Vulnerabilities > CVE-2008-1842 - Numeric Errors vulnerability in HP Openview Network Node Manager
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | HP OpenView Network Node Manager 7.x 'ovspmd' Buffer Overflow Vulnerability. CVE-2008-1842. Dos exploit for windows platform |
id | EDB-ID:31629 |
last seen | 2016-02-03 |
modified | 2008-04-08 |
published | 2008-04-08 |
reporter | Luigi Auriemma |
source | https://www.exploit-db.com/download/31629/ |
title | HP OpenView Network Node Manager 7.x - 'ovspmd' Buffer Overflow Vulnerability |
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHSS_38761.NASL description s700_800 11.X OV NNM7.01 Intermediate Patch 12 : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02374 SSRT080046) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to allow execution of arbitrary code or unauthorized access to data. (HPSBMA02406 SSRT080100) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02392 SSRT071481) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02338 SSRT080024, SSRT080041) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to allow cross site scripting (XSS). (HPSBMA02388 SSRT080059) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to gain unauthorized access or to create a Denial of Service (DoS). References: CVE-2007-3698, CVE-2007-3922, SUN Alert 102995, 102997. (HPSBMA02384 SSRT071465) last seen 2020-06-01 modified 2020-06-02 plugin id 34952 published 2008-11-25 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34952 title HP-UX PHSS_38761 : s700_800 11.X OV NNM7.01 Intermediate Patch 12 code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHSS_38761. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(34952); script_version("1.16"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2007-3698", "CVE-2007-3922", "CVE-2007-4349", "CVE-2007-5000", "CVE-2007-6388", "CVE-2008-1842", "CVE-2008-3545", "CVE-2008-4559", "CVE-2008-4560", "CVE-2008-4561", "CVE-2008-4562", "CVE-2009-0205"); script_bugtraq_id(26838, 27237); script_xref(name:"HP", value:"emr_na-c01466051"); script_xref(name:"HP", value:"emr_na-c01567813"); script_xref(name:"HP", value:"emr_na-c01601492"); script_xref(name:"HP", value:"emr_na-c01607558"); script_xref(name:"HP", value:"emr_na-c01607570"); script_xref(name:"HP", value:"emr_na-c01661610"); script_xref(name:"HP", value:"SSRT071465"); script_xref(name:"HP", value:"SSRT071481"); script_xref(name:"HP", value:"SSRT080024"); script_xref(name:"HP", value:"SSRT080041"); script_xref(name:"HP", value:"SSRT080046"); script_xref(name:"HP", value:"SSRT080059"); script_xref(name:"HP", value:"SSRT080100"); script_name(english:"HP-UX PHSS_38761 : s700_800 11.X OV NNM7.01 Intermediate Patch 12"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.X OV NNM7.01 Intermediate Patch 12 : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02374 SSRT080046) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to allow execution of arbitrary code or unauthorized access to data. (HPSBMA02406 SSRT080100) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02392 SSRT071481) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02338 SSRT080024, SSRT080041) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to allow cross site scripting (XSS). (HPSBMA02388 SSRT080059) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to gain unauthorized access or to create a Denial of Service (DoS). References: CVE-2007-3698, CVE-2007-3922, SUN Alert 102995, 102997. (HPSBMA02384 SSRT071465)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01466051 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?202438e1" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01567813 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?39f46ac2" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01601492 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?4abf7ab6" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01607570 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?04c58123" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01607558 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?fb0e7f7d" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01661610 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?90fb6f0b" ); script_set_attribute( attribute:"solution", value:"Install patch PHSS_38761 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack'); script_cwe_id(20, 79, 119, 189, 200); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/10/24"); script_set_attribute(attribute:"patch_modification_date", value:"2008/11/19"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/11/25"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/07/11"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00 11.11")) { exit(0, "The host is not affected since PHSS_38761 applies to a different OS release."); } patches = make_list("PHSS_38761", "PHSS_40705"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-CORE", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-PD", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-PESA", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVMIB-CONTRIB", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNM-RUN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-JPN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-SCH", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVRPT-RUN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-JPN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-SCH", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVNNMgrMan.OVNNM-RUN-MAN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVDB-RUN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVEVENT-MIN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVMIN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVSNMP-MIN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWIN", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-EVNT", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-FW", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-SRV", version:"B.07.01.00")) flag++; if (hpux_check_patch(app:"OVPlatformMan.OVEVENTMIN-MAN", version:"B.07.01.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHSS_38009.NASL description s700_800 11.X OV NNM8.01 NNM 8.0x Patch 8.02.001 : A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). last seen 2020-06-01 modified 2020-06-02 plugin id 33190 published 2008-06-16 reporter This script is Copyright (C) 2008-2013 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33190 title HP-UX PHSS_38009 : HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code, Denial of Service (DoS) (HPSBMA02340 SSRT080024, SSRT080041 rev.1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHSS_38009. