Lucene search

K
nessusThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.HP_OPENVIEW_NNM_OVERFLOW.NASL
HistorySep 15, 2005 - 12:00 a.m.

HP OpenView Network Node Manager Multiple Services Remote Overflow

2005-09-1500:00:00
This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
www.tenable.com
15

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.015 Low

EPSS

Percentile

86.9%

The remote host is running HP OpenView Topology Manager Daemon for IP discovery and layout.

The remote version of this software has a heap overflow vulnerability.

An unauthenticated attacker can exploit this flaw by sending a specialy crafted packet to the remote host. Successful exploitation of this vulnerability would result in remote code execution with the privileges of the daemon itself.

Note that other OV NNM services are affected by this flaw as well.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description) {
  script_id(19707);
  script_version("1.17");
  script_cve_id("CVE-2005-1056");
  script_bugtraq_id(13029);

  script_name(english:"HP OpenView Network Node Manager Multiple Services Remote Overflow");
  
 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be executed on the remote host due to a flaw in the
HP OpenView Topology Manager Daemon." );
 script_set_attribute(attribute:"description", value:
"The remote host is running HP OpenView Topology Manager Daemon for IP
discovery and layout. 

The remote version of this software has a heap overflow vulnerability. 

An unauthenticated attacker can exploit this flaw by sending a
specialy crafted packet to the remote host.  Successful exploitation
of this vulnerability would result in remote code execution with the
privileges of the daemon itself. 

Note that other OV NNM services are affected by this flaw as well." );
 script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/advisories/8372" );
 script_set_attribute(attribute:"solution", value:
"Install one of the patches listed in the advisory referenced above." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/15");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/04/05");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/04/05");
 script_cvs_date("Date: 2018/07/12 19:01:15");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:openview_network_node_manager");
script_end_attributes();

 
  script_summary(english:"Checks for HP OpenView NNM Heap Overflow");
  script_category(ACT_GATHER_INFO);
  script_family(english:"Gain a shell remotely");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencie("hp_openview_ovtopmd.nasl");
  script_require_ports(2532);
  exit(0);
}

include ("misc_func.inc");

port = get_kb_item('Services/ovtopmd');
if (!port) exit(0);

soc = open_sock_tcp (port);
if (!soc) exit (0);

req = raw_string (0x00,0x00,0x3F,0xFD,0x54,0x4E,0x53) + crap(data:raw_string(0), length:0x3FFA);

send (socket:soc, data:req);
buf = recv(socket:soc, length:16);

if ("0000000c000000020000000100000000" >< hexstr(buf))
{
  security_hole(port);
}
VendorProductVersionCPE
hpopenview_network_node_managercpe:/a:hp:openview_network_node_manager

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.015 Low

EPSS

Percentile

86.9%

Related for HP_OPENVIEW_NNM_OVERFLOW.NASL