ID CVE-2012-2328
Summary internal/cimxml/sax/NodeFactory.java in Standards-Based Linux Instrumentation for Manageability (SBLIM) Common Information Model (CIM) Client (aka sblim-cim-client2) before 2.1.12 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML file.
References
Vulnerable Configurations
  • Standards-Based Linux Instrumentation for Manageability (SBLIM) Project Common Information Model (CIM) Client (aka sblim-cim-client2) 2.1.11
    cpe:2.3:a:standards_based_linux_instrumentation_project:standards-based_linux_common_information_model_client:2.1.11
  • OpenSUSE 11.4
    cpe:2.3:o:opensuse:opensuse:11.4
  • OpenSUSE 12.1
    cpe:2.3:o:opensuse:opensuse:12.1
  • OpenSUSE 12.2
    cpe:2.3:o:opensuse:opensuse:12.2
CVSS
Base: 5.0 (as of 10-02-2014 - 15:28)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0987.NASL
    description Updated sblim-cim-client2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The SBLIM (Standards-Based Linux Instrumentation for Manageability) CIM (Common Information Model) Client is a class library for Java applications that provides access to CIM servers using the CIM Operations over HTTP protocol defined by the DMTF (Distributed Management Task Force) standards. It was found that the Java HashMap implementation was susceptible to predictable hash collisions. SBLIM uses HashMap when parsing XML inputs. A specially crafted CIM-XML message from a WBEM (Web-Based Enterprise Management) server could cause a SBLIM client to use an excessive amount of CPU. Randomization has been added to help avoid collisions. (CVE-2012-2328) All users of sblim-cim-client2 are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 59935
    published 2012-07-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59935
    title CentOS 6 : sblim-cim-client2 (CESA-2012:0987)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0987.NASL
    description Updated sblim-cim-client2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The SBLIM (Standards-Based Linux Instrumentation for Manageability) CIM (Common Information Model) Client is a class library for Java applications that provides access to CIM servers using the CIM Operations over HTTP protocol defined by the DMTF (Distributed Management Task Force) standards. It was found that the Java HashMap implementation was susceptible to predictable hash collisions. SBLIM uses HashMap when parsing XML inputs. A specially crafted CIM-XML message from a WBEM (Web-Based Enterprise Management) server could cause a SBLIM client to use an excessive amount of CPU. Randomization has been added to help avoid collisions. (CVE-2012-2328) All users of sblim-cim-client2 are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 59600
    published 2012-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59600
    title RHEL 6 : sblim-cim-client2 (RHSA-2012:0987)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120620_SBLIM_CIM_CLIENT2_ON_SL6.NASL
    description The SBLIM (Standards-Based Linux Instrumentation for Manageability) CIM (Common Information Model) Client is a class library for Java applications that provides access to CIM servers using the CIM Operations over HTTP protocol defined by the DMTF (Distributed Management Task Force) standards. It was found that the Java HashMap implementation was susceptible to predictable hash collisions. SBLIM uses HashMap when parsing XML inputs. A specially crafted CIM-XML message from a WBEM (Web-Based Enterprise Management) server could cause a SBLIM client to use an excessive amount of CPU. Randomization has been added to help avoid collisions. (CVE-2012-2328) All users of sblim-cim-client2 are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61349
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61349
    title Scientific Linux Security Update : sblim-cim-client2 on SL6.x
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-839.NASL
    description This update of sblim-cim-client2 fixed a Denial of Service (via hash table collision) issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74832
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74832
    title openSUSE Security Update : sblim-cim-client2 (openSUSE-SU-2012:1621-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0987.NASL
    description From Red Hat Security Advisory 2012:0987 : Updated sblim-cim-client2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The SBLIM (Standards-Based Linux Instrumentation for Manageability) CIM (Common Information Model) Client is a class library for Java applications that provides access to CIM servers using the CIM Operations over HTTP protocol defined by the DMTF (Distributed Management Task Force) standards. It was found that the Java HashMap implementation was susceptible to predictable hash collisions. SBLIM uses HashMap when parsing XML inputs. A specially crafted CIM-XML message from a WBEM (Web-Based Enterprise Management) server could cause a SBLIM client to use an excessive amount of CPU. Randomization has been added to help avoid collisions. (CVE-2012-2328) All users of sblim-cim-client2 are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68564
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68564
    title Oracle Linux 6 : sblim-cim-client2 (ELSA-2012-0987)
redhat via4
advisories
bugzilla
id 819733
title CVE-2012-2328 sblim: hash table collisions CPU usage DoS
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhba:tst:20111656001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhba:tst:20111656002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20111656004
  • OR
    • AND
      • comment sblim-cim-client2 is earlier than 0:2.1.3-2.el6
        oval oval:com.redhat.rhsa:tst:20120987005
      • comment sblim-cim-client2 is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20120987006
    • AND
      • comment sblim-cim-client2-javadoc is earlier than 0:2.1.3-2.el6
        oval oval:com.redhat.rhsa:tst:20120987009
      • comment sblim-cim-client2-javadoc is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20120987010
    • AND
      • comment sblim-cim-client2-manual is earlier than 0:2.1.3-2.el6
        oval oval:com.redhat.rhsa:tst:20120987007
      • comment sblim-cim-client2-manual is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20120987008
rhsa
id RHSA-2012:0987
released 2012-06-20
severity Low
title RHSA-2012:0987: sblim-cim-client2 security update (Low)
rpms
  • sblim-cim-client2-0:2.1.3-2.el6
  • sblim-cim-client2-javadoc-0:2.1.3-2.el6
  • sblim-cim-client2-manual-0:2.1.3-2.el6
refmap via4
confirm http://sourceforge.net/p/sblim/bugs/2381/
misc http://sblim.cvs.sourceforge.net/viewvc/sblim/jsr48-client/src/org/sblim/cimclient/internal/cimxml/sax/NodeFactory.java?view=log#rev1.7
suse
  • openSUSE-SU-2012:1621
  • openSUSE-SU-2013:0144
Last major update 10-02-2014 - 15:28
Published 10-02-2014 - 13:15
Last modified 30-10-2018 - 12:27
Back to Top