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(33190); script_version("$Revision: 1.12 $"); script_cvs_date("$Date: 2013/04/20 00:44:14 $"); script_cve_id("CVE-2008-1842"); script_xref(name:"HP", value:"emr_na-c01471755"); script_xref(name:"HP", value:"SSRT080024"); script_xref(name:"HP", value:"SSRT080041"); script_name(english:"HP-UX PHSS_38009 : HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code, Denial of Service (DoS) (HPSBMA02340 SSRT080024, SSRT080041 rev.1)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.X OV NNM8.01 NNM 8.0x Patch 8.02.001 : A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS)." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01471755 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?2ccf6292" ); script_set_attribute( attribute:"solution", value:"Install patch PHSS_38009 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/06/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/16"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2013 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.23 11.31")) { exit(0, "The host is not affected since PHSS_38009 applies to a different OS release."); } patches = make_list("PHSS_38009", "PHSS_38435", "PHSS_38609"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"HPOvNNM.HPNMSCOMPS", version:"2.02.050")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCAUSESV", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCOMMON", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSDISCOSV", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSEMBDDB", version:"2.02.074")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSEVNT", version:"2.02.073")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSEVTPSV", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSLIC", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSNMPCO", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSPMD", version:"2.02.074")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNNMGEN", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNNMINSTALL", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVNNMUI", version:"2.02.070")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVSNMP", version:"2.02.074")) flag++; if (hpux_check_patch(app:"HPOvNNM.HPOVSTPLR", version:"2.02.070")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHSS_38488.NASL description s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 20 : The remote HP-UX host is affected by multiple vulnerabilities : - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to execute arbitrary code with administrator priviliges or to create a Denial of Service (DoS). (HPSBMA02477 SSRT090177) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02348 SSRT080033) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02374 SSRT080046) - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to execute arbitrary code. References: CVE-2008-3536, CVE-2008-3537, CVE-2008-3544 (Bugtraq ID 28668). (HPSBMA02362 SSRT080044, SSRT080045, SSRT080042) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02338 SSRT080024, SSRT080041) last seen 2020-06-01 modified 2020-06-02 plugin id 39379 published 2009-06-15 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39379 title HP-UX PHSS_38488 : s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 20 code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHSS_38488. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(39379); script_version("1.22"); script_cvs_date("Date: 2018/08/10 18:07:07"); script_cve_id("CVE-2008-1697", "CVE-2008-1842", "CVE-2008-3536", "CVE-2008-3537", "CVE-2008-3544", "CVE-2008-3545", "CVE-2009-3840", "CVE-2010-2710"); script_xref(name:"HP", value:"emr_na-c01466051"); script_xref(name:"HP", value:"emr_na-c01495949"); script_xref(name:"HP", value:"emr_na-c01537275"); script_xref(name:"HP", value:"emr_na-c01567813"); script_xref(name:"HP", value:"emr_na-c01926980"); script_xref(name:"HP", value:"SSRT080024"); script_xref(name:"HP", value:"SSRT080033"); script_xref(name:"HP", value:"SSRT080041"); script_xref(name:"HP", value:"SSRT080042"); script_xref(name:"HP", value:"SSRT080044"); script_xref(name:"HP", value:"SSRT080045"); script_xref(name:"HP", value:"SSRT080046"); script_xref(name:"HP", value:"SSRT090177"); script_name(english:"HP-UX PHSS_38488 : s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 20"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 20 : The remote HP-UX host is affected by multiple vulnerabilities : - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to execute arbitrary code with administrator priviliges or to create a Denial of Service (DoS). (HPSBMA02477 SSRT090177) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02348 SSRT080033) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02374 SSRT080046) - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to execute arbitrary code. References: CVE-2008-3536, CVE-2008-3537, CVE-2008-3544 (Bugtraq ID 28668). (HPSBMA02362 SSRT080044, SSRT080045, SSRT080042) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02338 SSRT080024, SSRT080041)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01466051 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?202438e1" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01495949 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?6c4897f2" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01537275 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?cd8ebfb4" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01567813 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?39f46ac2" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?499137a6" ); script_set_attribute( attribute:"solution", value:"Install patch PHSS_38488 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'HP OpenView NNM 7.53, 7.51 OVAS.EXE Pre-Authentication Stack Buffer Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack'); script_cwe_id(119, 189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/09/24"); script_set_attribute(attribute:"patch_modification_date", value:"2008/10/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/06/15"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.11 11.23 11.31", proc:"parisc")) { exit(0, "The host is not affected since PHSS_38488 applies to a different OS release / architecture."); } patches = make_list("PHSS_38488", "PHSS_38782", "PHSS_39245", "PHSS_39639", "PHSS_39944", "PHSS_40374", "PHSS_40707", "PHSS_41242", "PHSS_41606", "PHSS_41857", "PHSS_42232", "PHSS_43046", "PHSS_43353"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-CORE", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-IPV6", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-PESA", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVMIB-CONTRIB", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNM-RUN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-JPN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-KOR", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-SCH", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-JPN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-KOR", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-SCH", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgrMan.OVNNM-RUN-MAN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgrRtDOC.OVNNM-ENG-DOC", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVDB-RUN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVEVENT-MIN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVMIN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWIN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-EVNT", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-FW", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-SRV", version:"B.07.50.