Fortinet Discovers Multiple Vulnerabilities In HP StorageWorks Storage Mirroring

Summary

Fortinet's FortiGuard has discovered multiple vulnerabilities in HP StorageWorks Storage Mirroring.

Solutions

FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:

HP.StorageWorks.Storage.Mirroring.Auto.Discovery.Heap.Overflow
Released Mar 30, 2009
Use the solution provided by HP.

Additional Information

A heap-based buffer overflow vulnerability exists in the HP StorageWorks Storage Mirroring Auto-Discovery Module that can lead to remote code execution. This is due to invalid bounds checking. Attackers can exploit this vulnerability by sending a malformed UDP packet.
A denial of service vulnerability exists in the HP StorageWorks Storage Mirroring Management Console. Attackers can exploit this vulnerability by sending a malformed UDP packet to port 1100 where the HP StorageWorks Storage Mirroring Management Console listens.
A weak password encryption algorithm is used in the HP StorageWorks Storage Mirroring Log-on Module. Attackers can easily acquire the password in cleartext.

Acknowledgement

Zhenhua Liu, Junfeng Jia, and Xiaopeng Zhang of Fortinet's FortiGuard Global Security Research Team

IPS Subscription

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this vulnerability with the appropriate configuration parameters in place. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.