IMPORTANT ANNOUNCEMENT: On May 6, 2024, Carbon Black User eXchange (UeX) and Case Management will move to a new platform!
The Community will be in read-only mode starting April 19th, 7:00 AM PDT. Check out the blog post!
You will still be able to use the case portal to create and interact with your support cases until the transition, view more information here!

CB17-002 - Improper bounds checking may lead to denial of service

CB17-002 - Improper bounds checking may lead to denial of service

Details

Product

Cb Response

Version Reported

5.1.1

Version Resolved

5.2.6

Severity Rating

Low

Exploitability

Low

Remediation - Cloud

Cb Response 5.2.6 and greater

Remediation - On Premises

Cb Response 5.2.6 and greater

CVECVE-2016-9570 & CVE-2016-9569

Executive Summary

Multiple failures to properly bounds check input have been reported in Cb Response 5.1.1 sensor for Microsoft Windows operating systems. The vulnerability has been addressed in Cb Response 5.2.6 Windows Sensor.

The vulnerability is possible only under certain conditions, as documented in the ‘Mitigating Factors’ section.  The vulnerabilities are not expected to be exploitable.

Type and Rating

Rating Type

Rating

Severity

Low

Exploitability

Low

The Severity rating for this vulnerability is “Low” since the vulnerability is a crash of the CB Sensor.  The Exploitability rating for this vulnerability is “Low” due to the privileged access required.

Remediation

Whether you are an on-premises deployment or a cloud installation, these vulnerabilities are fully remediated by upgrading to Cb Response Sensor 5.2.6. Customers running all prior versions of the software are advised to upgrade.

The Cb Response Sensor 5.2.6 is available through the normal upgrade process.

Mitigating Factors

Privileged access to the system in question is required to deliver the malformed input.  Cb recommends limiting privileged access to all machines to ensure a strong security boundary is maintained.

Workarounds

There are no immediate workarounds for these vulnerabilities.  Customers are encouraged to upgrade Cb Response Windows sensors to 5.2.6.

Credits

Carbon Black would like to thank Kyriakos Economou of Nettitude for reporting this vulnerability to the Product Security team at Carbon Black.

Labels (1)
Was this article helpful? Yes No
No ratings
Article Information
Author:
Creation Date:
‎02-10-2017
Views:
613