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHSS_38489.NASL description s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 20 : The remote HP-UX host is affected by multiple vulnerabilities : - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to execute arbitrary code. References: CVE-2008-3536, CVE-2008-3537, CVE-2008-3544 (Bugtraq ID 28668). (HPSBMA02362 SSRT080044, SSRT080045, SSRT080042) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02338 SSRT080024, SSRT080041) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02374 SSRT080046) - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to execute arbitrary code with administrator priviliges or to create a Denial of Service (DoS). (HPSBMA02477 SSRT090177) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02348 SSRT080033) last seen 2020-06-01 modified 2020-06-02 plugin id 39380 published 2009-06-15 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39380 title HP-UX PHSS_38489 : s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 20 code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHSS_38489. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(39380); script_version("1.22"); script_cvs_date("Date: 2018/08/10 18:07:07"); script_cve_id("CVE-2008-1697", "CVE-2008-1842", "CVE-2008-3536", "CVE-2008-3537", "CVE-2008-3544", "CVE-2008-3545", "CVE-2009-3840", "CVE-2010-2710"); script_xref(name:"HP", value:"emr_na-c01466051"); script_xref(name:"HP", value:"emr_na-c01495949"); script_xref(name:"HP", value:"emr_na-c01537275"); script_xref(name:"HP", value:"emr_na-c01567813"); script_xref(name:"HP", value:"emr_na-c01926980"); script_xref(name:"HP", value:"SSRT080024"); script_xref(name:"HP", value:"SSRT080033"); script_xref(name:"HP", value:"SSRT080041"); script_xref(name:"HP", value:"SSRT080042"); script_xref(name:"HP", value:"SSRT080044"); script_xref(name:"HP", value:"SSRT080045"); script_xref(name:"HP", value:"SSRT080046"); script_xref(name:"HP", value:"SSRT090177"); script_name(english:"HP-UX PHSS_38489 : s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 20"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 20 : The remote HP-UX host is affected by multiple vulnerabilities : - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to execute arbitrary code. References: CVE-2008-3536, CVE-2008-3537, CVE-2008-3544 (Bugtraq ID 28668). (HPSBMA02362 SSRT080044, SSRT080045, SSRT080042) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02338 SSRT080024, SSRT080041) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBMA02374 SSRT080046) - Potential vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to execute arbitrary code with administrator priviliges or to create a Denial of Service (DoS). (HPSBMA02477 SSRT090177) - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code or to create a Denial of Service (DoS). (HPSBMA02348 SSRT080033)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01466051 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?202438e1" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01495949 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?6c4897f2" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01537275 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?cd8ebfb4" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01567813 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?39f46ac2" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01926980 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?499137a6" ); script_set_attribute( attribute:"solution", value:"Install patch PHSS_38489 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'HP OpenView NNM 7.53, 7.51 OVAS.EXE Pre-Authentication Stack Buffer Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack'); script_cwe_id(119, 189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/09/24"); script_set_attribute(attribute:"patch_modification_date", value:"2008/10/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/06/15"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.23 11.31", proc:"ia64")) { exit(0, "The host is not affected since PHSS_38489 applies to a different OS release / architecture."); } patches = make_list("PHSS_38489", "PHSS_38783", "PHSS_39246", "PHSS_39640", "PHSS_39945", "PHSS_40375", "PHSS_40708", "PHSS_41243", "PHSS_41607", "PHSS_41858", "PHSS_42233", "PHSS_43047", "PHSS_43354"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-CORE", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-IPV6", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMETCore.OVNNMET-PESA", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVMIB-CONTRIB", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNM-RUN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-JPN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-KOR", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVNNMGR-SCH", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-JPN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-KOR", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgr.OVWWW-SCH", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgrMan.OVNNM-RUN-MAN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgrRtDOC.OVNNM-DOC-REUS", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVNNMgrRtDOC.OVNNM-ENG-DOC", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVDB-RUN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVEVENT-MIN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVMIN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWIN", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-EVNT", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-FW", version:"B.07.50.00")) flag++; if (hpux_check_patch(app:"OVPlatform.OVWWW-SRV", version:"B.07.50.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
References
- http://aluigi.altervista.org/adv/closedview-adv.txt
- http://aluigi.altervista.org/adv/closedview-adv.txt
- http://aluigi.org/poc/closedview.zip
- http://aluigi.org/poc/closedview.zip
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://secunia.com/advisories/29713
- http://secunia.com/advisories/29713
- http://securitytracker.com/id?1019821
- http://securitytracker.com/id?1019821
- http://www.securityfocus.com/archive/1/493781/100/0/threaded
- http://www.securityfocus.com/archive/1/493781/100/0/threaded
- http://www.securityfocus.com/bid/28689
- http://www.securityfocus.com/bid/28689
- http://www.vupen.com/english/advisories/2008/1159
- http://www.vupen.com/english/advisories/2008/1159
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41737
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41737