635date:2008-05-27T20:29:09
db:CNNVDid:CNNVD-200807-352date:2008-05-25T00:00:00
db:NVDid:CVE-2008-3249date:2008-07-21T17:41:00