HP OpenView Network Node Manager "ov.dll" Buffer Overflow Vulnerability

2010.07.29
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

VUPEN Security Research - HP OpenView Network Node Manager "ov.dll" Buffer Overflow Vulnerability (CVE-2010-2704) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "HP OpenView Network Node Manager is the market-leading network management solution that enables problem detection for the entire environment utilizing a wide range of statistics, alarms, maps, graphs and charts on a single display." from hp.com II. DESCRIPTION --------------------- VUPEN Vulnerability Research Team discovered a critical vulnerability in HP OpenView Network Node Manager (OV NNM). This vulnerability is caused by a buffer overflow error in the "ov.dll" library when processing certain arguments supplied via CGI executables, which could be exploited by remote unauthenticated attackers to execute arbitrary code. III. AFFECTED PRODUCTS --------------------------- HP OpenView Network Node Manager version 7.51 (HP-UX, Linux, Solaris, Windows) HP OpenView Network Node Manager version 7.53 (HP-UX, Linux, Solaris, Windows) IV. Binary Analysis & Proof-of-concept --------------------------------------- In-depth binary analysis of the vulnerability and a code execution exploit are available through the VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/english/services/ba-index.php V. VUPEN Threat Protection Program ----------------------------------- Governments and Intelligence agencies who are members of the VUPEN Threat Protection Program (TPP) have been alerted about the vulnerability when it was discovered by VUPEN, and have received a detailed detection guidance to proactively protect national and critical infrastructures against potential attacks exploiting this vulnerability: http://www.vupen.com/english/services/tpp-index.php VI. SOLUTION ---------------- Apply patches: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c 02290344 VII. CREDIT -------------- This vulnerability was discovered by Sebastien Renaud of VUPEN Security VIII. ABOUT VUPEN Security --------------------------- VUPEN is a leading IT security research company providing vulnerability management and security intelligence solutions which enable enterprises and institutions to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. Governmental and federal agencies, and global enterprises in the financial services, insurance, manufacturing and technology industries rely on VUPEN to improve their security, prioritize resources, cut time and costs, and stay ahead of the latest threats. * VUPEN Vulnerability Notification Service (VNS) : http://www.vupen.com/english/services/vns-index.php * VUPEN Binary Analysis & Exploits Service (BAE) : http://www.vupen.com/english/services/ba-index.php * VUPEN Threat Protection Program for Govs (TPP) : http://www.vupen.com/english/services/tpp-index.php * VUPEN Web Application Security Scanner (WASS) : http://www.vupen.com/english/services/wass-index.php IX. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/1866 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c 02290344 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2704 X. DISCLOSURE TIMELINE ----------------------------- 2010-06-16 - Vendor and TPP customers notified 2010-06-16 - Vendor response 2010-07-02 - Status update received 2010-07-21 - Coordinated public Disclosure

References:

http://marc.info/?l=bugtraq&m=127973001009749&w=2
http://marc.info/?l=bugtraq&m=127973001009749&w=2
http://www.vupen.com/english/advisories/2010/1866
http://www.securitytracker.com/id?1024238
http://www.securitytracker.com/id?1024224
http://www.securityfocus.com/bid/41829
http:2000//www.securityfocus.com/archive/1/archive/1/512552/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/512544/100/0/threaded
http://www.attrition.org/pipermail/vim/2010-July/002374.html
http://secunia.com/advisories/40686
http://osvdb.org/66514


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top