ID

VAR-201001-0761


CVE

CVE-2010-0138


TITLE

CiscoWorks LMS Included with Cisco CiscoWorks IPM Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2010-003773

DESCRIPTION

Buffer overflow in Cisco CiscoWorks Internetwork Performance Monitor (IPM) 2.6 and earlier on Windows, as distributed in CiscoWorks LAN Management Solution (LMS), allows remote attackers to execute arbitrary code via a malformed getProcessName CORBA General Inter-ORB Protocol (GIOP) request, related to a "third-party component," aka Bug ID CSCsv62350. Authentication is not required to exploit this vulnerability.The specific flaw exists in the handling of CORBA GIOP requests. By making a specially crafted getProcessName GIOP request an attacker can corrupt memory. Successful exploitation can result in a full compromise with SYSTEM credentials. Failed attacks will likely cause denial-of-service conditions. This issue is documented by Cisco Bug ID CSCsv62350. NOTE: IPM is built with an unsupported third-party component; Cisco indicates that updates to IPM will not be available. This issue affects CiscoWorks IPM 2.6 and earlier for Microsoft Windows. More details can be found at: http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1351d.shtml -- Disclosure Timeline: 2008-10-15 - Vulnerability reported to vendor 2010-01-21 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/. There are no workarounds for this vulnerability. This advisory is posted at: http://www.cisco.com/warp/public/707/cisco-sa-20100120-ipm.shtml Affected Products ================= Vulnerable Products +------------------ CiscoWorks IPM versions 2.6 and earlier for Windows operating systems are affected. Products Confirmed Not Vulnerable +-------------------------------- CiscoWorks IPM version 2.x for Sun Solaris and CiscoWorks IPM version 4.x for Windows and Solaris operating systems are not affected. No other Cisco products are currently known to be affected by this vulnerability. Details ======= CiscoWorks IPM is a troubleshooting application that gauges network response time and availability. CiscoWorks IPM is available as a component within the CiscoWorks LAN Management Solution (LMS) bundle. Vulnerability Scoring Details ============================= Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0. CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response. Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks. Cisco has provided an FAQ to answer additional questions regarding CVSS at: http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at: http://intellishield.cisco.com/security/alertmanager/cvss CSCsv62350 - Malformed CORBA GIOP request causes crash CVSS Base Score - 10 Access Vector - Network Access Complexity - Low Authentication - None Confidentiality Impact - Complete Integrity Impact - Complete Availability Impact - Complete CVSS Temporal Score - 9.5 Exploitability - Functional Remediation Level - Unavailable Report Confidence - Confirmed Impact ====== Successful exploitation of the vulnerability may result in the ability to execute arbitrary code with SYSTEM privileges on affected Windows systems. Software Versions and Fixes =========================== Ciscoworks IPM versions 2.6 and earlier for Windows contain a vulnerable third-party component that is no longer supported. Cisco is unable to provide updated software for affected CiscoWorks versions. Consult the "Obtaining Fixed Software" section of this advisory for instructions on how to address vulnerable systems. Workarounds =========== There are no workarounds for this vulnerability. It is possible to mitigate this vulnerability by restricting network access to TCP ports on an affected Windows system running IPM versions 2.6 and earlier to trusted systems. Additional mitigation techniques that can be deployed on Cisco devices within the network are available in the Cisco Applied Mitigation Bulletin companion document for this advisory: http://www.cisco.com/warp/public/707/cisco-amb-20100120-ipm.shtml Obtaining Fixed Software ======================== Ciscoworks IPM versions 2.6 and earlier for Windows contain a vulnerable third-party component that is no longer supported. Cisco is unable to provide updated software for affected CiscoWorks versions. Customers with active software licenses for the IPM component of CiscoWorks versions 2.6 and earlier for Windows should send email to the following address for instructions on migrating to non-vulnerable software: ipm-corba-fix@cisco.com Exploitation and Public Announcements ===================================== The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory. This vulnerability was discovered and reported to Cisco by TippingPoint. Cisco would like to thank TippingPoint for reporting this vulnerability to us and for working with us on a coordinated disclosure. Status of this Notice: FINAL ============================ THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Distribution ============ This advisory is posted on Cisco's worldwide website at: http://www.cisco.com/warp/public/707/cisco-sa-20100120-ipm.shtml In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients. * cust-security-announce@cisco.com * first-bulletins@lists.first.org * bugtraq@securityfocus.com * vulnwatch@vulnwatch.org * cisco@spot.colorado.edu * cisco-nsp@puck.nether.net * full-disclosure@lists.grok.org.uk * comp.dcom.sys.cisco@newsgate.cisco.com Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. Revision History ================ +---------------------------------------+ | Revision | | Initial | | 1.0 | 2010-January-20 | public | | | | release | +---------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at: http://www.cisco.com/go/psirt -----BEGIN PGP SIGNATURE----- iD8DBQFLVyd986n/Gc8U/uARAmqKAJ4stu5goWKa8rPjt20IJNirQ3DLQQCeLeGN SZmNQcg8O+mfC61WXL0oRRI= =CVJH -----END PGP SIGNATURE----- . Restrict network access to an affected system. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20100120-ipm.shtml OTHER REFERENCES: http://www.cisco.com/warp/public/707/cisco-amb-20100120-ipm.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2010-0138 // JVNDB: JVNDB-2010-003773 // ZDI: ZDI-10-004 // BID: 37879 // VULHUB: VHN-42743 // PACKETSTORM: 85498 // PACKETSTORM: 85456 // PACKETSTORM: 85487

