Short Name |
APP:IBM:DIRECTOR-CIM-DOS |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
IBM Director CIM Server Consumer Name Handling Denial of Service |
Release Date |
2011/07/20 |
Update Number |
1959 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the CIM Server of IBM Director. The vulnerability is due to errors when processing certain types of requests. A remote attacker can exploit this vulnerability by sending crafted requests to the target host. Successful exploitation would be a denial of service (DoS) condition of System Director services on the target host. In a successful attack case, the affected server will terminate and will not be available until the service is manually restarted.
The CIM Server of IBM Director is prone to a remote denial-of-service vulnerability because the application fails to properly handle specially crafted requests. Successfully exploiting this issue allows remote attackers to trigger crashes, which would deny further service to legitimate users. This issue affects versions prior to IBM Director 5.20.3 Service Update 2.