Lucene search

K
zdiE6af8de8b1d4b2b6d5ba2610cbf9cd38ZDI-13-179
HistoryJul 26, 2013 - 12:00 a.m.

Hewlett-Packard LeftHand Virtual SAN Appliance Hydra Login Remote Command Execution Vulnerability

2013-07-2600:00:00
e6af8de8b1d4b2b6d5ba2610cbf9cd38
www.zerodayinitiative.com
30

0.787 High

EPSS

Percentile

98.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LeftHand Virtual SAN Appliance. Authentication is not required to exploit this vulnerability. The flaw exists within the hydra service, specifically with the LHNSessionManager component. This process listens on TCP port 13838. When attempting to authenticate a remote client, the process fails to properly verify the length of the username parameter before extracting into a local stack buffer. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the root user.

0.787 High

EPSS

Percentile

98.3%