AFFECTED PRODUCTS

vendor:ciscomodel:ciscoworks internetwork performance monitorscope:eqversion:2.5

Trust: 1.9

vendor:ciscomodel:ciscoworks internetwork performance monitorscope:lteversion:2.6

Trust: 1.8

vendor:ciscomodel:ciscoworks internetwork performance monitorscope:eqversion:2.4

Trust: 1.6

vendor:ciscomodel:ciscoworks internetwork performance monitorscope:eqversion:2.6

Trust: 0.9

vendor:microsoftmodel:windowsscope: - version: -

Trust: 0.8

vendor:ciscomodel:internetwork performance monitorscope: - version: -

Trust: 0.7

vendor:ciscomodel:internetwork performance monitor serverscope:eqversion:2.4

Trust: 0.3

sources: ZDI: ZDI-10-004 // BID: 37879 // JVNDB: JVNDB-2010-003773 // CNNVD: CNNVD-201001-234 // NVD: CVE-2010-0138

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0138
value: HIGH

Trust: 1.0

NVD: CVE-2010-0138
value: HIGH

Trust: 0.8

ZDI: CVE-2010-0138
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201001-234
value: CRITICAL

Trust: 0.6

VULHUB: VHN-42743
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-0138
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

VULHUB: VHN-42743
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-10-004 // VULHUB: VHN-42743 // JVNDB: JVNDB-2010-003773 // CNNVD: CNNVD-201001-234 // NVD: CVE-2010-0138

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-42743 // JVNDB: JVNDB-2010-003773 // NVD: CVE-2010-0138

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 85498 // PACKETSTORM: 85456 // CNNVD: CNNVD-201001-234

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201001-234

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003773

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-42743

PATCH

title:cisco-sa-20100120-ipmurl:http://www.cisco.com/en/US/products/csa/cisco-sa-20100120-ipm.html

Trust: 0.8

title:Top Pageurl:http://windows.microsoft.com/

Trust: 0.8

title:Cisco has issued an update to correct this vulnerability.url:http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1351d.shtml

