fkie_cve-2008-1842
Vulnerability from fkie_nvd
Published
2008-04-16 17:05
Modified
2024-11-21 00:45
Severity ?
Summary
Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/closedview-adv.txt
cve@mitre.orghttp://aluigi.org/poc/closedview.zipExploit
cve@mitre.orghttp://marc.info/?l=bugtraq&m=121321155405849&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=121321155405849&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=121321155405849&w=2
cve@mitre.orghttp://secunia.com/advisories/29713Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1019821
cve@mitre.orghttp://www.securityfocus.com/archive/1/493781/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28689
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1159Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41737
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/closedview-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/poc/closedview.zipExploit
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=121321155405849&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=121321155405849&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=121321155405849&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29713Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019821
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493781/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28689
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1159Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41737



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "165864E6-F9B8-4E67-8344-6C08EA9E342E",
              "versionEndIncluding": "7.53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4670BB0B-F94E-44FE-A1E5-2EEAF58C0C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "522BF98F-FFEB-4867-AC18-CDC872F2099D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:5.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "1218361D-6F62-4035-B0B2-9BEB19539A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5701BC4B-8B3E-4AAD-965F-EDB406D5FBE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39C1B197-F043-4FB7-AFB3-AFC8B8B5B051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8E17259-60C7-4F6B-AB23-06E406FA006D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A2AF84-E59A-4725-85E6-D2AF56F97F8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E441789-E4C5-4D40-A0BE-1A20F5F90A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AAF9FC-36B2-4939-BAB5-829E13D310FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "87DF6D25-9B6E-4862-9252-92C8DB6F3F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24CCB02-FFFE-448B-AF31-D9AC39443552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C89F2AB-45CF-4455-920F-396852C862E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E31677CB-1DAC-498C-9372-D442D60A6389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "725DA559-EE1C-4CCE-91C4-D5AAA940D855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5CC1E39-5607-41A9-8BBE-A51F1AC9D5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_network_node_manager:8.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "F556FF2D-391F-476E-82CE-8423CD3E540A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "Error en la propiedad signedness de enteros en el archivo ovspmd.exe en HP OpenView Network Node Manager (OV NNM) versiones 8.01 y 7.53 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) o ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n larga al puerto TCP 8886 que comienza con un determinado entero negativo, que pasa una comparaci\u00f3n firmada y desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria."
    }
  ],
  "id": "CVE-2008-1842",
  "lastModified": "2024-11-21T00:45:28.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-16T17:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/closedview-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/poc/closedview.zip"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=121321155405849\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=121321155405849\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=121321155405849\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29713"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019821"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/493781/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28689"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1159"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/closedview-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.org/poc/closedview.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=121321155405849\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=121321155405849\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=121321155405849\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493781/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/1159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41737"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.