Lucene search

K
saintSAINT CorporationSAINT:375E6169E0A75A7068E1C74224A06416
HistoryNov 06, 2009 - 12:00 a.m.

HP Power Manager Remote Code Execution

2009-11-0600:00:00
SAINT Corporation
my.saintcorporation.com
233

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.608 Medium

EPSS

Percentile

97.7%

Added: 11/06/2009
CVE: CVE-2009-2685
BID: 36933
OSVDB: 59684

Background

HP Power Manager is a web-based application that enables administrators to manage an HP UPS from a browser-based management console.

Problem

A stack-based buffer overflow in the HP Power Manager management web server allows remote attackers to execute arbitrary code via the Login variable of the login form.

Resolution

HP’s resolution is to limit access to trusted users.

References

<http://www.zerodayinitiative.com/advisories/ZDI-09-081/&gt;

Limitations

Exploit works on HP Power Manager 4.2.7. Windows patch KB933729 (rpct4.dll version 5.2.3790.4115) must be installed.

Platforms

Windows

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.608 Medium

EPSS

Percentile

97.7%