VUPEN Security Research - HP OpenView Network Node Manager "nnmrptconfig.exe" Buffer Overflow (CVE-2010-2703)

2010.07.29
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

VUPEN Security Research - HP OpenView Network Node Manager "nnmrptconfig.exe" Buffer Overflow (CVE-2010-2703) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "HP OpenView Network Node Manager is the market-leading network management solution that enables problem detection for the entire environment utilizing a wide range of statistics, alarms, maps, graphs and charts on a single display." from hp.com II. DESCRIPTION --------------------- VUPEN Vulnerability Research Team discovered a critical vulnerability in HP OpenView Network Node Manager (OV NNM). This vulnerability is caused by a buffer overflow error in the "nnmrptconfig.exe" CGI when processing an overly long parameter value, which could be exploited by remote unauthenticated attackers to execute arbitrary code. III. AFFECTED PRODUCTS --------------------------- HP OpenView Network Node Manager (OV NNM) version 7.51 (Windows) HP OpenView Network Node Manager (OV NNM) version 7.53 (Windows) IV. Binary Analysis & Proof-of-concept --------------------------------------- In-depth binary analysis of the vulnerability and a code execution exploit are available through the VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/english/services/ba-index.php V. VUPEN Threat Protection Program ----------------------------------- Governments and Intelligence agencies who are members of the VUPEN Threat Protection Program (TPP) have been alerted about the vulnerability when it was discovered by VUPEN, and have received a detailed detection guidance to proactively protect national and critical infrastructures against potential attacks exploiting this vulnerability: http://www.vupen.com/english/services/tpp-index.php VI. SOLUTION ---------------- HP OV NNM v7.53 (Windows) - Apply NNM_01203 and hotfix SSRT100025 HP OV NNM v7.51 - Upgrade to NNM v7.53 and apply NNM_01203 and hotfix SSRT100025 VII. CREDIT -------------- This vulnerability was discovered by Sebastien Renaud of VUPEN Security VIII. ABOUT VUPEN Security --------------------------- VUPEN is a leading IT security research company providing vulnerability management and security intelligence solutions which enable enterprises and institutions to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. Governmental and federal agencies, and global enterprises in the financial services, insurance, manufacturing and technology industries rely on VUPEN to improve their security, prioritize resources, cut time and costs, and stay ahead of the latest threats. * VUPEN Vulnerability Notification Service (VNS) : http://www.vupen.com/english/services/vns-index.php * VUPEN Binary Analysis & Exploits Service (BAE) : http://www.vupen.com/english/services/ba-index.php * VUPEN Threat Protection Program for Govs (TPP) : http://www.vupen.com/english/services/tpp-index.php * VUPEN Web Application Security Scanner (WASS) : http://www.vupen.com/english/services/wass-index.php IX. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/1866 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c 02286088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2703 X. DISCLOSURE TIMELINE ----------------------------- 2010-06-16 - Vendor and TPP customers notified 2010-06-16 - Vendor response 2010-07-02 - Status update received 2010-07-21 - Coordinated public Disclosure

References:

http://marc.info/?l=bugtraq&m=127972286628707&w=2
http://marc.info/?l=bugtraq&m=127972286628707&w=2
http://www.vupen.com/english/advisories/2010/1866
http://www.securityfocus.com/bid/41839
http://www.securityfocus.com/archive/1/archive/1/512543/100/0/threaded
http://www.attrition.org/pipermail/vim/2010-July/002374.html
2000
http://secunia.com/advisories/40697
http://marc.info/?l=bugtraq&m=127974889107645&w=2


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top