Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.
CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow.
Exe copies user-supplied data to a fixed-size stack-based buffer.
An unauthenticated remote attacker can specify a long MuProperty type 100 to overflow the buffer.
Exe in Avalanche v6.4.1.text:0042AF00 mov ecx, ; attacker-controlled token size.
Text:0042AF03 mov esi, ; attacker-controlled token data.
Text:0042AF06 lea edi, [ebp+buf80] ; fixed-size stack buf ->.
Text:0042AF0E shr ecx, 2.text:0042AF11 memcpy.
Python3 avalanche v6.4.1 WLAvalancheService stack bof.
Exe eax=00001000 ebx=025ab100 ecx=000002a2 edx=00000000 esi=0274ee11 edi=04cc0000 eip=0042af11 esp=04cbfa4c ebp=04cbfb1c iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 WLAvalancheService+0x2af11: 0042af11 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] 0:041> kb # ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available.
An unauthenticated remote attacker can specify a long MuProperty type 101 to overflow the buffer.
Exe in Avalanche v6.4.1.text:0042B1A7 mov ecx, ; attacker-controlled token size.
Text:0042B1AA mov esi, ; attacker-controlled token data.
Text:0042B1AD lea edi, [ebp+buf80] ; fixed-size stack buf ->.
Exe eax=00001000 ebx=025c8a68 ecx=000002a2 edx=00000001 esi=02765621 edi=04f60000 eip=0042b1b8 esp=04f5fa4c ebp=04f5fb1c iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 WLAvalancheService+0x2b1b8: 0042b1b8 f3a5 rep movs dword ptr es:[edi],dword ptr [esi] 0:042> kb # ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available.
An unauthenticated remote attacker can specify a long MuProperty type 102 to overflow the buffer.
Exe in Avalanche v6.4.1.text:0042B27D mov ecx, ; attacker-controlled token size.
Text:0042B280 mov esi, ; attacker-controlled token data.
Text:0042B283 lea edi, [ebp+buf80] ; fixed-size stack buf ->.
Exe eax=00001000 ebx=025cbc48 ecx=000002a2 edx=0275ab2a esi=0275a0a1 edi=04f60000 eip=0042b28e esp=04f5fa4c ebp=04f5fb1c iopl=0 nv up ei pl nz na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 WLAvalancheService+0x2b28e: 0042b28e f3a5 rep movs dword ptr es:[edi],dword ptr [esi] 0:044> kb # ChildEBP RetAddr Args to Child WARNING: Stack unwind information not available.
This Cyber News was published on www.tenable.com. Publication date: Mon, 18 Dec 2023 18:20:06 +0000