ID

VAR-200901-0308


CVE

CVE-2009-0270


TITLE

Fujitsu SystemcastWizard Lite of PXEService.exe Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2009-001631

DESCRIPTION

Stack-based buffer overflow in PXEService.exe in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to execute arbitrary code via a large PXE protocol request in a UDP packet. Products that use the Preboot Execution Environment (PXE) SDK sample code provided by Intel contain multiple vulnerabilities. Products that use the PXE SDK sample code provided by Intel contain directory traversal and buffer overflow vulnerabilities. Nobuyuki Kanaya of Fujitsu Laboratories Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information stored by the product using the PXE SDK sample code may be viewed, or arbitrary code may be executed. Fujitsu Systemcast Wizard Lite is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied input. Attackers can leverage this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions. Systemcast Wizard Lite 2.0A and prior are vulnerable. ---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Fujitsu SystemcastWizard Lite Multiple Vulnerabilities SECUNIA ADVISORY ID: SA33594 VERIFY ADVISORY: http://secunia.com/advisories/33594/ CRITICAL: Moderately critical IMPACT: Exposure of system information, Exposure of sensitive information, DoS, System access WHERE: >From remote SOFTWARE: Fujitsu SystemcastWizard Lite 2.x http://secunia.com/advisories/product/21065/ Fujitsu SystemcastWizard Lite 1.x http://secunia.com/advisories/product/21064/ DESCRIPTION: Some vulnerabilities have been reported in Fujitsu SystemcastWizard Lite, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system. Successful exploitation allows execution of arbitrary code. 2) An input validation error in the TFTP service can be exploited to download files from arbitrary locations via directory traversal sequences. The vulnerabilities are reported in versions 2.0, 2.0A, and prior 1.x versions. SOLUTION: Apply vendor patch for versions after 1.6A. Reportedly, a patch for previous versions will be available later. PROVIDED AND/OR DISCOVERED BY: 1) Ruben Santamarta, Wintercore 2) Reported by the vendor. ORIGINAL ADVISORY: Fujitsu: http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html Ruben Santamarta: http://www.wintercore.com/advisories/advisory_W010109.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2009-0270 // JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102 // BID: 33342 // PACKETSTORM: 74113

AFFECTED PRODUCTS

vendor:fujitsumodel:systemcastwizard litescope:lteversion:2.0a

Trust: 1.8

vendor:fujitsumodel:systemcastwizard litescope:eqversion:1.7

Trust: 1.6

vendor:fujitsumodel:systemcastwizard litescope:eqversion:1.8

Trust: 1.6

vendor:fujitsumodel:systemcastwizard litescope:eqversion:1.8a

Trust: 1.6

vendor:fujitsumodel:systemcastwizard litescope:eqversion:2.0

Trust: 1.6

vendor:fujitsumodel:systemcastwizard litescope:eqversion:1.9

Trust: 1.6

vendor:fujitsumodel:systemcastwizard litescope:lteversion:v2.0a

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/deployment managerscope:eqversion:enterprise edition

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/deployment managerscope:eqversion:standard edition

Trust: 0.8

vendor:hitachimodel:serverconductor/deployment managerscope: - version: -

Trust: 0.8

vendor:necmodel:websam deploymentmanagerscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemcastwizard litescope:eqversion:2.0a

Trust: 0.6

vendor:fujitsumodel:systemcast wizard lite 2.0ascope: - version: -

Trust: 0.3

vendor:fujitsumodel:systemcast wizard litescope:eqversion:2.0

Trust: 0.3

vendor:fujitsumodel:systemcast wizard litescope:eqversion:1.9

Trust: 0.3

vendor:fujitsumodel:systemcast wizard lite 1.8ascope: - version: -

Trust: 0.3

vendor:fujitsumodel:systemcast wizard litescope:eqversion:1.8

Trust: 0.3

vendor:fujitsumodel:systemcast wizard litescope:eqversion:1.7

Trust: 0.3

sources: BID: 33342 // JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102 // CNNVD: CNNVD-200901-337 // NVD: CVE-2009-0270

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0270
value: HIGH

Trust: 1.0

NVD: CVE-2009-0270
value: HIGH

Trust: 0.8

IPA: JVNDB-2011-000102
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200901-337
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2009-0270
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IPA: JVNDB-2011-000102
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102 // CNNVD: CNNVD-200901-337 // NVD: CVE-2009-0270

