Vulnerabilities > CVE-2010-1964 - Unspecified vulnerability in HP Openview Network Node Manager 7.51/7.53
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via unspecified parameters to jovgraph.exe, aka ZDI-CAN-683.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Exploit-Db
description HP NNM 7.53 ovwebsnmpsrv.exe Buffer Overflow (SEH). CVE-2010-1964. Local exploit for windows platform id EDB-ID:14256 last seen 2016-02-01 modified 2010-07-07 published 2010-07-07 reporter bitform source https://www.exploit-db.com/download/14256/ title HP NNM 7.53 ovwebsnmpsrv.exe Buffer Overflow SEH description HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow. CVE-2010-1964. Remote exploit for windows platform id EDB-ID:17041 last seen 2016-02-02 modified 2011-03-23 published 2011-03-23 reporter metasploit source https://www.exploit-db.com/download/17041/ title HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow
Metasploit
description This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53 prior to NNM_01203. By specifying a long 'arg' parameter when executing the 'jovgraph.exe' CGI program, an attacker can cause a stack-based buffer overflow and execute arbitrary code. This vulnerability is triggerable via either a GET or POST request. The buffer being written to is 1024 bytes in size. It is important to note that this vulnerability must be exploited by overwriting SEH. Otherwise, CVE-2010-1961 is triggered! The vulnerable code is within the "main" function within "ovwebsnmpsrv.exe" with a timestamp prior to April 7th, 2010. There are no stack cookies, so exploitation is easily achieved by overwriting SEH structures. There exists some unreliability when running this exploit. It is not completely clear why at this time, but may be related to OVWDB or session management. Also, on some attempts OV NNM may report invalid characters in the URL. It is not clear what is causing this either. id MSF:EXPLOIT/WINDOWS/HTTP/HP_NNM_OVWEBSNMPSRV_MAIN last seen 2020-06-14 modified 1976-01-01 published 1976-01-01 references https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1964 reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb title HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow description This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53 prior to NNM_01203. By specifying a long 'arg' parameter when executing the 'jovgraph.exe' CGI program, an attacker can cause a stack-based buffer overflow and execute arbitrary code. This vulnerability is triggerable via either a GET or POST request. It is interesting to note that this vulnerability cannot be exploited by overwriting SEH, since attempting to would trigger CVE-2010-1964. The vulnerable code is within a sub-function called from "main" within "ovwebsnmpsrv.exe" with a timestamp prior to April 7th, 2010. This function contains a 256 byte stack buffer which is passed to the "getProxiedStorageAddress" function within ovutil.dll. When processing the address results in an error, the buffer is overflowed in a call to sprintf_new. There are no stack cookies present, so exploitation is easily achieved by overwriting the saved return address. There exists some unreliability when running this exploit. It is not completely clear why at this time, but may be related to OVWDB or session management. Also, on some attempts OV NNM may report invalid characters in the URL. It is not clear what is causing this either. id MSF:EXPLOIT/WINDOWS/HTTP/HP_NNM_OVWEBSNMPSRV_OVUTIL last seen 2020-05-26 modified 2017-07-24 published 2011-03-23 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb title HP OpenView Network Node Manager ovwebsnmpsrv.exe ovutil Buffer Overflow
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHSS_40708.NASL description s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 26 : The remote HP-UX host is affected by multiple vulnerabilities : - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code. References: CVE-2010-1550 (SSRT090225, ZDI-CAN-563) CVE-2010-1551 (SSRT090226, ZDI-CAN-564) CVE-2010-1552 (SSRT090227, ZDI-CAN-566) CVE-2010-1553 (SSRT090228, ZDI-CAN-573) CVE-2010-1554 (SSRT090229, ZDI-CAN-574) CVE-2010-1555 (SSRT090230, ZDI-CAN-575). (HPSBMA02527 SSRT010098) - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code under the context of the user running the web server. References: CVE-2010-1964 (SSRT100026, ZDI-CAN-683) CVE-2010-1960 (SSRT100027, ZDI-CAN-684) CVE-2010-1961 (SSRT100028, ZDI-CAN-685). - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code under the context of the user running the web server. last seen 2020-06-01 modified 2020-06-02 plugin id 46348 published 2010-05-17 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/46348 title HP-UX PHSS_40708 : s700_800 11.X OV NNM7.53 IA-64 Intermediate Patch 26 NASL family HP-UX Local Security Checks NASL id HPUX_PHSS_40707.NASL description s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 26 : The remote HP-UX host is affected by multiple vulnerabilities : - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code under the context of the user running the web server. References: CVE-2010-1964 (SSRT100026, ZDI-CAN-683) CVE-2010-1960 (SSRT100027, ZDI-CAN-684) CVE-2010-1961 (SSRT100028, ZDI-CAN-685). - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code. References: CVE-2010-1550 (SSRT090225, ZDI-CAN-563) CVE-2010-1551 (SSRT090226, ZDI-CAN-564) CVE-2010-1552 (SSRT090227, ZDI-CAN-566) CVE-2010-1553 (SSRT090228, ZDI-CAN-573) CVE-2010-1554 (SSRT090229, ZDI-CAN-574) CVE-2010-1555 (SSRT090230, ZDI-CAN-575). (HPSBMA02527 SSRT010098) - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code under the context of the user running the web server. last seen 2020-06-01 modified 2020-06-02 plugin id 46347 published 2010-05-17 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/46347 title HP-UX PHSS_40707 : s700_800 11.X OV NNM7.53 PA-RISC Intermediate Patch 26
Packetstorm
data source https://packetstormsecurity.com/files/download/91565/hpnnm-overflow.txt id PACKETSTORM:91565 last seen 2016-12-05 published 2010-07-07 reporter bitform source https://packetstormsecurity.com/files/91565/HP-NNM-7.53-ovwebsnmpsrv.exe-Buffer-Overflow.html title HP NNM 7.53 ovwebsnmpsrv.exe Buffer Overflow data source https://packetstormsecurity.com/files/download/99677/hp_nnm_ovwebsnmpsrv_ovutil.rb.txt id PACKETSTORM:99677 last seen 2016-12-05 published 2011-03-24 reporter jduck source https://packetstormsecurity.com/files/99677/HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-ovutil-Buffer-Overflow.html title HP OpenView Network Node Manager ovwebsnmpsrv.exe ovutil Buffer Overflow data source https://packetstormsecurity.com/files/download/99676/hp_nnm_ovwebsnmpsrv_main.rb.txt id PACKETSTORM:99676 last seen 2016-12-05 published 2011-03-24 reporter jduck source https://packetstormsecurity.com/files/99676/HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-main-Buffer-Overflow.html title HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow
Seebug
bulletinFamily exploit description BUGTRAQ ID: 40873 CVE ID: CVE-2010-1964 HP OpenView网络节点管理器(OV NNM)是HP公司开发和维护的网络管理系统软件,具有强大的网络节点管理功能。 OpenView网络节点管理器中可通过jovgraph.exe CGI程序到达的ovwebsnmpsrv.exe服务进程中存在缓冲区溢出漏洞。如果远程用户通过HTTP请求向变量传送了超大值,则main()函数中的strcpy调用就可能溢出静态缓冲区,导致以运行webserver用户的权限执行任意代码。 HP OpenView Network Node Manager 7.53 HP OpenView Network Node Manager 7.51 厂商补丁: HP -- HP已经为此发布了一个安全公告(HPSBMA02537)以及相应补丁: HPSBMA02537:SSRT010027 rev.1 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code 链接:https://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02217439&admit=109447626+127624536 id SSV:19930 last seen 2017-11-19 modified 2010-07-08 published 2010-07-08 reporter Root source https://www.seebug.org/vuldb/ssvid-19930 title HP OpenView网络节点管理器ovwebsnmpsrv.exe远程溢出漏洞 bulletinFamily exploit description No description provided by source. id SSV:71522 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-71522 title HP OpenView Network Node Manager ovwebsnmpsrv.exe ovutil Buffer Overflow bulletinFamily exploit description No description provided by source. id SSV:19921 last seen 2017-11-19 modified 2010-07-07 published 2010-07-07 reporter Root source https://www.seebug.org/vuldb/ssvid-19921 title HP NNM 7.53 ovwebsnmpsrv.exe Buffer Overflow (SEH)
References
- http://osvdb.org/65552
- http://osvdb.org/65552
- http://seclists.org/bugtraq/2010/Jun/152
- http://seclists.org/bugtraq/2010/Jun/152
- http://seclists.org/bugtraq/2010/Jun/152
- http://seclists.org/bugtraq/2010/Jun/152
- http://securityreason.com/securityalert/8155
- http://securityreason.com/securityalert/8155
- http://www.securityfocus.com/archive/1/511854/100/0/threaded
- http://www.securityfocus.com/archive/1/511854/100/0/threaded
- http://www.securityfocus.com/bid/40873
- http://www.securityfocus.com/bid/40873
- http://www.zerodayinitiative.com/advisories/ZDI-10-108
- http://www.zerodayinitiative.com/advisories/ZDI-10-108