Trust: 0.7

sources: ZDI: ZDI-10-004 // JVNDB: JVNDB-2010-003773

EXTERNAL IDS

db:NVDid:CVE-2010-0138

Trust: 3.7

db:ZDIid:ZDI-10-004

Trust: 2.8

db:BIDid:37879

Trust: 2.0

db:SECUNIAid:38230

Trust: 1.8

db:VUPENid:ADV-2010-0184

Trust: 1.7

db:SECTRACKid:1023484

Trust: 1.7

db:JVNDBid:JVNDB-2010-003773

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-396

Trust: 0.7

db:CNNVDid:CNNVD-201001-234

Trust: 0.7

db:NSFOCUSid:14382

Trust: 0.6

db:XFid:55768

Trust: 0.6

db:CISCOid:20100120 CISCOWORKS INTERNETWORK PERFORMANCE MONITOR CORBA GIOP OVERFLOW VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:85498

Trust: 0.2

db:PACKETSTORMid:85456

Trust: 0.2

db:VULHUBid:VHN-42743

Trust: 0.1

db:PACKETSTORMid:85487

Trust: 0.1

sources: ZDI: ZDI-10-004 // VULHUB: VHN-42743 // BID: 37879 // JVNDB: JVNDB-2010-003773 // PACKETSTORM: 85498 // PACKETSTORM: 85456 // PACKETSTORM: 85487 // CNNVD: CNNVD-201001-234 // NVD: CVE-2010-0138

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b1351d.shtml

Trust: 2.5

url:http://www.zerodayinitiative.com/advisories/zdi-10-004/

Trust: 2.0

url:http://www.securityfocus.com/bid/37879

Trust: 1.7

url:http://securitytracker.com/id?1023484

Trust: 1.7

url:http://secunia.com/advisories/38230

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/0184

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55768

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0138

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0138

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/55768

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14382

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20100120-ipm.shtml

Trust: 0.5

url:http://www.cisco.com/en/us/products/sw/cscowork/ps1008/

Trust: 0.3

url:/archive/1/509070

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-0138

Trust: 0.2

url:http://www.cisco.com/warp/public/707/cisco-amb-20100120-ipm.shtml

Trust: 0.2

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-10-004

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html.

Trust: 0.1

url:http://www.cisco.com/go/psirt

Trust: 0.1

url:http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html

Trust: 0.1

url:http://intellishield.cisco.com/security/alertmanager/cvss

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/38230/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: ZDI: ZDI-10-004 // VULHUB: VHN-42743 // BID: 37879 // JVNDB: JVNDB-2010-003773 // PACKETSTORM: 85498 // PACKETSTORM: 85456 // PACKETSTORM: 85487 // CNNVD: CNNVD-201001-234 // NVD: CVE-2010-0138

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-10-004

SOURCES

db:ZDIid:ZDI-10-004
db:VULHUBid:VHN-42743
db:BIDid:37879
db:JVNDBid:JVNDB-2010-003773
db:PACKETSTORMid:85498
db:PACKETSTORMid:85456
db:PACKETSTORMid:85487
db:CNNVDid:CNNVD-201001-234
db:NVDid:CVE-2010-0138

LAST UPDATE DATE

2025-04-11T22:54:23.666000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-10-004date:2010-01-21T00:00:00
db:VULHUBid:VHN-42743date:2017-08-17T00:00:00
db:BIDid:37879date:2010-01-21T15:31:00
db:JVNDBid:JVNDB-2010-003773date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-201001-234date:2010-01-22T00:00:00
db:NVDid:CVE-2010-0138date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-10-004date:2010-01-21T00:00:00
db:VULHUBid:VHN-42743date:2010-01-21T00:00:00
db:BIDid:37879date:2010-01-20T00:00:00
db:JVNDBid:JVNDB-2010-003773date:2012-06-26T00:00:00
db:PACKETSTORMid:85498date:2010-01-22T06:34:02
db:PACKETSTORMid:85456date:2010-01-21T02:28:56
db:PACKETSTORMid:85487date:2010-01-21T10:22:39
db:CNNVDid:CNNVD-201001-234date:2010-01-21T00:00:00
db:NVDid:CVE-2010-0138date:2010-01-21T22:30:00.523