Vulnerabilities > CVE-2008-1667 - Numeric Errors vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The Probe Builder Service (aka PBOVISServer.exe) in European Performance Systems (EPS) Probe Builder 2.2 before A.02.20.901, as used in HP OpenView Internet Services (OVIS) on Windows, allows remote attackers to kill arbitrary processes via a process ID number in an unspecified opcode.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | HP_OPENVIEW_ISVC_PROBE_BUILDER_DOS.NASL |
description | HP OpenView Internet Services (OVIS) is installed on the remote host. It provides a single, integrated view of an organization |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 33771 |
published | 2008-08-01 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/33771 |
title | HP OVIS Probe Builder Service (PBOVISServer.exe) Arbitrary Remote Process Termination |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 30403 CVE(CAN) ID: CVE-2008-1667 HP OpenView Internet Services(OVIS) Probe是用于监控系统组件性能的程序,Probe Builder是European Performance Systems公司开发的用于为OVIS创建 European Performance Systems Probe Builder A.02.20.900 European Performance Systems ---------------------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.eps.eu.com/download/patches/pbpatch01.zip |
id | SSV:3729 |
last seen | 2017-11-19 |
modified | 2008-07-30 |
published | 2008-07-30 |
reporter | Root |
title | European Performance Systems Probe Builder终止任意进程漏洞 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728
- http://marc.info/?l=bugtraq&m=121726629109585&w=2
- http://marc.info/?l=bugtraq&m=121726629109585&w=2
- http://marc.info/?l=bugtraq&m=121726629109585&w=2
- http://marc.info/?l=bugtraq&m=121726629109585&w=2
- http://secunia.com/advisories/31278
- http://secunia.com/advisories/31278
- http://secunia.com/advisories/31282
- http://secunia.com/advisories/31282
- http://securityreason.com/securityalert/4054
- http://securityreason.com/securityalert/4054
- http://www.securityfocus.com/bid/30403
- http://www.securityfocus.com/bid/30403
- http://www.securitytracker.com/id?1020568
- http://www.securitytracker.com/id?1020568
- http://www.vupen.com/english/advisories/2008/2227/references
- http://www.vupen.com/english/advisories/2008/2227/references
- http://www.vupen.com/english/advisories/2008/2228/references
- http://www.vupen.com/english/advisories/2008/2228/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44041
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44041