CVE-2011-0265 – Hewlett-Packard OpenView Network Node Manager nnmRptConfig.exe data_select1 Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0265
Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long data_select1 parameter. Desbordamiento de búfer en nnmRptConfig.exe en HP OpenView Network Node Manager (OV NNM) v7.51 y v7.53 permite a atacantes remotos ejecutar código arbitrario mediante un parámetro data_select1 largo. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the nnmRptConfig.exe module exposed by the webserver that listens by default on TCP port 80. A remote user can send an oversized data_select1 parameter via a POST request to one of the CGI functions of NNM to trigger a buffer overflow in this module. • http://www.securityfocus.com/archive/1/515628 http://www.securityfocus.com/bid/45762 http://www.securitytracker.com/id?1024951 http://www.vupen.com/english/advisories/2011/0085 http://www.zerodayinitiative.com/advisories/ZDI-11-007 https://exchange.xforce.ibmcloud.com/vulnerabilities/64651 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0267 – Hewlett-Packard OpenView Network Node Manager nnmRptConfig.exe schdParams/nameParams Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0267
Multiple buffer overflows in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) schdParams or (2) nameParams parameter, a different vulnerability than CVE-2011-0266. Múltiples desbordamientos de búfer en nnmRptConfig.exe en HP OpenView Network Node Manager (OV NNM) v7.51 y v7.53 permite a atacantes remotos ejecutar código arbitrario mediante (1) el parámetro schdParams o (2) namaParams, una vulnerabilidad diferente a CVE-2011-0266. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the nnmRptConfig.exe module exposed by the webserver that listens by default on TCP port 80. A remote user can send an oversized schdParams or nameParams parameter via a POST request to one of the CGI functions of NNM to trigger a buffer overflow in this module. • https://www.exploit-db.com/exploits/17038 http://securityreason.com/securityalert/8156 http://www.exploit-db.com/exploits/17038 http://www.securityfocus.com/archive/1/515628 http://www.securityfocus.com/bid/45762 http://www.securitytracker.com/id?1024951 http://www.vupen.com/english/advisories/2011/0085 http://www.zerodayinitiative.com/advisories/ZDI-11-009 https://exchange.xforce.ibmcloud.com/vulnerabilities/64649 - • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0268 – Hewlett-Packard OpenView Network Node Manager nnmRptConfig.exe nameParams/text1 Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0268
Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long text1 parameter. Desbordamiento de búfer en nnmRptConfig.exe en HP OpenView Network Node Manager (OV NNM) v7.51 y v7.53 permite a atacantes remotos ejecutar código arbitrario mediante un parámetro text1 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the nnmRptConfig.exe module exposed by the webserver that listens by default on TCP port 80. A remote user can send an oversized text1 parameter via a POST request to one of the CGI functions of NNM to trigger a buffer overflow in this module. Exploitation of this issue leads to remote code execution under the context of the target service. • http://www.securityfocus.com/archive/1/515628 http://www.securityfocus.com/bid/45762 http://www.securitytracker.com/id?1024951 http://www.vupen.com/english/advisories/2011/0085 http://www.zerodayinitiative.com/advisories/ZDI-11-010 https://exchange.xforce.ibmcloud.com/vulnerabilities/64648 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0270 – Hewlett-Packard OpenView Network Node Manager nnmRptConfig.exe Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0270
Format string vulnerability in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via format string specifiers in input data that involves an invalid template name. Vulnerabilidad de formato de cadena en nnmRptConfig.exe en HP OpenView Network Node Manager (OV NNM) v7.51 y v7.53 permite a atacantes remotos ejecutar código arbitrario mediante especificadores de cadena en datos de entrada que comprenden un nombre de plantilla inválido. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within nnmRptConfig.exe CGI which is exposed by the webserver which listens by default on TCP port 80. When parsing an invalid template name the application uses user supplied data as a format specifier during creation of an error message. • http://osvdb.org/70474 http://www.securityfocus.com/archive/1/515628 http://www.securityfocus.com/bid/45762 http://www.securitytracker.com/id?1024951 http://www.vupen.com/english/advisories/2011/0085 http://www.zerodayinitiative.com/advisories/ZDI-11-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/64646 • CWE-134: Use of Externally-Controlled Format String •
CVE-2011-0261 – HP OpenView Network Node Manager jovgraph.exe displayWidth Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0261
Unspecified vulnerability in jovgraph.exe in jovgraph in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a malformed displayWidth option in the arg parameter. Vulnerabilidad no especificada en jovgraph.exe en jovgraph en HP OpenView Network Node Manager (OV NNM) v7.51 y v7.53 permite a atacantes remotos ejecutar código arbitrario mediante una opción displayWidth mal-formada en el parámetro arg. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The exploit would require a crafted HTTP request to the target host. The specific flaw exists within jovgraph.exe, a Java-based grapher that extends the SNMP Data Presenter to include xnmgraph-like applications created by the application builder. • http://www.securityfocus.com/archive/1/515628 http://www.securityfocus.com/bid/45762 http://www.securitytracker.com/id?1024951 http://www.vupen.com/english/advisories/2011/0085 http://www.zerodayinitiative.com/advisories/ZDI-11-003 https://exchange.xforce.ibmcloud.com/vulnerabilities/64655 •