TUCoPS :: HP/UX :: bu-1214.htm

HP OpenView NNM ovwebsnmpsrv.exe OVwSelection Stack Overflow Vulnerability
TPTI-09-14: HP OpenView NNM ovwebsnmpsrv.exe OVwSelection Stack Overflow Vulnerability
TPTI-09-14: HP OpenView NNM ovwebsnmpsrv.exe OVwSelection Stack Overflow Vulnerability



TPTI-09-14: HP OpenView NNM ovwebsnmpsrv.exe OVwSelection Stack Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-09-14 
December 9, 2009

-- CVE ID:
CVE-2009-4181

-- Affected Vendors:
Hewlett-Packard

-- Affected Products:
Hewlett-Packard OpenView Network Node Manager

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8396. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Hewlett-Packard OpenView Network Node
Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the ovwebsnmpsrv.exe application which
is launched when a request is received for the jovgraph.exe CGI
application. This process copies the contents of the 'sel' POST variable
a user-controllable amount of times into a static stack buffer. By
repeating a specific string as the contents of the 'arg' POST variable
this buffer can be overflowed leading to arbitrary code execution.

-- Vendor Response:
Hewlett-Packard has issued an update to correct this vulnerability. More
details can be found at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01950877 

-- Disclosure Timeline:
2009-08-06 - Vulnerability reported to vendor
2009-12-09 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
    * Aaron Portnoy, TippingPoint DVLabs

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH