Lucene search

K
zdiE6af8de8b1d4b2b6d5ba2610cbf9cd38ZDI-13-201
HistoryAug 13, 2013 - 12:00 a.m.

Hewlett-Packard Network Node Manager I pmd.exe Remote Code Execution Vulnerability

2013-08-1300:00:00
e6af8de8b1d4b2b6d5ba2610cbf9cd38
www.zerodayinitiative.com
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.9%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager i. Authentication is not required to exploit this vulnerability. The specific flaw exists within pmd.exe, which listens by default on TCP port 162. By sending a specially crafted packet to the process, an attacker can provide a size to allocate an undersized buffer which will later be used for a memcpy. This vulnerability will cause a corruption of heap memory and allow for an attacker to execute code under the context of the process.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.9%

Related for ZDI-13-201