Overview
Internet Security Systems' BlackICE and RealSecure intrusion detection products contain a remotely exploitable vulnerability. Exploitation of this vulnerability could lead to the compromise of the system with privileges of the vulnerable process, typically the "SYSTEM" user.
Description
Internet Security Systems (ISS) has two lines of intrusion detection and prevention products, BlackICE and RealSecure. A heap overflow vulnerability has been discovered in the code that processes Server Message Block (SMB) packets. Since all packets are processed by these products, this vulnerability can be exploited even when the utilities are set to their most restrictive settings. When these products receive an SMB packet, the packet is disassembled, processed and reassembled. The vulnerability occurs in the code that reassembles the SMB packet. eEye Digital Security has released an advisory and according to their advisory, this vulnerability can be remotely exploited via a single crafted SMB packet.
ISS has also released an advisory about this issue, available at http://xforce.iss.net/xforce/alerts/id/165. Quoting from the ISS advisory: Externally facing networks that do not allow SMB connections are not vulnerable to attack. Furthermore, ISS has released the following updates to correct this problem
We encourage you to apply these updates as soon as practical. |
Impact
Exploitation of this vulnerability could lead to the execution of arbitrary code on the system with privileges of the vulnerable process, typically the "SYSTEM" user on the windows platform. |
Solution
This vulnerability has been fixed in both the BlackICE and RealSecure releases.
|
Until a patch can be applied, blocking SMB traffic at your network perimeter may mitigate the risk this vulnerability presents. this may or may not be practical based on network configuration and requirements. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to eEye Digital Security for reporting this vulnerability.
This document was written by Jason A Rafail and Shawn Hernan based on information supplied by ISS and Eeye.
Other Information
CVE IDs: | None |
Severity Metric: | 12.12 |
Date Public: | 2004-02-13 |
Date First Published: | 2004-02-27 |
Date Last Updated: | 2004-02-27 15:44 UTC |
Document Revision: | 25 |