{"vuid":"VU#512193","idnumber":"512193","name":"IBM Director fails to properly time-out connection requests from clients","keywords":["IBM","Director","DoS","denial of service","time-out","rogue connection requests","clients"],"overview":"IBM Director Systems, specifically CIM Server, contains a denial-of-service vulnerability that can allow a remote, unauthenticated attacker to render Director inoperative.","clean_desc":"IBM Director is a suite of system management tools. When a rogue connection request is made to IBM Director Systems, specifically the CIM Server, a thread is created that listens on a port, waiting for a specific response from the client. If the client does not send the expected response, the thread remains in memory listening, indicating a high CPU utilization until the client connects to it. If multiple rogue clients connect simultaneously, the finite number of connections can be exhausted causing server to crash. Versions 5.20.1 and earlier for Windows and Linux are affected.","impact":"IBM Director Systems will become inaccessible for management.","resolution":"Apply an update Download and Apply the patch for Windows and Linux systems here: https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dmp","workarounds":"Block or restrict access Employ other protection mechanisms that will restrict access to the Director Systems by installing firewalls, defining filters, or by using reverse proxies.","sysaffected":"","thanks":"Thanks to IBM  for reporting this vulnerability, who in turn credit Juniper Networks.","author":"This document was written by Will Dormann.","public":["https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dmp","http://www-03.ibm.com/systems/management/director/"],"cveids":["CVE-2007-5612"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-11-13T15:30:56Z","publicdate":"2007-11-20T00:00:00Z","datefirstpublished":"2007-11-20T21:16:14Z","dateupdated":"2007-11-20T21:19:16Z","revision":5,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"2","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"6","cam_impact":"3","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"0.91125","cam_scorecurrentwidelyknown":"2.278125","cam_scorecurrentwidelyknownexploited":"3.796875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.91125,"vulnote":null}