Skip to main content

HP OpenView Network Node Manager Code Execution Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 13 Jan 2011 5649 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in HP OpenView Network Node Manager (OV NNM), which could be exploited by remote attackers to compromise a vulnerable system.

1. Due to a format string error in the "nnmrptconfig.exe" CGI executable when parsing an invalid template name, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

2. Due to a buffer overflow error in the "nnmrptconfig.exe" CGI executable when processing an oversized "schd_select1" parameter via a POST request, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

3. Due to a buffer overflow error in the "nnmrptconfig.exe" CGI executable when processing an oversized "text1" parameter via a POST request, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

4. Due to a buffer overflow error in the "nnmrptconfig.exe" CGI executable when processing an oversized "schdParams" or "nameParams" parameter via a POST request, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

5. Due to a buffer overflow error in the "nnmrptconfig.exe" CGI executable when processing an oversized "nameParams" parameter via a POST request, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

6. Due to a buffer overflow error in the "nnmrptconfig.exe" CGI executable when processing an oversized "data_select1" parameter via a POST request, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

7. Due to a stack overflow error in the "ovutil.dll" library when processing the "COOKIE" variable passed through a GET request, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

8. Due to a stack overflow error in the "ovas.exe" component when processing the "Source Node" or "Destination Node" name POST variables, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

9. Due to a stack overflow error in the "ovutil.dll" module (loaded by the "ovwebsnmpsrv.exe" process) when processing overly large parameters sent to the "jovgraph.exe" CGI, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

10. Due to a stack overflow error in the "jovgraph.exe" module when processing a malformed "displayWidth" option, which could be exploited by remote unauthenticated attackers to execute arbitrary code.

11. Due to an input validation error within unspecified CGI scripts, which could allow remote attackers to inject arbitrary commands.


Impact

  • Remote Code Execution

System / Technologies affected

  • HP OpenView Network Node Manager (OV NNM) version 7.51
  • HP OpenView Network Node Manager (OV NNM) version 7.53

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • HP OV NNM v7.53 (HP-UX / IA) - Apply PHSS_41607
  • HP OV NNM v7.53 (HP-UX / PA) - Apply PHSS_41606
  • HP OV NNM v7.53 (Linux RedHatAS2.1) - Apply LXOV_00113
  • HP OV NNM v7.53 (Linux RedHat4AS-x86_64) - Apply LXOV_00114
  • HP OV NNM v7.53 (Solaris) - Apply PSOV_03531
  • HP OV NNM v7.53 (Windows) - Apply NNM_01208
  • HP OV NNM v7.51 - Upgrade to NNM v7.53 and apply fixes
  • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02670501


Vulnerability Identifier


Source


Related Link