Vulnerabilities > CVE-2012-3275 - Remote Unspecified Unauthorized Access vulnerability in HP Network Node Manager I 9.10/9.20

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
hp
critical
nessus

Summary

Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.1x and 9.20 allows remote attackers to execute arbitrary code via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Hp
2

Nessus

NASL familyHP-UX Local Security Checks
NASL idHPUX_PHSS_42793.NASL
descriptionHP-UX 11.31 OV NNM9.20 NNM 9.2x Patch 1 : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerability could be remotely exploited resulting in unauthorized access. - A potential security vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerability could be remotely exploited resulting in disclosure of information.
last seen2020-06-01
modified2020-06-02
plugin id63291
published2012-12-19
reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/63291
titleHP-UX PHSS_42793 : HP-UX 11.31 OV NNM9.20 NNM 9.2x Patch 1
code
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and patch checks in this plugin were 
# extracted from HP patch PHSS_42793. The text itself is
# copyright (C) Hewlett-Packard Development Company, L.P.
#

include("compat.inc");

if (description)
{
  script_id(63291);
  script_version("1.13");
  script_cvs_date("Date: 2018/07/12 19:01:15");

  script_cve_id("CVE-2012-3267", "CVE-2012-3275");
  script_bugtraq_id(55773, 56822);
  script_xref(name:"HP", value:"emr_na-c03507416");
  script_xref(name:"IAVB", value:"2012-B-0101");
  script_xref(name:"IAVB", value:"2012-B-0125");
  script_xref(name:"HP", value:"emr_na-c03507708");

  script_name(english:"HP-UX PHSS_42793 : HP-UX 11.31 OV NNM9.20 NNM 9.2x Patch 1");
  script_summary(english:"Checks for the patch in the swlist output");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote HP-UX host is missing a security-related patch."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"HP-UX 11.31 OV NNM9.20 NNM 9.2x Patch 1 : 

The remote HP-UX host is affected by multiple vulnerabilities :

  - A potential security vulnerability has been identified
    with HP Network Node Manager i (NNMi) for HP-UX, Linux,
    Solaris, and Windows. The vulnerability could be
    remotely exploited resulting in unauthorized access.

  - A potential security vulnerability has been identified
    with HP Network Node Manager i (NNMi) for HP-UX, Linux,
    Solaris, and Windows. The vulnerability could be
    remotely exploited resulting in disclosure of
    information."
  );
  # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03507416
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?15c6f6d5"
  );
  # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03507708
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?94f5533c"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Install patch PHSS_42793 or subsequent."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");

  script_set_attribute(attribute:"patch_publication_date", value:"2012/09/11");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/12/19");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");
  script_family(english:"HP-UX Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("hpux.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);

if (!hpux_check_ctx(ctx:"11.31"))
{
  exit(0, "The host is not affected since PHSS_42793 applies to a different OS release.");
}

patches = make_list("PHSS_42793", "PHSS_43232", "PHSS_43408", "PHSS_43558");
foreach patch (patches)
{
  if (hpux_installed(app:patch))
  {
    exit(0, "The host is not affected because patch "+patch+" is installed.");
  }
}


flag = 0;
if (hpux_check_patch(app:"HPOvNNM.HPNMSCLUSTER", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNMSCLUSTER", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNMSCOMPS", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNMSCUSTPOLL", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNMSCUSTPOLL", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNMSDEVEXTN", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNMSDEVEXTN", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNNMTRAPSV", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPNNMTRAPSV", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSAS", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSASSHARED", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCAUSESV", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCAUSESV", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCOMMON", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCOMMON", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCONFIG", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCONFIG", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCUSTCORR", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSCUSTCORR", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSDISCOSV", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSDISCOSV", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSEVTPSV", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSEVTPSV", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSHA", version:"3.00.086")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSLIC", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSLIC", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSRBA", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSRBA", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSNMPCO", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSNMPCO", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSPICOM", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSPICOM", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSPMD", version:"2.03.059")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNMSSPMD", version:"2.03.060")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMAS", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMBSM", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMBSM", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMCISCO", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMCISCO", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMGEN", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMGEN", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMINSTALL", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMINSTALL", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMNA", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMNA", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMNB", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMNB", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMNC", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMNC", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMOM", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMOM", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMSIM", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMSIM", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMUCMDB", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMUCMDB", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMUI", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVNNMUI", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVPERFSPIADA", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVPERFSPIADA", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVSTPLR", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNNM.HPOVSTPLR", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNnmRams.HPOVNNMRAMS", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNnmRams.HPOVNNMRAMS", version:"9.20.001")) flag++;
if (hpux_check_patch(app:"HPOvNnmSiteScope.HPOVNNMSITESCOPE", version:"9.20.000")) flag++;
if (hpux_check_patch(app:"HPOvNnmSiteScope.HPOVNNMSITESCOPE", version:"9.20.001")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");