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 2.6

problemtype:CWE-22

Trust: 0.8

sources: JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102 // NVD: CVE-2009-0270

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200901-337

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200901-337

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001631

PATCH

title:Precautions when using Windows Server 2008url:http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html

Trust: 1.6

title:HS11-026url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-026/index.html

Trust: 0.8

title:NV11-007url:http://www.nec.co.jp/security-info/secinfo/nv11-007.html

Trust: 0.8

sources: JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102

EXTERNAL IDS

db:NVDid:CVE-2009-0270

Trust: 3.5

db:BIDid:33342

Trust: 1.9

db:SECUNIAid:33594

Trust: 1.7

db:OSVDBid:51486

Trust: 1.6

db:VUPENid:ADV-2009-0176

Trust: 1.6

db:JVNDBid:JVNDB-2009-001631

Trust: 0.8

db:JVNid:JVN05255562

Trust: 0.8

db:JVNDBid:JVNDB-2011-000102

Trust: 0.8

db:BUGTRAQid:20090119 [WINTERCORE RESEARCH ] FUJITSU SYSTEMCASTWIZARD LITE PXESERVICE REMOTE BUFFER OVERFLOW.

Trust: 0.6

db:CNNVDid:CNNVD-200901-337

Trust: 0.6

db:PACKETSTORMid:74113

Trust: 0.1

sources: BID: 33342 // JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102 // PACKETSTORM: 74113 // CNNVD: CNNVD-200901-337 // NVD: CVE-2009-0270

REFERENCES

url:http://www.wintercore.com/advisories/advisory_w010109.html

Trust: 1.7

url:http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0270

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0270

Trust: 1.6

url:http://www.securityfocus.com/bid/33342

Trust: 1.6

url:http://secunia.com/advisories/33594

Trust: 1.6

url:http://osvdb.org/51486

Trust: 1.6

url:http://www.securityfocus.com/archive/1/500172/100/0/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2009/0176

Trust: 1.0

url:https://jvn.jp/en/jp/jvn05255562/index.html

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/500172/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2009/0176

Trust: 0.6

url:http://www.fujitsu.com/

Trust: 0.3

url:http://www.fujitsu.com/global/services/computing/server/primequest/downloads/tools/

Trust: 0.3

url:http://www.fujitsu.com/global/services/computing/server/primequest/downloads/tools/index.html#systemcastwizardlitepatch

Trust: 0.3

url:/archive/1/500172

Trust: 0.3

url:http://secunia.com/advisories/product/21065/

Trust: 0.1

url:http://secunia.com/advisories/33594/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/21064/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: BID: 33342 // JVNDB: JVNDB-2009-001631 // JVNDB: JVNDB-2011-000102 // PACKETSTORM: 74113 // CNNVD: CNNVD-200901-337 // NVD: CVE-2009-0270

CREDITS

Ruben Santamarta ruben@reversemode.com

Trust: 0.6

sources: CNNVD: CNNVD-200901-337

SOURCES

db:BIDid:33342
db:JVNDBid:JVNDB-2009-001631
db:JVNDBid:JVNDB-2011-000102
db:PACKETSTORMid:74113
db:CNNVDid:CNNVD-200901-337
db:NVDid:CVE-2009-0270

LAST UPDATE DATE

2024-08-14T12:50:54.908000+00:00


SOURCES UPDATE DATE

db:BIDid:33342date:2009-02-17T15:48:00
db:JVNDBid:JVNDB-2009-001631date:2009-07-08T00:00:00
db:JVNDBid:JVNDB-2011-000102date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-200901-337date:2009-03-06T00:00:00
db:NVDid:CVE-2009-0270date:2018-10-11T21:01:06.037

SOURCES RELEASE DATE

db:BIDid:33342date:2009-01-19T00:00:00
db:JVNDBid:JVNDB-2009-001631date:2009-07-08T00:00:00
db:JVNDBid:JVNDB-2011-000102date:2011-12-15T00:00:00
db:PACKETSTORMid:74113date:2009-01-20T15:48:43
db:CNNVDid:CNNVD-200901-337date:2009-01-26T00:00:00
db:NVDid:CVE-2009-0270date:2009-01-26T19:30:00.437