Overview
The IntelliCom NetBiter Config HICP configuration utility has a buffer overflow vulnerability that can be triggered by a specially crafted hostname (hn) value. An attacker with network access could exploit this vulnerability to execute arbitrary code with the privileges of the user running NetBiter Config.
Description
IntelliCom NetBiter devices are based on HMS Anybus technology. The HMS HICP protocol (3250/udp) provides a way to configure network settings for NetBiter and possibly other Anybus-based devices. The NetBiter Config HICP configuration utility (NetbiterConfig.exe) has a buffer overflow vulnerability that can be triggered by a specially crafted hostname (hn) value. Further details are available in the original post by Rubén Santamarta. |
Impact
An attacker with network access could exploit this vulnerability to execute arbitrary code with the privileges of the user running NetBiter Config. |
Solution
Upgrade This vulnerability is addressed in NetBiter Config version 1.3.1. Please see IntelliCom Security Bulletin ISFR-4404-0007. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://blog.48bits.com/?p=781
- http://reversemode.com/index.php?option=com_content&task=view&id=65&Itemid=1
- http://www.hms.se/products/prodindex.shtml
- http://www.anybus.com/products/abxsstech.shtml
- http://support.intellicom.se/news.cfm?NWID=33
- http://support.intellicom.se/getfile.cfm?FID=150
- http://www.securityfocus.com/bid/37328
Acknowledgements
This information was published by Rubén Santamarta.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2009-4462 |
Severity Metric: | 0.48 |
Date Public: | 2009-12-12 |
Date First Published: | 2010-03-24 |
Date Last Updated: | 2010-03-26 17:54 UTC |
Document Revision: | 19 |