Executive Summary

Summary
Title Flexera Software FlexNet Publisher lmgrd contains a buffer overflow vulnerability
Informations
Name VU#485744 First vendor Publication 2016-02-22
Vendor VU-CERT Last vendor Modification 2016-04-04
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#485744

Flexera Software FlexNet Publisher lmgrd contains a buffer overflow vulnerability

Original Release date: 22 Feb 2016 | Last revised: 04 Apr 2016

Overview

Flexera Software FlexNet Publisher, including all versions prior to 11.13.1.2, lmgrd and custom vendor daemon servers contain a buffer overflow vulnerability that may be leveraged to gain code execution.

Description

Flexera Software FlexNet Publisher is a software license manager that provides licensing models and solutions for software vendors. A buffer overflow vulnerability in a string copying function of lmgrd and custom vendor daemon servers may enable a remote attacker to execute arbitrary code in affected server hosts.

For more information, refer to the researchers'blog post and advisory.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code in affected server hosts.

Solution

Apply an update

Software vendors that distribute vulnerable lmgrd or vendor daemon components should obtain FlexNet Publisher 2015 (11.13.1.2) Security Update 1 or later from Flexera Software's Product and License Center. Users of affected software should contact product vendors for update information.

Vendor Information (Learn More)

Note that any vendor that distributes lmgrd or a customized version with their products may be affected. As the CERT/CC becomes aware of specific vendors and products, we will add them to the list below.

VendorStatusDate NotifiedDate Updated
CitrixAffected-10 Mar 2016
Flexera SoftwareAffected-22 Feb 2016
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base10.0AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal7.8E:POC/RL:OF/RC:C
Environmental5.9CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://learn.flexerasoftware.com/content/ECM-EVAL-FlexNet-Publisher
  • https://flexerasoftware.flexnetoperations.com/control/inst/index
  • http://securitymumblings.blogspot.com/2016/02/cve-2015-8277.html
  • https://www.securifera.com/advisories/cve-2015-8277

Credit

Thanks to Matthew Benton, Ryan Wincey, and Richard Kelley for reporting this vulnerability.

This document was written by Joel Land.

Other Information

  • CVE IDs:CVE-2015-8277
  • Date Public:22 Feb 2016
  • Date First Published:22 Feb 2016
  • Date Last Updated:04 Apr 2016
  • Document Revision:26

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/485744

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Snort® IPS/IDS

Date Description
2019-05-30 Flexera FlexNet Publisher stack buffer overflow attempt
RuleID : 49968 - Revision : 2 - Type : SERVER-OTHER
2016-09-27 Flexera FlexNet Publisher stack buffer overflow attempt
RuleID : 39910 - Revision : 6 - Type : SERVER-OTHER
2016-04-19 Flexera FlexNet Publisher stack buffer overflow attempt
RuleID : 38247 - Revision : 6 - Type : SERVER-OTHER
2016-04-19 Flexera FlexNet Publisher stack buffer overflow attempt
RuleID : 38246 - Revision : 6 - Type : SERVER-OTHER

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2016-04-04 21:24:25
  • Multiple Updates
2016-03-11 00:29:13
  • Multiple Updates
2016-03-11 00:23:59
  • Multiple Updates
2016-03-07 17:29:00
  • Multiple Updates
2016-02-24 09:29:09
  • Multiple Updates
2016-02-23 21:29:30
  • Multiple Updates
2016-02-23 21:24:28
  • Multiple Updates
2016-02-22 21:29:03
  • Multiple Updates
2016-02-22 21:24:04
  • First insertion